Synonyms
Biometric cryptosystem; Biometric key generation; Biometric locking; Fuzzy extractor; Secure sketch
Definition
Biometric Encryption (BE) is a group of emerging technologies that securely bind a digital key to a biometric or generate a digital key from the biometric, so that no biometric image or template is stored. What is stored is the BE template otherwise known as a “biometrically encrypted key” or “helper data.” As a result, neither the digital key nor the biometric can be retrieved from the stored BE template. BE conceptually differs from other systems that encrypt biometric images or templates using conventional encryption or store a cryptographic key and release it upon successful biometric authentication. With BE, the digital key is recreated only if the correct biometric sample is presented on verification. The output of BE verification is either a digital key or a failure message. This “encryption/decryption” process is fuzzy because of the natural variability of...
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
G.J. Tomko, C. Soutar, G.J. Schmidt, Fingerprint controlled public key cryptographic system. U.S. Patent 5,541,994, 30 July 1996 (Filing date: 7 Sept 1994)
A.K. Jain, K. Nandakumar, A. Nagar, Biometric template security. EURASIP J. Adv. Signal Process. 2008, 1–17 (2008). Article ID 579416
P. Tuyls, B. Škorić, T. Kevenaar (eds.), Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting (Springer, London, 2007)
A. Cavoukian, A. Stoianov, Biometric encryption: the new breed of untraceable biometrics, in Biometrics: Fundamentals, Theory, and Systems, ed. by N.V. Boulgouris, K.N. Plataniotis, E. Micheli-Tzanakou (Wiley, London, 2009)
A. Juels, M. Wattenberg, A fuzzy commitment scheme, in Sixth ACM Conference on Computer and Communications Security, Singapore, ed. by G. Tsudik (ACM, New York, 1999), pp. 28–36
A. Juels, M. Sudan, A fuzzy vault scheme, in Proceedings of IEEE International Symposium on Information Theory, Palais de Beaulieu, Lausanne, ed. by A. Lapidoth, E. Teletar (IEEE, Lausanne, 2002), p. 408
Y. Dodis, L. Reyzin, A. Smith, Fuzzy extractors: how to generate strong keys from biometrics and other noisy data, in ed. by C. Cachin, J. Camenish, Proceedings if Eurocrypt 2004 (Springer, New York, 2004), pp. 523–540
A.B.J. Teoh, D.C.L. Ngo, A. Goh, Personalised cryptographic key generation based on FaceHashing. Comput. Secur. 23, 606–614 (2004)
C. Soutar, D. Roberge, A. Stoianov, R. Gilroy, B.V.K. Vijaya Kumar, Biometric encryption (Chapter 22), in ICSA Guide to Cryptography, ed. by R.K. Nichols (McGraw-Hill, New York, 1999)
A. Adler, Vulnerabilities in biometric encryption systems, in Audio- and Video-Based Biometric Person Authentication (AVBPA2005). Lecture Notes in Computer Science, vol. 3546 (Springer, New York, 2005), pp. 1100–1109
G.I. Davida, Y. Frankel, B.J. Matt, On enabling secure applications through off-line biometric identification, in Proceedings of the IEEE 1998 Symposium on Security and Privacy, Oakland (1998), pp. 148–157
F. Monrose, M.K. Reiter, S. Wetzel, Password hardening based on keystroke dynamics. Int. J. Inf. Secur. 1(2), 69–83 (2002)
F. Hao, R. Anderson, J. Daugman, Combining crypto with biometrics effectively. IEEE Trans. Comput. 55(9), 1081–1088 (2006)
J. Bringer, H. Chabanne, G. Cohen, Kindarji, G. Z’emor, Optimal iris fuzzy sketches, in IEEE First International Conference on Biometrics: Theory, Applications, and Systems, BTAS’07, Washington, D.C., 27–29 Sept 2007
K. Nandakumar, A.K. Jain, S.C. Pankanti, Fingerprint-based fuzzy vault: implementation and performance. IEEE Trans. Inf. Forensics Secur. 2(4), 744–757 (2007)
S.C. Draper, A. Khisti, E. Martinian, A. Vetro, J.S. Yedidia, Using distributed source coding to secure fingerprint biometrics, in Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Honolulu, vol. 2 (2007), pp. 129–132
E.-C. Chang, R. Shen, F.W. Teo, Finding the original point set hidden among chaff, in Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security (ASIACCS’06), Taipei, Sept 2006, pp. 182–188
N. Delvaux, J. Bringer, J. Grave, K. Kratsev, P. Lindeberg, J. Midgren, J. Breebaart, T. Akkermans, M. van der Veen, R. Veldhuis, E. Kindt, K. Simoens, C. Busch, P. Bours, D. Gafurov, B. Yang, J. Stern, C. Rust, B. Cucinelli, D. Skepastianos, Pseudo identities based on fingerprint characteristics, in IEEE Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), Harbin, 15–17 Aug 2008
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer Science+Business Media New York
About this entry
Cite this entry
Cavoukian, A., Stoianov, A. (2015). Encryption, Biometric. In: Li, S.Z., Jain, A.K. (eds) Encyclopedia of Biometrics. Springer, Boston, MA. https://doi.org/10.1007/978-1-4899-7488-4_63
Download citation
DOI: https://doi.org/10.1007/978-1-4899-7488-4_63
Published:
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4899-7487-7
Online ISBN: 978-1-4899-7488-4
eBook Packages: Computer ScienceReference Module Computer Science and Engineering