{"id":12076,"date":"2017-10-22T00:21:23","date_gmt":"2017-10-22T04:21:23","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=12076"},"modified":"2024-12-18T22:51:46","modified_gmt":"2024-12-19T03:51:46","slug":"template-and-database-security-in-biometrics-systems","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/template-and-database-security-in-biometrics-systems\/","title":{"rendered":"Template and Database Security in Biometrics Systems"},"content":{"rendered":"<p><em><strong>This guest post is submitted by Kyla Stewart<\/strong><\/em><\/p>\n<p><span style=\"font-weight: 400;\">Biometric systems have proven to be a convenient, reliable and robust solution to the long-running problem of identity management and user authentication. The technology has found application in everything from <\/span><span style=\"font-weight: 400;\">door locks<\/span><span style=\"font-weight: 400;\"> to banking. But as the pace of biometric system adoption <\/span><span style=\"font-weight: 400;\">accelerates each year<\/span><span style=\"font-weight: 400;\">, there are growing concerns about the privacy and security of this technology. User confidence in biometric technology will greatly hinge on the ability of deploying organizations to demonstrate that the systems have low risk of tampering and error.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Core Components of a Biometric System<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">A biometric system comprises at least 6 components\u2014sensor (scans biometric data of user), feature extractor (processes biometric information to extract feature set that distinguishes different users), template (the extracted feature set for each user), template database (the indexed repository for user templates), matcher (compares user template with biometric information captured to authenticate a new login session to ensure they match) and the decision module (makes the decision on whether the provided biometric information is a match and subsequently allows or denies access).<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Why Templates and Template Database Security is Key<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Of the six core components, the template and template database (<\/span><a href=\"https:\/\/www.dnsstuff.com\/database-management-system\"><span style=\"font-weight: 400;\">read more about Database Management System<\/span><\/a><span style=\"font-weight: 400;\">) are perhaps the most pivotal in ensuring the integrity of a biometric authentication system. That\u2019s because unlike tokens and passwords, a compromised template cannot be easily revoked then reissued.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The template is critical in ensuring the system maintains an extremely accurate recognition performance in the context of numerous and varied users. Ergo, a template protection mechanism with solid security and excellent recognition performance is crucial to ensuring that the proliferation of biometric systems into nearly every facet of life continues.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Types of Biometric Template Protection Schemes<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Here\u2019s a look at some of the most popular approaches to securing biometric system templates and template databases.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Salting<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Salting is also referred to as biohashing and is a protection method whereby biometric features are transformed through a function that\u2019s defined by a password or user-specific-key. Since the transformation in salting is invertible, the key must be either stored securely or recalled from memory by the user during authentication.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The additional information (a key in this case) increases the biometric template\u2019s entropy and makes it extremely difficult for an attacker to guess the template. The key reduces false accept rates. And because the key is specific to a user, multiple templates can be generated using different keys for the same user biometric. In the event that a template is compromised, the template can be revoked and replaced with a new one that uses a different key.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Salting has some drawbacks too though. If the key is compromised, the user template itself isn\u2019t secure thanks to the invertible transformation. An adversary can therefore use this as an avenue to recover the original template. Another disadvantage is that salting can degrade recognition performance where there are large intra-user variations since matching occurs in the transformed domain.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Non-Invertible Transform<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Like the name suggests, this type of protection entails securing the template by applying a transformation function to it that\u2019s non-invertible. Non-invertible means it\u2019s a one-way function that\u2019s easily computed but is statistically difficult to invert. The parameters of the function are based on a key that has to be available during authentication to change the query feature set.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The defining benefit of non-invertible transform is that even in instances where the transformed template and\/or key are exposed, it\u2019s hard (in brute force terms) for an adversary to reconstitute the original template. It therefore provides better security than salting. The transform also allows the realization of revocability and diversity using user-specific and application-specific transformation functions.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The main disadvantage of non-invertible transform is the trade-off between non-invertability and discriminability. It\u2019s difficult to design transformation functions that satisfy these two conditions at the same time i.e. makes it hard for an adversary to obtain the original or close approximation of the feature set and also preserves the discriminability of the feature set.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Key Binding<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Here, the template is secured by binding it with a key inside a cryptographic framework. A single object that embeds both template and key is stored as helper data in the database. The helper data doesn\u2019t divulge significant information about the template or the key thus making it hard to computationally decode the template or key without using the biometric data.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Often, helper data combines the biometric template and a key-derived error-correcting code. If a biometric input differs from the biometric template within a certain tolerance, the codeword for a similar error tolerance is recovered and decoded to retrieve the precise codeword and thus recover the embedded key. Key recovery implies successful matching.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Tolerance for intra-user variation is the primary advantage of key binding protection schemes. On the other hand, key binding may cause lower matching accuracy, is restricted in revocability and diversity, and requires that the helper data is meticulously designed.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Key Generation<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Direct key generation from biometric information seems like a natural, practical proposition. However, the intra-user variability is a major impediment. Early key generation cryptosystems relied on user-centered quantization. Quantization information is kept as helper data that\u2019s leverage during authentication to accommodate intra-user variation.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">More recently, key generation schemes adopted fuzzy extractor and secure sketch concepts. The fuzzy extractor generates a key from biometric features while the secure sketch is helper data that exposes only a tiny amount of information about the template. Nevertheless, key generation\u2019s main drawback is the difficulty in generating a cryptographic with high entropy and stability.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><span style=\"font-weight: 400;\">Note that you don\u2019t have to have just one type of template protection in a biometric system. It\u2019s possible and advisable to <\/span><a href=\"https:\/\/searchsecurity.techtarget.com\/definition\/defense-in-depth\"><span style=\"font-weight: 400;\">combine more than one approach<\/span><\/a><span style=\"font-weight: 400;\"> to create a hybrid scheme. That way, in the event that one mode of template protection succumbs to an adversary, they\u2019ll still be faced with the near impossibility of surmounting the rest as well.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This guest post is submitted by Kyla Stewart Biometric systems have proven to be a convenient, reliable and robust solution<\/p>\n","protected":false},"author":398,"featured_media":16595,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"database security in biometrics systems","_yoast_wpseo_title":"Template and Database Security in Biometrics Systems","_yoast_wpseo_metadesc":"Biometric systems have proven to be a convenient, reliable and robust solution to the long-running problem of identity management and user authentication.","_lmt_disableupdate":"no","_lmt_disable":"no","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[90],"tags":[],"class_list":["post-12076","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guest-blog-posts"],"acf":{"_how_to_content":null,"_faq_content":null,"_structured_meta_data":null,"_tl_dr_content":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Template and Database Security in Biometrics Systems<\/title>\n<meta name=\"description\" content=\"Biometric systems have proven to be a convenient, reliable and robust solution to the long-running problem of identity management and user authentication.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/template-and-database-security-in-biometrics-systems\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Template and Database Security in Biometrics Systems\" \/>\n<meta property=\"og:description\" content=\"Biometric systems have proven to be a convenient, reliable and robust solution to the long-running problem of identity management and user authentication.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/template-and-database-security-in-biometrics-systems\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2017-10-22T04:21:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-19T03:51:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/10\/womans-eye-with-smart-contact-lens-futuristic-tech-WJ3HPDV_800x455.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"455\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Guest\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@m2sys\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Guest\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/template-and-database-security-in-biometrics-systems\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/template-and-database-security-in-biometrics-systems\/\"},\"author\":{\"name\":\"Guest\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/3ba5457baaa8ae1faa7e086cfbe4acf0\"},\"headline\":\"Template and Database Security in Biometrics Systems\",\"datePublished\":\"2017-10-22T04:21:23+00:00\",\"dateModified\":\"2024-12-19T03:51:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/template-and-database-security-in-biometrics-systems\/\"},\"wordCount\":1006,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"articleSection\":[\"Guest Blog Posts\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/template-and-database-security-in-biometrics-systems\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/template-and-database-security-in-biometrics-systems\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/template-and-database-security-in-biometrics-systems\/\",\"name\":\"Template and Database Security in Biometrics Systems\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2017-10-22T04:21:23+00:00\",\"dateModified\":\"2024-12-19T03:51:46+00:00\",\"description\":\"Biometric systems have proven to be a convenient, reliable and robust solution to the long-running problem of identity management and user authentication.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/template-and-database-security-in-biometrics-systems\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/template-and-database-security-in-biometrics-systems\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/template-and-database-security-in-biometrics-systems\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Template and Database Security in Biometrics Systems\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/3ba5457baaa8ae1faa7e086cfbe4acf0\",\"name\":\"Guest\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g\",\"caption\":\"Guest\"},\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/guest\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Template and Database Security in Biometrics Systems","description":"Biometric systems have proven to be a convenient, reliable and robust solution to the long-running problem of identity management and user authentication.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/template-and-database-security-in-biometrics-systems\/","og_locale":"en_US","og_type":"article","og_title":"Template and Database Security in Biometrics Systems","og_description":"Biometric systems have proven to be a convenient, reliable and robust solution to the long-running problem of identity management and user authentication.","og_url":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/template-and-database-security-in-biometrics-systems\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_published_time":"2017-10-22T04:21:23+00:00","article_modified_time":"2024-12-19T03:51:46+00:00","og_image":[{"width":800,"height":455,"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/10\/womans-eye-with-smart-contact-lens-futuristic-tech-WJ3HPDV_800x455.jpg","type":"image\/jpeg"}],"author":"Guest","twitter_card":"summary_large_image","twitter_creator":"@m2sys","twitter_site":"@m2sys","twitter_misc":{"Written by":"Guest","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/template-and-database-security-in-biometrics-systems\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/template-and-database-security-in-biometrics-systems\/"},"author":{"name":"Guest","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/3ba5457baaa8ae1faa7e086cfbe4acf0"},"headline":"Template and Database Security in Biometrics Systems","datePublished":"2017-10-22T04:21:23+00:00","dateModified":"2024-12-19T03:51:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/template-and-database-security-in-biometrics-systems\/"},"wordCount":1006,"commentCount":0,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"articleSection":["Guest Blog Posts"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/template-and-database-security-in-biometrics-systems\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/template-and-database-security-in-biometrics-systems\/","url":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/template-and-database-security-in-biometrics-systems\/","name":"Template and Database Security in Biometrics Systems","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2017-10-22T04:21:23+00:00","dateModified":"2024-12-19T03:51:46+00:00","description":"Biometric systems have proven to be a convenient, reliable and robust solution to the long-running problem of identity management and user authentication.","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/template-and-database-security-in-biometrics-systems\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/template-and-database-security-in-biometrics-systems\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/template-and-database-security-in-biometrics-systems\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Template and Database Security in Biometrics Systems"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/3ba5457baaa8ae1faa7e086cfbe4acf0","name":"Guest","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g","caption":"Guest"},"url":"https:\/\/www.m2sys.com\/blog\/author\/guest\/"}]}},"modified_by":"Stanly Palma","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/12076"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/398"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=12076"}],"version-history":[{"count":5,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/12076\/revisions"}],"predecessor-version":[{"id":16596,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/12076\/revisions\/16596"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media\/16595"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=12076"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=12076"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=12076"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}