TrUsted Revocable Biometric IdeNtitiEs

go to FP7 - ICT go to Europa.euThe TURBINE research project has received funding from the European Community's
7th Framework Programme (FP7/2007-2013) under grant agreement n° ICT-2007-216339


The overall objectives of TURBINE are:

  • To develop an innovative, privacy enhancing technology solution for electronic identity (eID) authentication through fingerprints biometrics, and
  • To demonstrate the performance and security of this solution for use in commercial eID management applications as well as its benefit for the citizen in terms of enhanced privacy protection and user trust in electronic identity management through the use of fingerprints.

The TURBINE technology will protect the biometric template by cryptographic transformation of the fingerprint information into a non-invertible key that allows matching by bit-to-bit comparison. To enhance user trust, this key will also be revocable, i.e. a new independent key can be generated using the same fingerprint.

The consortium has defined a series of strategic objectives to be achieved in the scope of the TURBINE project:

  • Application of cryptographic techniques to fingerprint biometrics to obtain a non-invertible and protected pseudo-identity bit-string for enrolment and subsequent verification
  • Multiple re-generation of independent unique bit-strings based on the same fingerprint
  • Revocable and multiple pseudo-identity management scheme based on these unique bit-strings
  • Highly reliable biometric fingerprint 1:1 secure verifications using these unique bit-strings
  • Multi-vendor interoperability of these unique bit-strings
  • Detailed verification performance analysis, evaluated against very large public and private fingerprint databases
  • Comprehensive risk analysis and system security
  • Contribution to developing international standards for biometric template protection.

These contribute to additional objectives which are:

  • The assessment of the legal framework for the use of revocable personal information,
  • The evaluation of the accuracy, reliability and convenience for verification purposes,
  • A multi-sourcing ID management system through interoperable and standardised mechanisms.
  • A robust approach through compact size templates and trust application dependency.