• Home
  • About
  • My Account
  • Blog
  • Success Stories
  • Contact
Bayometric Bayometric Bayometric Bayometric
  • Live Scan
    • Print to FD-258 Card – Background Check
    • SWFT Applicant System
    • FBI Fingerprinting – Live Scan
    • NFA Fingerprinting – Live Scan
    • FINRA EFS
    • FDLE Live Scan
    • Fingerprint Background Check
    • SWFT+ Compatible Devices
  • Fingerprint SDK
    • Touch N Go
    • Griaule Fingerprint SDK
  • Single Sign-On
  • Fingerprint Scanner
    • USB Scanners
      • SecuGen Hamster Pro
      • SecuGen Hamster Plus (HSDU03P)
      • Nitgen Fingkey Hamster DX
      • Lumidigm M301 (M30x)
      • Lumidigm M311 (M31x)
      • Lumidigm V302 (V30x)
      • Lumidigm V311 (V31x)
      • Nitgen Fingkey Hamster II
      • Nitgen Fingkey Hamster III
      • Verifi P5100
      • IB Curve
    • FBI Certified Readers
      • SecuGen Hamster Pro 10
      • SecuGen Hamster Pro 20 (HU20)
      • SecuGen Hamster IV (HSDU04P)
      • Unity 20 Bluetooth
      • Integrated Biometrics Watson Mini
      • Integrated Biometrics Columbo
      • Suprema BioMini Plus 2
      • Suprema RealScan-G1
      • Suprema BioMini Slim 2
      • Suprema BioMini Slim 2S
    • Ten Print Scanners
      • Integrated Biometrics Kojak
      • Suprema RealScan G10
      • Integrated Biometrics FIVE-0
    • Dual / Two Print Scanners
      • Suprema RealScan-D
      • Integrated Biometrics Sherlock
      • Integrated Biometrics Watson Mini
      • Nitgen eNBioScan-D Plus
    • Scanners + Card Readers
      • SecuGen iD-Serial
      • SecuGen iD-USB SC/PIV
      • SecuGen ID USB SC
      • Hamster Pro Duo CL
      • Hamster Pro Duo SC/PIV
      • Suprema BioMini Combo
    • OEM Modules
      • SecuGen SDU03P
      • SecuGen SDU04P
      • Lumidigm M300 (M30x)
      • Lumidigm M310 (M31x)
      • Lumidigm V300 (V30x)
      • Lumidigm V310 (V31x)
  • NFA Fingerprinting
Bayometric Bayometric
  • Live Scan
    • Print to FD-258 Card – Background Check
    • SWFT Applicant System
    • FBI Fingerprinting – Live Scan
    • NFA Fingerprinting – Live Scan
    • FINRA EFS
    • FDLE Live Scan
    • Fingerprint Background Check
    • SWFT+ Compatible Devices
  • Fingerprint SDK
    • Touch N Go
    • Griaule Fingerprint SDK
  • Single Sign-On
  • Fingerprint Scanner
    • USB Scanners
      • SecuGen Hamster Pro
      • SecuGen Hamster Plus (HSDU03P)
      • Nitgen Fingkey Hamster DX
      • Lumidigm M301 (M30x)
      • Lumidigm M311 (M31x)
      • Lumidigm V302 (V30x)
      • Lumidigm V311 (V31x)
      • Nitgen Fingkey Hamster II
      • Nitgen Fingkey Hamster III
      • Verifi P5100
      • IB Curve
    • FBI Certified Readers
      • SecuGen Hamster Pro 10
      • SecuGen Hamster Pro 20 (HU20)
      • SecuGen Hamster IV (HSDU04P)
      • Unity 20 Bluetooth
      • Integrated Biometrics Watson Mini
      • Integrated Biometrics Columbo
      • Suprema BioMini Plus 2
      • Suprema RealScan-G1
      • Suprema BioMini Slim 2
      • Suprema BioMini Slim 2S
    • Ten Print Scanners
      • Integrated Biometrics Kojak
      • Suprema RealScan G10
      • Integrated Biometrics FIVE-0
    • Dual / Two Print Scanners
      • Suprema RealScan-D
      • Integrated Biometrics Sherlock
      • Integrated Biometrics Watson Mini
      • Nitgen eNBioScan-D Plus
    • Scanners + Card Readers
      • SecuGen iD-Serial
      • SecuGen iD-USB SC/PIV
      • SecuGen ID USB SC
      • Hamster Pro Duo CL
      • Hamster Pro Duo SC/PIV
      • Suprema BioMini Combo
    • OEM Modules
      • SecuGen SDU03P
      • SecuGen SDU04P
      • Lumidigm M300 (M30x)
      • Lumidigm M310 (M31x)
      • Lumidigm V300 (V30x)
      • Lumidigm V310 (V31x)
  • NFA Fingerprinting
Aug 22

What is a biometric template? Is it secure?

  • Danny Thakkar
  • Biometric Data Security, Biometric Terminology

What is a biometric template?

A biometric sample is the data that is obtained by a biometric system’s capture device. This biometric sample is collected during enrollment and it is the first time when an individual uses the biometric system. This data could be an image (or multiple images) of the shape of the individual’s hand to his finger, iris or retina, or a recording of his voice. This data then becomes a master-profile from which the unique features of the individual’s hand, finger, iris or voice are extracted, analysed and then converted into a mathematical file. These mathematical files come to be known as the biometric templates and not the images or the voice recording that were originally captured and stored.

So, a biometric template is a digital representation of the unique features that have been extracted from a biometric sample and is stored in a biometric database. These templates are then used in the biometric authentication and identification process.

Biometric systems – Components and security

Biometric systems are preferred to other traditional access control methods due to a variety of factors. These factors include universality, uniqueness, permanence, reliability and so forth. However, biometric systems are not full-proof and have their vulnerabilities. To avoid any possible security breaches, we need to understand how a biometric system works, the vulnerabilities at each stage and identify possible solutions.

Biometric SystemFigure: Sample diagram of a biometric system

The biometric sensor scans the user’s biometric data. The second block performs some pre-processing, if required to enhance the quality of the captured biometric trait. The third module is very important as the salient features need to be extracted in the most optimal manner from the scanned biometric data. From this, the template is created which can be a vector of numbers or an image with particular properties and stored in the templates database. This is known as the enrollment phase where the biometric trait is captured and stored in the templates database.

The template database may contain a millions records and could be geographically distributed. Maintaining the security of the templates database is crucial if the biometric system is to be robust.

How do biometric templates work?

Biometric templates are used by biometric systems in the matching phase:

Biometric verification or authentication

In verification or authentication mode, the biometric system performs a one-to-one comparison of the captured biometric trait with the specific template stored in the biometric database to ascertain the correct individual. If the biometric sample matches with the template, it means the individual is the person who they claim to be. A common use of the verification mode is positive recognition which prevents multiple persons from using the same identity.

Biometric identification

In identification mode, the biometric system performs a one-to-many comparison against a biometric database in order to establish the identity of an unknown individual. Identification mode can be used either for positive recognition or negative recognition. In positive recognition, the user need not provide any information about the template to be used. In negative recognition, the system establishes whether the person is who he/she denies to be.

How secure are biometric templates?

Maintaining the security of the biometric templates is of utmost importance as any attack on the biometric templates can lead to a failure of the biometric system.

So what happens if a user’s biometric template gets stolen or hacked into? From a general standpoint, the hacker cannot do much with a series of zeroes and ones or a probability curve. It’s not straightforward as stealing a user’s credit card.

Also, biometric device vendors use one-way encoding of biometric data in their devices. This means the template cannot be used to reconstruct the original biometric pattern.

Biometric templates are more secure than other traditional authentication systems, such as the token –based and knowledge-based systems. However, at a deeper technical level, biometric templates, just like any other technology, are also prone to failures and hacking.

The vulnerabilities of biometric templates are listed below:
  1. A template can be replaced by an impostor’s template.
  2. A physical spoof can be created from the original template.
  3. The stolen template can be relayed to the matching module to gain unauthorized access to the system.
  4. If not properly secured, biometric templates can be used by adversaries to cross-match across different databases to covertly track a person without their consent.

How to secure biometric templates?

The major challenge in designing a biometric protection scheme is that it should be able to handle intrauser variability in the acquired biometric identifiers.

A robust biometric template protection scheme which is capable of handling intrauser variability should ideally have the following four properties.

Properties of secured biometric templates

Diversity

A stolen fingerprint template from a bank’s database can be used to search a criminal database or cross-link to a user’s health records. To stop such unauthorized access, secure biometric templates should not allow cross-matching across databases. Hence user’s privacy is protected.

Revocability

If a biometric template gets compromised, it should be straightforward to revoke the template and generate a new one based on the same biometric trait.

Security

The biometric template protection scheme should use one-way encoding for the biometric data thus making it computationally difficult to reconstruct the biometric pattern from a stolen template. This will also prevent a hacker from creating a physical spoof of the biometric trait.

Performance

The performance of the biometric system should not get degraded due to the biometric template protection scheme.

Biometric template protection techniques

Let us look at the different biometric template protection techniques to prevent adversary attacks on biometric templates. The diagram given below shows the different categories of Biometric Template Protection schemes.

Biometric TemplateFigure: Categories of biometric template protection schemes

Biometric template protection schemes are broadly classified into two categories – Feature Transformation Approach and Biometric Cryptosystem

Feature transformation approach

In the feature transformation approach, the acquired biometric template is transformed using a transformation function and only the transformed template is stored in the database. The same transformation function will also be used to transform the query and then will be matched against the transformed template in the database. The parameters of the transformation function are usually derived from a random key or password.

The feature transformation approach is further sub-divided into two categories, depending on the characteristics of the transformation function – Bio-hashing or salting and Noninvertible transform. In salting, the transformation function is invertible which means the original template can be restored if one can gain access to the key and the transformed template. Hence, the security of the salting scheme is dependent on the key or password.

On the other hand, noninvertible transformation as the name suggests is not invertible. It is a one-way function which makes it computationally difficult to invert a transformed template to the original template even if the key is known.

Biometric cryptosystem

In this template protection scheme, helper data is stored. Helper data is some public information about the biometric template and does not reveal any significant information about the stored template. Biometric cryptosystems are also known as helper data protection methods. The helper data is required to extract a cryptographic key from the query biometric template and then matching is performed indirectly by verifying the validity of the extracted cryptographic key. Error coding techniques will be typically used to handle the intrauser variations.

Depending on how the helper data is obtained, biometric cryptosystems are further classified into two categories: key binding and key generation systems. In key binding biometric cryptosystem, the helper data is obtained by binding a key with the biometric template. It is difficult to obtain either the key or the original template using only the helper data. Hence, security of stored templates is maintained. In a key generation biometric cryptosystem, the helper data is derived only from the biometric template and the key is generated from the helper data and the query biometric features.

When one or more template protection approaches are used, it is known as hybrid template protection scheme.

Let us look at each of the template protection schemes in further detail and their advantages that make biometric templates extremely secure and robust.

Salting or bio-hashing

In salting or biohashing, the features from a biometric template are transformed using a transformation function defined by a cryptographic key or password. This key or password is specified by the user. This key needs to be securely stored and remembered by the user for future authentication. This additional requirement of remembering the key increases the entropy of the biometric template and makes it difficult for the hacker to reconstruct the original template.

The advantage to using a key results in lower false acceptance rates. Also, since the key is user-specific multiple templates can be generated for the same user by using different keys. If a template gets stolen, a new template can be generated easily by using a different user-specific key and the compromised template can be revoked.

Noninvertible transform

In noninvertible transform, a one-way function is used to secure the biometric template. This one-way function is easy to compute but very hard to invert. The parameters of the transformation function are defined by a key and it must be present at the time of authentication. With this approach, the hacker cannot recover the original template even if he has the stolen key and the transformed template because it is computationally difficult.

The noninvertible transform protection scheme provides better security as compared to the salting approach, since the original template cannot be recovered even when the key is compromised. Diversity and revocability can be achieved by using application-specific and user-specific transformations respectively.

Noninvertible transformation functions leave the biometric template in the original space even after the transformation. In this approach, intrauser variations are handled by applying the same biometric matcher on the transformed features as on the original feature set. Templates that lie in the same feature space even after the application of a transformation function are referred to as cancellable templates. Three noninvertible transformation functions can be used to generate cancellable fingerprint templates – Cartesian, poplar and functional. These functions can be used to transform fingerprint minutiae data such that a minutiae matcher can still be applied to the transformed minutiae. In Cartesian transformation, the fingerprint image is projected as a rectangular grid and each cell is shifted to a new position in the grid corresponding to the translations set by the key. The poplar transformation is similar to Cartesian transformation except that the image is now tessellated into a number of shells and each shell is divided into sectors. These sectors can be varying in size and restrictions are placed on the translation vector generated from the key so that the radial distance of the transformed sector is not very different than the radial distance of the original position.

In all the three transforms, it is quite possible that two or more minutiae can map to the same point in the transformed domain. In the Cartesian transformation, two or more cells can be mapped onto a single cell. The upside to this is even if an adversary knows the key and hence the transformation between cells, he still cannot figure out the original cell to which a minutia belongs. So the transform becomes noninvertible and deters hackers.

Key-binding biometric cryptosystem

In this template protection scheme, the biometric template is secured by binding it with a cryptographic key. This is then stored as a single entity in the templates database as helper data. This helper data is usually a combination of an error correcting code and the biometric template. This helper data does not reveal much information about the key or the template and it is computationally infeasible to decode the key or the biometric template without knowing the user’s biometric data.

The advantage of this approach is that it is tolerant to intrauser variations in biometric data.

Key generating biometric cryptosystem

In this approach, the cryptographic key is derived directly from the biometric data. There are two key generation techniques – secure sketches and fuzzy extractors. The secure sketch is helper data that provides some information about the biometric template which is sufficient enough to exactly reconstruct the template when presented with a query that is close to the template. The fuzzy extractor generates a cryptographic key from the biometric features. The idea of directly generating cryptographic key from biometrics seems a very appealing template protection technique and can also be very useful in cryptographic applications.

Conclusion

We have discussed different biometric template protection schemes in detail and explained the robustness of these techniques. Usually, hackers target biometric templates when attacking a biometric system. Securing biometric templates is critically important to the success of a biometric system and the approaches discussed above are excellent template protection schemes. This template protection schemes make it extremely difficult for hackers to afflict the biometric templates.

  • Facebook
  • Twitter
  • Reddit
  • Pinterest
  • Google+
  • LinkedIn
  • E-Mail

About The Author

Mary Clark is Product Manager at Bayometric, one of the leading biometric solution providers in the world. She has been in the Biometric Industry for 10+ years and has extensive experience across public and private sector verticals.

Comments are closed.

Have any questions? We will be happy to answer.

Sidebar Contact

Shop online for high quality fingerprint readers

Hamster Pro 20

hamster pro 20
Buy Online

Unity 20 Bluetooth

unity 20 bluetooth
Buy Online

Hamster Plus

hamster plus
Buy Online

Columbo

columbo
Buy Online

Fingerprint applications we offer

Fingerprint SDK

Simple and Intuitive API, NO biometrics programming experience required. Get sample code in C++, C#, VB, Java etc.
Take a Tour

Live Scan

Live scan fingerprinting allows quick and cost effective background checks of individuals.
Take a Tour

Computer Logon

Logon to Windows, Domain, Websites and Applications using fingerprints & create a ”password free” environment.
Take a Tour

Search the Blog

Categories

  • Access Control
  • Archive
  • Automotive Biometrics
  • Background Check
  • Big Data
  • Biometric ATMs
  • Biometric Authentication
  • Biometric Data Security
  • Biometric Device
  • Biometric Identification
  • Biometric Immigration
  • Biometric National ID
  • Biometric News
  • Biometric Passport
  • Biometric Payment
  • Biometric Research
  • Biometric Screening
  • Biometric Security
  • Biometric Spoofing
  • Biometric System
  • Biometric Technology
  • Biometric Terminology
  • Biometrics as a Service
  • Biometrics Comparison
  • Biometrics Examples
  • Biometrics in Banking
  • Biometrics in Education
  • Biometrics in School
  • Border Control
  • BYOD
  • Cloud Communication
  • Cloud-based Biometrics
  • Covid 19
  • Cyber Security
  • Facial Recognition
  • Finger Vein Recognition
  • Fingerprint Attendance
  • Fingerprint Door Lock
  • Fingerprint Recognition
  • Fingerprint Scanner App
  • Fingerprint scanners
  • Fingerprint SDK
  • Fingerprint with Phone
  • Future of Biometrics
  • Guest Blog
  • Hand Geometry
  • Healthcare Biometrics
  • Home Security
  • Hospitality Industry
  • Integration Guideline
  • Internet of Things
  • Iris Recognition
  • Law Enforcement
  • Live Scan Fingerprinting
  • Mass Surveillance
  • Membership Management
  • Multi-factor Authentication
  • Multimodal Biometrics
  • Network Security
  • NFA Fingerprinting
  • Palm Vein Recognition
  • Patient Identification
  • Privacy
  • Public Safety
  • Retail POS
  • Retinal Scan
  • SecuGen RD Service
  • Secure Data Center
  • Signature Verification
  • Single Sign On
  • Smart Card
  • Time and Attendance
  • Two-factor Authentication
  • Vascular Biometrics
  • Visitor Management
  • Voice Authentication
  • Voter Registration
  • Windows Biometrics
  • Workforce Management

About Bayometric

Bayometric is a leading global provider of biometric security systems offering core fingerprint identification solutions. Learn more

Products We Offer

  • Touch N Go
  • Single Sign-On
  • Biometric Access Control
  • Biometric Security Devices
  • Fingerprint Scanners
  • FBI Certified Readers
  • Live Scan Systems
  • OEM Modules

Contact Us

Footer Contact
Sending

Recent from Blog

  • ATF Final Rule (2021R-08F) – Attached Stabilizing Braces January 30, 2023
  • Can Live Scan Detect Masked Fingerprints? January 5, 2023
  • Who Needs Live Scan in California? December 23, 2022
© 2007 - 2022 by Bayometric | All Rights Reserved.
  • Best Seller
  • Cart
  • Checkout
  • Policies
  • Industries
  • Knowledge Base
  • Sitemap