Wang Huiyong, Tang Shijie, Ding Yong, Wang Yujue, Li Jiahui. Survey on Biometrics Template Protection[J]. Journal of Computer Research and Development, 2020, 57(5): 1003-1021. DOI: 10.7544/issn1000-1239.2020.20190371
Citation:
Wang Huiyong, Tang Shijie, Ding Yong, Wang Yujue, Li Jiahui. Survey on Biometrics Template Protection[J]. Journal of Computer Research and Development, 2020, 57(5): 1003-1021. DOI: 10.7544/issn1000-1239.2020.20190371
Wang Huiyong, Tang Shijie, Ding Yong, Wang Yujue, Li Jiahui. Survey on Biometrics Template Protection[J]. Journal of Computer Research and Development, 2020, 57(5): 1003-1021. DOI: 10.7544/issn1000-1239.2020.20190371
Citation:
Wang Huiyong, Tang Shijie, Ding Yong, Wang Yujue, Li Jiahui. Survey on Biometrics Template Protection[J]. Journal of Computer Research and Development, 2020, 57(5): 1003-1021. DOI: 10.7544/issn1000-1239.2020.20190371
1( School of Mathematics & Computing Science, Guilin University of Electronic Technology, Guilin, Guangxi 541004)
2( School of Electronic Engineering & Automation, Guilin University of Electronic Technology, Guilin, Guangxi 541004)
3( School of Computer Science & Information Security, Guilin University of Electronic Technology, Guilin, Guangxi 541004)
4( Guangxi Key Laboratory of Cryptography and Information Security(Guilin University of Electronic Technology), Guilin, Guangxi 541004)
Funds: This work was supported by the National Natural Science Foundation of China (61772150, 61862012, 61802083, 61962012), the Natural Science Foundation of Guangxi Autonomous Region of China (2018GXNSFDA281054, 2018GXNSFAA281232), the Guangxi Key Research and Development Program (AB17195025), and the Open Project of Guangxi Key Laboratory of Cryptography and Information Security (GCIS201622, GCIS201702).
Biometric authentication (BA) has become an important means of identity authentication. However, many BA systems deployed at present do not take enough consideration in protecting the security and privacy of users biometric data, which has become a main obstacle to the popularization and application of the BA technology. BA systems may face various attacks from software or hardware implementations, among which, template attack is the main consideration. Many technical literatures have been devoted to dealing with this type of attacks. However, existing review literatures suffer from incomplete descriptions or conflicting discussions. In order to systematically summarize the attacking and protection technologies against biometric templates, some related concepts of the BA system is introduced at first, as well as the architecture of a BA system and the connotation of BA security and privacy. Then, template protection technologies for a BA system are classified into two main categories for description: the transformation-based methods and the crypto-based methods, which solves some conflictions in existing literatures. Afterwards, some classical methods and emerging technologies in each category are expounded and analyzed, as well as some subsequent evaluations and improvements. Finally, several major difficulties and the corresponding possible solutions for building a secure BA system are pointed out.