Table of Contents

 1     Scope          
 2     References               
 3     Definitions 
        3.1     Terms defined elsewhere        
        3.2     Terms defined in this Recommendation            
 4     Abbreviations and acronyms             
 5     Conventions             
 6     Overview of protection techniques for the biometric template on telecommunication systems        
        6.1     Biometric cryptosystem mechanism    
        6.2     Cancellable biometrics mechanism      
 7     Reference models of protection techniques for a biometric template            
        7.1     Reference model of a biometric cryptosystem mechanism       
        7.2     Reference model for a cancellable biometrics mechanism        
        7.3     Specific threats for reference models 
 8     Evaluation items for biometric template protection techniques        
        8.1     Introduction   
        8.2     Evaluation items for the biometric cryptosystem mechanism  
        8.3     Interdependent evaluation items for the biometric cryptosystem mechanism
        8.4     Evaluation items for the cancellable biometrics mechanism      
        8.5     Interdependent evaluation items for the cancellable biometrics mechanism   
 9     Evaluation steps of protection techniques for the biometric template           
        9.1     General            
10     Requirements and procedures of protection performance testing 
       10.1     General          
       10.2     Biometric cryptosystem           
       10.3     Cancellable biometrics             
Appendix I – Algorithm list of template protection techniques    
Appendix II – Evaluation example for a biometric cryptosystem mechanism  using a fuzzy vault scheme    
       II.1     System description (Step 1)     
       II.2     Vendor claim (Step 2) 
       II.3     Examination of vendor claim (Step 3)  
       II.4     Vendor test and evaluation of vendor test       
Appendix III – Evaluation example for cancellable biometrics using correlation-based matching    
      III.1     Introduction   
      III.2     Clarification of evaluation requirements            
      III.3     Requirements of evaluation tool           
      III.4     Evaluation experiment