close
test_template

The Two Types of Template Protection Schemes

Human-Written
download print

About this sample

About this sample

close
Human-Written

Words: 910 |

Pages: 2|

5 min read

Published: Dec 12, 2018

Words: 910|Pages: 2|5 min read

Published: Dec 12, 2018

The two major types of template protection schemes are Feature transformation approach and Biometric Cryptosystems approach. In feature transformation, a transformation function is applied to an original template and only the transformed template is stored in the database. The transformation function parameters are usually derived from a password or a random key. When the query template arrives the same transformation function is applied to the template and it is transformed. Now the transformed template is checked for a match in the database. Depending on the characteristics of the transformation function they are further divided into two types namely, salting and non-invertible transforms.

In salting the transformation function is invertible, that is , if the adversary is able to get hold of the key and the transformed template then they can get the original template. Therefore the security of the salting process depends on the protection of the key or the password used in the transformation, whereas in the case of Non-Invertible transforms the transformation function is a one-way process and it is computationally very hard to get back the original template from the transformed template even if the key is sacrificed.

Initially, Biometric cryptosystems were created in order to secure a cryptographic key using the biometric traits or creating cryptographic keys from the biometric templates. Further the same techniques were used to protect even the biometric templates. In biometric cryptosystems usually some public information regarding the template is being stored which is called the helper-data. Therefore Biometric cryptosystems are also called helper-data based methods. The helper data cannot be used to revoke back the original template or does not reveal any significant information about the original template but it is used during matching process to extract the cryptographic key from the query template. Here, matching is an indirect process which is done by verifying the correctness of the extracted cryptographic key.

Biometric cryptosystems are further classified into Key-Binding and Key-Generation approaches which depends on how the helper-data is obtained. When the helper data is obtained by binding a key ( that is independent of the biometric template ) to the original biometric template, then it is called Key Binding biometric cryptosystem. It should be noted that given only the helper data it is very difficult to obtain the original template. In a Key-Binding system, matching is done by recovering the key from the helper data along with the help of the biometric template. On the other hand, if the helper data is obtained only from the biometric template and even the cryptographic key is derived from the helper data and also the query biometric template then it is called Key-Generation Biometric Cryptosystem.

Both Biometric cryptosystems and template transformation systems have their own advantages and disadvantages. Templates that are being transformed can be easily revoked by changing the password or key. It is possible to design sophisticated matching algorithms and matchers that can handle intra-user variations in the transformer biometric template robustly, because of the fewer restrictions that are applied ion to the matching algorithms that can be used in the transformed domain. This also reduces the error rates of the biometric system. However it is difficult to measure the security of the template transformation techniques.

Biometric cryptosystems mostly depend on the error correcting codes. This helps in evaluating and analysing the security of the biometric cryptosystems in theoretic terms and it also restricts the use of sophisticated matching algorithms. One way to improve the matching performance is to extract invariant features and discriminative features from the biometric template in specific formats like fixed-length binary strings otherwise the matching performance is dependent only on the capability of the error correcting code. On the contrary,some biometric cryptosystems are exposed to correlation attacks,here auxiliary data is extracted from the same biometric trait and is matched with the original biometric template, this will affect the revocation capability.Some template protection schemes makes use of more than one basic approach. These systems are called Hybrid systems.

In this type of cryptosystem the biometric template is secured by binding it with a cryptographic key monolithically with a framework that is cryptographic. The biometric cryptosystems maintain helper data which does not reveal much information about the key or the biometric template and it makes computationally hard for decoding the key or the template without any knowledge about the user’s biometric trait or data. The helper data is a single entity that combines both the key and the biometric template

Usually the helper data is an association of the error correcting code which is selected using the key and the biometric template. Whenever a biometric query template within certain error tolerance comes,the codeword associated with a similar amount of error can be decoded in order to obtain the exact code and thereby recover the embedded cryptographic key. Now, recovery of the correct key implies a successful match during matching process.

This approach shows tolerance to intra-user variations in biometric data and this tolerance can be determined using the error correcting capability of the codeword associated.

Get a custom paper now from our expert writers.

Matching can only be done using error correcting schemes and this avoids sophisticated matchers which leads to the reduction in matching accuracy. The Biometric cryptosystems are not designed for diversity and revocability but further research is being done to introduce these two features into biometric cryptosystems especially by using them with other approaches like salting. The designing of the helper is tedious and should be done with utmost care as it is based on the specific biometric features used.

Image of Alex Wood
This essay was reviewed by
Alex Wood

Cite this Essay

The Two Types of Template Protection Schemes. (2018, December 11). GradesFixer. Retrieved December 8, 2024, from https://gradesfixer.com/free-essay-examples/the-two-types-of-template-protection-schemes/
“The Two Types of Template Protection Schemes.” GradesFixer, 11 Dec. 2018, gradesfixer.com/free-essay-examples/the-two-types-of-template-protection-schemes/
The Two Types of Template Protection Schemes. [online]. Available at: <https://gradesfixer.com/free-essay-examples/the-two-types-of-template-protection-schemes/> [Accessed 8 Dec. 2024].
The Two Types of Template Protection Schemes [Internet]. GradesFixer. 2018 Dec 11 [cited 2024 Dec 8]. Available from: https://gradesfixer.com/free-essay-examples/the-two-types-of-template-protection-schemes/
copy
Keep in mind: This sample was shared by another student.
  • 450+ experts on 30 subjects ready to help
  • Custom essay delivered in as few as 3 hours
Write my essay

Still can’t find what you need?

Browse our vast selection of original essay samples, each expertly formatted and styled

close

Where do you want us to send this sample?

    By clicking “Continue”, you agree to our terms of service and privacy policy.

    close

    Be careful. This essay is not unique

    This essay was donated by a student and is likely to have been used and submitted before

    Download this Sample

    Free samples may contain mistakes and not unique parts

    close

    Sorry, we could not paraphrase this essay. Our professional writers can rewrite it and get you a unique paper.

    close

    Thanks!

    Please check your inbox.

    We can write you a custom essay that will follow your exact instructions and meet the deadlines. Let's fix your grades together!

    clock-banner-side

    Get Your
    Personalized Essay in 3 Hours or Less!

    exit-popup-close
    We can help you get a better grade and deliver your task on time!
    • Instructions Followed To The Letter
    • Deadlines Met At Every Stage
    • Unique And Plagiarism Free
    Order your paper now