1 Scope
2 References
3 Definitions
3.1 Terms defined
elsewhere
3.2 Terms defined in this
Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Overview of protection
techniques for the biometric template on telecommunication systems
6.1 Biometric cryptosystem mechanism
6.2 Cancellable biometrics
mechanism
7 Reference models of protection
techniques for a biometric template
7.1 Reference model of a
biometric cryptosystem mechanism
7.2 Reference model for a
cancellable biometrics mechanism
7.3 Specific threats for
reference models
8 Evaluation items for biometric
template protection techniques
8.1 Introduction
8.2 Evaluation items for
the biometric cryptosystem mechanism
8.3 Interdependent
evaluation items for the biometric cryptosystem mechanism
8.4 Evaluation items for
the cancellable biometrics mechanism
8.5 Interdependent
evaluation items for the cancellable biometrics mechanism
9 Evaluation steps of protection
techniques for the biometric template
9.1 General
10 Requirements and procedures of
protection performance testing
10.1 General
10.2 Biometric cryptosystem
10.3 Cancellable biometrics
Appendix I – Algorithm list of template protection
techniques
Appendix II – Evaluation example for a biometric cryptosystem
mechanism using a fuzzy vault scheme
II.1 System description
(Step 1)
II.2 Vendor claim (Step 2)
II.3 Examination of vendor
claim (Step 3)
II.4 Vendor test and evaluation
of vendor test
Appendix III – Evaluation example for cancellable biometrics
using correlation-based matching
III.1 Introduction
III.2 Clarification of
evaluation requirements
III.3 Requirements of
evaluation tool
III.4 Evaluation experiment
Bibliography