Synonyms
Key binding; Secure biometrics; Template protection
Definition
“User data” stands for the private information of the biometric system user, for example, identity number, e-mail address, or any other significant or insignificant character string, which can be transformed into ASCII code in computer systems. Binding of biometric and user data is a method which aims to solve the issues of security and privacy involved with biometric system. As an important method of biometric encryption, binding of biometric and user data has two main functions: one is protecting the biometric template from attacks, where cancelable biometric templates can be generated, and the other is embedding user data into the biometric template, where user data will be reproduced if and only if biometric matching succeeds.
Introduction
As an identity authentication method, biometrics bases recognition on an intrinsic aspect of the human being, and the use of biometrics requires the person to be...
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
D. Maltoni, D. Maio, A.K. Jain, S. Prabhakar, Handbook of Fingerprint Recognition (Springer, New York, 2003)
U. Uludag, S. Pankanti, S. Prabhakar, A.K. Jain, Biometric cryptosystems: issues and challenges. Proc. IEEE. 92(6), 948–960 (2004)
A Jain et al., Biometrics: a tool for information security. IEEE Trans. Inf. Forensics Secur. 1(2), 125–143 (2006)
U. Uludag, A. Jain, Securing fingerprint template: fuzzy vault with helper data, in Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshop, New York, 2006, p. 163
Y. Dodis, L. Reyzin, A. Smith, Fuzzy extractor, in Security with Noisy Data, ed. by P. Tuyls, B. Skoric, T. Kevenaar (Springer, London, 2008)
C. Soutar, D. Roberge, S.A. Stojanov, R. Gilroy, B.V.K.V. Kumar, Biometric encryption, in Proceedings of ICSA Guide to Cryptography, ed. by R.K. Nichols (McGraw-Hill, New York, 1999)
A.B.J. Teoh, D.C.L. Ngo, A. Goh, Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recognit. 37(11), 2245–2255 (2004)
A. Juels, M. Wattenberg, A fuzzy commitment scheme, in Proceedings of ACM Conference on Computer and Communications Security (CCS), Singapore, 1999, pp. 28–36
A. Juels, M. Sudan, A fuzzy vault scheme, in Proceedings of IEEE International Symposium on Information Theory, Lausanne, 2002, p. 408
D.C.L. Ngo, A.B.J. Toeh, A. Goh, Eigenface-based face hashing, in Proceedings of International Conference on Biometric Authentication, Hong Kong, 2004, pp. 195–199
T. Connie, A. Teoh, M. Goh, D. Ngo, PalmHashing: a novel approach for cancelable biometrics. Inf. Process. Lett. 93(1), 1–5 (2005)
A. Lumini, L. Nanni, An improved biohashing for human authentication. Pattern Recognit. 40(3), 1057–1065 (2007)
T.C. Clancy, N. Kiyavash, D.J. Lin, Secure smartcard-based fingerprint authentication, in Proceedings of ACM SIGMM 2003 Multimedia, Biometrics Methods and Applications Workshop, Berkley, 2003, pp. 45–52
D. Nyang, K. Lee, Fuzzy face vault: how to implement fuzzy vault with weighted features, in Proceedings, Part I of Fourth International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007, Held as Part of HCI International 2007, Beijing (Springer, Heidelberg, 2007), pp. 491–496
Y.J. Lee, K. Bae, S.J. Lee, K.R. Park, J. Kim, Biometric key binding: fuzzy vault based on iris images, in Proceedings of the Second International Conference on Biometrics, Soul (Springer, Heidelberg, 2007), pp. 800–808
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer Science+Business Media New York
About this entry
Cite this entry
Li, P., Tian, J., Yang, X., Zhou, S. (2015). Biometric and User Data, Binding of. In: Li, S.Z., Jain, A.K. (eds) Encyclopedia of Biometrics. Springer, Boston, MA. https://doi.org/10.1007/978-1-4899-7488-4_282
Download citation
DOI: https://doi.org/10.1007/978-1-4899-7488-4_282
Published:
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4899-7487-7
Online ISBN: 978-1-4899-7488-4
eBook Packages: Computer ScienceReference Module Computer Science and Engineering