Skip to main content

Biometric and User Data, Binding of

  • Reference work entry
  • First Online:
  • 141 Accesses

Synonyms

Key binding; Secure biometrics; Template protection

Definition

“User data” stands for the private information of the biometric system user, for example, identity number, e-mail address, or any other significant or insignificant character string, which can be transformed into ASCII code in computer systems. Binding of biometric and user data is a method which aims to solve the issues of security and privacy involved with biometric system. As an important method of biometric encryption, binding of biometric and user data has two main functions: one is protecting the biometric template from attacks, where cancelable biometric templates can be generated, and the other is embedding user data into the biometric template, where user data will be reproduced if and only if biometric matching succeeds.

Introduction

As an identity authentication method, biometrics bases recognition on an intrinsic aspect of the human being, and the use of biometrics requires the person to be...

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   899.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD   549.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. D. Maltoni, D. Maio, A.K. Jain, S. Prabhakar, Handbook of Fingerprint Recognition (Springer, New York, 2003)

    MATH  Google Scholar 

  2. U. Uludag, S. Pankanti, S. Prabhakar, A.K. Jain, Biometric cryptosystems: issues and challenges. Proc. IEEE. 92(6), 948–960 (2004)

    Google Scholar 

  3. http://www.ipc.on.ca/images/Resources/up-1bio_encryp.pdf

  4. A Jain et al., Biometrics: a tool for information security. IEEE Trans. Inf. Forensics Secur. 1(2), 125–143 (2006)

    Google Scholar 

  5. U. Uludag, A. Jain, Securing fingerprint template: fuzzy vault with helper data, in Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshop, New York, 2006, p. 163

    Google Scholar 

  6. Y. Dodis, L. Reyzin, A. Smith, Fuzzy extractor, in Security with Noisy Data, ed. by P. Tuyls, B. Skoric, T. Kevenaar (Springer, London, 2008)

    Google Scholar 

  7. C. Soutar, D. Roberge, S.A. Stojanov, R. Gilroy, B.V.K.V. Kumar, Biometric encryption, in Proceedings of ICSA Guide to Cryptography, ed. by R.K. Nichols (McGraw-Hill, New York, 1999)

    Google Scholar 

  8. A.B.J. Teoh, D.C.L. Ngo, A. Goh, Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recognit. 37(11), 2245–2255 (2004)

    Google Scholar 

  9. A. Juels, M. Wattenberg, A fuzzy commitment scheme, in Proceedings of ACM Conference on Computer and Communications Security (CCS), Singapore, 1999, pp. 28–36

    Google Scholar 

  10. A. Juels, M. Sudan, A fuzzy vault scheme, in Proceedings of IEEE International Symposium on Information Theory, Lausanne, 2002, p. 408

    Google Scholar 

  11. D.C.L. Ngo, A.B.J. Toeh, A. Goh, Eigenface-based face hashing, in Proceedings of International Conference on Biometric Authentication, Hong Kong, 2004, pp. 195–199

    Google Scholar 

  12. T. Connie, A. Teoh, M. Goh, D. Ngo, PalmHashing: a novel approach for cancelable biometrics. Inf. Process. Lett. 93(1), 1–5 (2005)

    MathSciNet  Google Scholar 

  13. A. Lumini, L. Nanni, An improved biohashing for human authentication. Pattern Recognit. 40(3), 1057–1065 (2007)

    MATH  Google Scholar 

  14. T.C. Clancy, N. Kiyavash, D.J. Lin, Secure smartcard-based fingerprint authentication, in Proceedings of ACM SIGMM 2003 Multimedia, Biometrics Methods and Applications Workshop, Berkley, 2003, pp. 45–52

    Google Scholar 

  15. D. Nyang, K. Lee, Fuzzy face vault: how to implement fuzzy vault with weighted features, in Proceedings, Part I of Fourth International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007, Held as Part of HCI International 2007, Beijing (Springer, Heidelberg, 2007), pp. 491–496

    Google Scholar 

  16. Y.J. Lee, K. Bae, S.J. Lee, K.R. Park, J. Kim, Biometric key binding: fuzzy vault based on iris images, in Proceedings of the Second International Conference on Biometrics, Soul (Springer, Heidelberg, 2007), pp. 800–808

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Peng Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer Science+Business Media New York

About this entry

Cite this entry

Li, P., Tian, J., Yang, X., Zhou, S. (2015). Biometric and User Data, Binding of. In: Li, S.Z., Jain, A.K. (eds) Encyclopedia of Biometrics. Springer, Boston, MA. https://doi.org/10.1007/978-1-4899-7488-4_282

Download citation

Publish with us

Policies and ethics