Skip to main content

Encryption, Biometric

  • Reference work entry
  • First Online:
Encyclopedia of Biometrics
  • 124 Accesses

Synonyms

Biometric cryptosystem; Biometric key generation; Biometric locking; Fuzzy extractor; Secure sketch

Definition

Biometric Encryption (BE) is a group of emerging technologies that securely bind a digital key to a biometric or generate a digital key from the biometric, so that no biometric image or template is stored. What is stored is the BE template otherwise known as a “biometrically encrypted key” or “helper data.” As a result, neither the digital key nor the biometric can be retrieved from the stored BE template. BE conceptually differs from other systems that encrypt biometric images or templates using conventional encryption or store a cryptographic key and release it upon successful biometric authentication. With BE, the digital key is recreated only if the correct biometric sample is presented on verification. The output of BE verification is either a digital key or a failure message. This “encryption/decryption” process is fuzzy because of the natural variability of...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 899.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 549.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. G.J. Tomko, C. Soutar, G.J. Schmidt, Fingerprint controlled public key cryptographic system. U.S. Patent 5,541,994, 30 July 1996 (Filing date: 7 Sept 1994)

    Google Scholar 

  2. A.K. Jain, K. Nandakumar, A. Nagar, Biometric template security. EURASIP J. Adv. Signal Process. 2008, 1–17 (2008). Article ID 579416

    Google Scholar 

  3. P. Tuyls, B. Škorić, T. Kevenaar (eds.), Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting (Springer, London, 2007)

    Google Scholar 

  4. A. Cavoukian, A. Stoianov, Biometric encryption: the new breed of untraceable biometrics, in Biometrics: Fundamentals, Theory, and Systems, ed. by N.V. Boulgouris, K.N. Plataniotis, E. Micheli-Tzanakou (Wiley, London, 2009)

    Google Scholar 

  5. A. Juels, M. Wattenberg, A fuzzy commitment scheme, in Sixth ACM Conference on Computer and Communications Security, Singapore, ed. by G. Tsudik (ACM, New York, 1999), pp. 28–36

    Google Scholar 

  6. A. Juels, M. Sudan, A fuzzy vault scheme, in Proceedings of IEEE International Symposium on Information Theory, Palais de Beaulieu, Lausanne, ed. by A. Lapidoth, E. Teletar (IEEE, Lausanne, 2002), p. 408

    Google Scholar 

  7. Y. Dodis, L. Reyzin, A. Smith, Fuzzy extractors: how to generate strong keys from biometrics and other noisy data, in ed. by C. Cachin, J. Camenish, Proceedings if Eurocrypt 2004 (Springer, New York, 2004), pp. 523–540

    Google Scholar 

  8. A.B.J. Teoh, D.C.L. Ngo, A. Goh, Personalised cryptographic key generation based on FaceHashing. Comput. Secur. 23, 606–614 (2004)

    Google Scholar 

  9. C. Soutar, D. Roberge, A. Stoianov, R. Gilroy, B.V.K. Vijaya Kumar, Biometric encryption (Chapter 22), in ICSA Guide to Cryptography, ed. by R.K. Nichols (McGraw-Hill, New York, 1999)

    Google Scholar 

  10. A. Adler, Vulnerabilities in biometric encryption systems, in Audio- and Video-Based Biometric Person Authentication (AVBPA2005). Lecture Notes in Computer Science, vol. 3546 (Springer, New York, 2005), pp. 1100–1109

    Google Scholar 

  11. G.I. Davida, Y. Frankel, B.J. Matt, On enabling secure applications through off-line biometric identification, in Proceedings of the IEEE 1998 Symposium on Security and Privacy, Oakland (1998), pp. 148–157

    Google Scholar 

  12. F. Monrose, M.K. Reiter, S. Wetzel, Password hardening based on keystroke dynamics. Int. J. Inf. Secur. 1(2), 69–83 (2002)

    MATH  Google Scholar 

  13. F. Hao, R. Anderson, J. Daugman, Combining crypto with biometrics effectively. IEEE Trans. Comput. 55(9), 1081–1088 (2006)

    Google Scholar 

  14. J. Bringer, H. Chabanne, G. Cohen, Kindarji, G. Z’emor, Optimal iris fuzzy sketches, in IEEE First International Conference on Biometrics: Theory, Applications, and Systems, BTAS’07, Washington, D.C., 27–29 Sept 2007

    Google Scholar 

  15. K. Nandakumar, A.K. Jain, S.C. Pankanti, Fingerprint-based fuzzy vault: implementation and performance. IEEE Trans. Inf. Forensics Secur. 2(4), 744–757 (2007)

    Google Scholar 

  16. S.C. Draper, A. Khisti, E. Martinian, A. Vetro, J.S. Yedidia, Using distributed source coding to secure fingerprint biometrics, in Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Honolulu, vol. 2 (2007), pp. 129–132

    Google Scholar 

  17. E.-C. Chang, R. Shen, F.W. Teo, Finding the original point set hidden among chaff, in Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security (ASIACCS’06), Taipei, Sept 2006, pp. 182–188

    Google Scholar 

  18. N. Delvaux, J. Bringer, J. Grave, K. Kratsev, P. Lindeberg, J. Midgren, J. Breebaart, T. Akkermans, M. van der Veen, R. Veldhuis, E. Kindt, K. Simoens, C. Busch, P. Bours, D. Gafurov, B. Yang, J. Stern, C. Rust, B. Cucinelli, D. Skepastianos, Pseudo identities based on fingerprint characteristics, in IEEE Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), Harbin, 15–17 Aug 2008

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer Science+Business Media New York

About this entry

Cite this entry

Cavoukian, A., Stoianov, A. (2015). Encryption, Biometric. In: Li, S.Z., Jain, A.K. (eds) Encyclopedia of Biometrics. Springer, Boston, MA. https://doi.org/10.1007/978-1-4899-7488-4_63

Download citation

Publish with us

Policies and ethics