Definition
Biometric Encryption (BE) is a group of emerging technologies that securely bind a digital key to a biometric or generate a digital key from the biometric, so that no biometric image or template is stored. What is stored is the BE template otherwise known as a “biometrically encrypted key” or “helper data.” As a result, neither the digital key nor the biometric can be retrieved from the stored BE template. BE conceptually differs from other systems that encrypt biometric images or templates using conventional encryption, or store a cryptographic key and release it upon successful biometric authentication. With BE, the digital key is recreated only if the correct biometric sample is presented on verification. The output of BE verification is either a digital key or a failure message. This “encryption/decryption” process is fuzzy because of the natural variability of...
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Tomko, G.J., Soutar, C., Schmidt, G.J.: Fingerprint controlled public key cryptographic system. U.S. Patent 5541994, July 30, 1996 (Filing date: Sept. 7, 1994)
Jain, A.K., Nandakumar, K., Nagar, A.: Biometric Template Security. EURASIP J. Adv. Signal Process. v. 2008, Article ID 579416, pp. 1–17 (2008)
Tuyls, P., Škorić, B., Kevenaar, T. (eds.): Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting. Springer, London (2007)
Cavoukian, A., Stoianov, A.: Biometric Encryption: The New Breed of Untraceable Biometrics. In: Boulgouris, N.V., Plataniotis, K.N., Micheli-Tzanakou, E. (eds.): Biometrics: fundamentals, theory, and systems. Wiley, London (2009)
Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: Tsudik G. (ed.) Sixth ACM Conference on Computer and Communications Security, pp. 28–36. ACM Press, New York (1999)
Juels, A., Sudan, M.: A fuzzy vault scheme. In: Lapidoth, A., Teletar, E. (eds.) Proceedings of IEEE International Symposium on Information Theory, p. 408. IEEE, Lausanne (2002)
Dodis, Y., Reyzin, L., Smith, A.: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. In: Cachin, C., Camenish, J. (eds.) Proceedings if Eurocrypt 2004, pp. 523–540. Springer, New York (2004)
Teoh, A.B.J., Ngo, D.C.L., Goh, A.: Personalised cryptographic key generation based on FaceHashing. Comput. Secur. 23, 606–614 (2004)
Soutar, C., Roberge, D., Stoianov, A., Gilroy, R., Vijaya Kumar B.V.K.: Biometric Encryption (Chapter 22). In: Nichols, R.K. (ed.): ICSA Guide to Cryptography, McGraw-Hill New York, (1999)
Adler, A.: Vulnerabilities in Biometric Encryption Systems. In: Audio- and video-based Biometric Person Authentication (AVBPA2005). Lecture Notes in Computer Science, vol. 3546, pp. 1100–1109. Springer, New York (2005)
Davida, G.I., Frankel, Y., Matt, B.J.: On enabling secure applications through off-line biometric identification. In: Proceedings of the IEEE 1998 Symposium on Security and Privacy, pp. 148–157, Oakland, CA (1998)
Monrose, F., Reiter, M.K., Wetzel, S.: Password hardening based on keystroke dynamics. Int. J. Inform. Secur. 1(2), 69–83 (2002)
Hao, F., Anderson, R., Daugman, J.: Combining Crypto with Biometrics Effectively. IEEE Trans. Comput. 55(9), 1081–1088 (2006)
Bringer, J., Chabanne, H., Cohen, G., Kindarji, Z'emor, G.: Optimal iris fuzzy sketches. In: IEEE First International Conference on Biometrics: Theory, Applications, and Systems, BTAS’07, Washington, DC, 27–29 Sept, (2007)
Nandakumar, K., Jain, A.K., Pankanti, S.C.: Fingerprint-based Fuzzy Vault: Implementation and Performance. IEEE Trans. Inform. Forensics Secur. 2(4), 744–757 (2007)
Draper, S.C., Khisti, A., Martinian, E., Vetro, A., Yedidia, J.S.: Using Distributed Source Coding to Secure Fingerprint Biometrics. In: Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), vol. 2, pp. 129–132 (2007)
Chang, E.-C., Shen, R., Teo, F.W.: Finding the Original Point Set Hidden among Chaff. In: Proceedings of the 2006 ACM Symposium on Information, computer and communications security. ASIACCS’06, Taipei, Taiwan, pp. 182–188 Sept, (2006)
Delvaux, N., Bringer, J., Grave, J., Kratsev, K., Lindeberg, P., Midgren, J., Breebaart, J., Akkermans, T., van der Veen, M., Veldhuis, R., Kindt, E., Simoens, K., Busch, C., Bours, P., Gafurov, D., Yang, B., Stern, J., Rust, C., Cucinelli, B., Skepastianos, D.: Pseudo identities based on fingerprint characteristics. In: IEEE fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), August 15–17, Harbin, China (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer Science+Business Media, LLC
About this entry
Cite this entry
Cavoukian, A., Stoianov, A. (2009). Encryption, Biometric. In: Li, S.Z., Jain, A. (eds) Encyclopedia of Biometrics. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-73003-5_63
Download citation
DOI: https://doi.org/10.1007/978-0-387-73003-5_63
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-73002-8
Online ISBN: 978-0-387-73003-5
eBook Packages: Computer ScienceReference Module Computer Science and Engineering