MODIFIED BIOMETRIC TEMPLATE PROTECTION METHOD WITH NONLINEAR TRANSFORMATIONS
DOI:
https://doi.org/10.15588/1607-3274-2026-1-16Keywords:
biometrics, biometric template, biometric template protection, one-way transformation, biohashing, elliptic curve cryptography, finite fieldsAbstract
Context. Biometric data is a common option for authentication or identification. However, it is vulnerable and not replaceable in case of stealing. Several methods for constructing protected biometric templates are proposed in literature, one of them is biohashing. However, linearity of biohashing may be a vulnerability. MLP-hash is similar, but adds nonlinearity. It is modified in this work.
Objective. The goal of this work is to develop a modification of MLP-hash which is faster and allows better separation of users by their templates.
Method. This work focuses on modifying MLP-hash, a biohashing variation with nonlinear transformations. One of the proposed changes is the usage of normalization before applying nonlinear transformation in each layer of MLP-hash. Different normalization methods are investigated and compared. The other proposed change is the simplification of the pseudorandom matrices used in each layer of MLP-hash. Each such matrix is replaced by a block matrix in which blocks that are laying on the diagonal are orthonormal matrices and all other blocks are filled with zeros. Each nonzero block is generated from the user’s secret token. In order to make the effect of each nonzero block less localized, a pseudorandom permutation is added before each matrix multiplication and also after all layers. Pseudorandom permutations are also generated with the user’s secret token as seed. The proposed method can be used in a similar way to how original MLP-hash and biohashing methods are used: it takes the user’s secret token and biometric vector of fixed length and outputs a binary vector of fixed length with the same or smaller dimensionality. MLP-hash with block matrices is compared to the original while applying different normalization techniques and different nonlinear transformations.
Results. The proposed modifications, original MLP-hash and biohashing have been implemented in code. Speed and accuracy of user separation with the usage of these methods have been compared on feature vectors extracted from fingerprints with the usage of Gabor filters.
Conclusions. The conducted experiments have shown an increase of speed and ability to separate user templates from the substitution of proposed block matrices and an increase of ability to separate user templates from the usage of normalization.
Comparison of different normalizations and nonlinear transformation has also been conducted. The practical usefulness of the developed method is that it is faster and can be used in applications when users expect no delays while still being difficult to invert. The prospects for further research include testing this method with other biometric modalities, other nonlinear transformations and normalization techniques and an analysis of inversion difficulty of the developed method in comparison to MLP-hash and biohashing.
References
Maltoni D., Maio D., Jain A. K., Prabhakar S. Handbook of Fingerprint Recognition (2nd. ed.). London, Springer, 2009, 494 p. DOI: 10.1007/978-1-84882-254-2
Teoh A., Ngo D., Goh A. Biohashing: two factor authentication featuring fingerprint data and tokenised random number, Pattern Recognition, 2004, Vol. 37, Issue 11, pp. 2245–2255. DOI: 10.1016/j.patcog.2004.04.011
Baier H., Breitinger F., Busch C., Rathgeb C. On application of bloom filters to iris biometrics, IET Biometrics, 2014, Vol. 3, Issue 4, pp. 207–218. DOI: 10.1049/iet-bmt.2013.0049
Jin Z., Hwang J. Y., Lai Y., Kim S., Teoh A. RankingBased Locality Sensitive Hashing-Enabled Cancelable Biometrics: Index-of-Max Hashing, IEEE Transactions on Information Forensics and Security, 2018, Vol. 13, Issue 2, pp. 393–407. DOI: 10.1109/TIFS.2017.2753172
Lumini A. and Nanni L. An improved BioHashing for human authentication, Pattern Recognition, 2007, Vol. 40, Issue 3, pp. 1057–1065. DOI: 10.1016/j.patcog.2006.05.030
Durbet A., Grollemund P., Lafourcade P., Migdal D., Thiry-Atighehchi K. Authentication Attacks on Projection-based Cancelable Biometric Schemes, International Conference on Security and Cryptography (SECRYPT) : 19th International Conference, Lisbon, 11–13 July, 2022 : proceedings. SCITEPRESS Digital Library, 2022, pp. 568–573. DOI: 10.5220/0011277100003283
Otroshi H. S. and Krivokuća V. H. and Marcel S. MLPHash: Protecting Face Templates via Hashing of Randomized Multi-Layer Perceptron, European Signal Processing Conference (EUSIPCO) : 31st European Conference, Helsinki, 4–8 September, 2023 : proceedings. – Helsinki, IEEE, 2023, pp. 605–609. DOI: 10.23919/EUSIPCO58844.2023.10289780
Maio D., Maltoni D., Cappelli R., Wayman J., Jain A. K. FVC2000: Fingerprint verification competition, Pattern Analysis and Machine Intelligence, 2002, Vol. 24, Issue 3, pp. 402–412. DOI: 10.1109/34.990140
Jain A. K., Prabhakar S., Hong L., Pankanti S. Filterbank-based fingerprint matching, IEEE transactions on image processing, 2000, Vol. 9, Issue 5, pp. 846–859. DOI: 10.1109/83.841531
Kawagoe M., Tojo A.Fingerprint pattern classification, Pattern Recognition, 1984, Vol. 17, Issue 3, pp. 295–303. DOI: 10.1016/0031-3203(84)90079-7
Duda R. O., Hart P. E. Pattern classification and scene analysis. New York, Wiley, 1978, 512 p
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 M. V. Onai, O. V. Kosenko

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Creative Commons Licensing Notifications in the Copyright Notices
The journal allows the authors to hold the copyright without restrictions and to retain publishing rights without restrictions.
The journal allows readers to read, download, copy, distribute, print, search, or link to the full texts of its articles.
The journal allows to reuse and remixing of its content, in accordance with a Creative Commons license СС BY -SA.
Authors who publish with this journal agree to the following terms:
-
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License CC BY-SA that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
-
Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
-
Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) as it can lead to productive exchanges, as well as earlier and greater citation of published work.