Skip to main content

Toward Ubiquitous Acceptance of Biometric Authentication: Template Protection Techniques

  • Conference paper
Biometric Authentication (BioAW 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3087))

Included in the following conference series:

  • 1078 Accesses

Abstract

The present paper provides a study of theoretical and practical security issues related to the deployment of generic reliable authentication mechanisms based on the use of biometrics and personal hardware tokens, like smart cards. The analysis covers various possible authentication infrastructures, but is mainly focused on the definition of basic requirements and constraints of a particular security scheme, namely client-side authentication. The deployment of such a scheme proves to be necessary when specific application deployment constraints are encountered, particularly when there is a conspicuous need to guarantee the privacy of the users. The paper suggests several solutions to this problem, and proposes a particular template protection technique based on a secure secret sharing scheme. The fundamental goal of this technique is to secure biometric systems sensitive to privacy issues and which rely, at some extent, on authentication performed at the client end of the application.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Jain, A.K., Bolle, R.M., Pankanti, S.: Biometrics: The Personal Identification in Networked Society, January 1999. Kluwer Academic, Norwell (1999)

    Google Scholar 

  2. Pankanti, S., Bolle, R.M., Jain, A.K.: Biometrics: The Future of Identification. IEEE Computer 21(2) (February 2000)

    Google Scholar 

  3. Liu, S., Silverman, M.: A Practical Guide to Biometric Security Technology. IEEE Computer Society, IT Pro - Security (January/February 2000)

    Google Scholar 

  4. Jain, A.K.: Who’s Who? Challenges in Biometric Authentication. LNCS. Springer, Heidelberg (2003)

    Google Scholar 

  5. Schneier, B.: Biometrics: Uses and Abuses. Inside Risks 110, Communications of the ACM 42(8) (August 1999)

    Google Scholar 

  6. Bolle, R.M., Connell, J.H., Ratha, N.K.: Biometric Perils and Patches. In: Pattern Recognition, vol. 35(2), Elsevier Science, B.V (2002)

    Google Scholar 

  7. International Biometric Group (IBG) BioPrivacy Initiative: Technology Assessment, http://www.bioprivacy.org

  8. Penny, W.: Biometrics: A Double Edged Sword - Security and Privacy. SANS Institute (2002)

    Google Scholar 

  9. Prabhakar, S., Pankanti, S., Jain, A.K.: Biometric Recognition: Security and Privacy Concerns. IEEE Security and Privacy Magazine 1(2) (March-April 2003)

    Google Scholar 

  10. Bolle, R.M., Connell, J.H., Ratha, N.K.: Biometrics breaks-in and band-aids. Pattern Recognition Letters 24(13) (September 2003)

    Google Scholar 

  11. Adler, A.: Sample images can be independently restored from face recognition templates. School of Information Technology and Engineering, University of Ottawa (2003)

    Google Scholar 

  12. Hill, C.: The risk of masquerade arising from the storage of biometrics, B.S. Thesis, Australian National University (November 2001)

    Google Scholar 

  13. Schneier, B.: Applied Cryptography, 2nd edn. John Wiley and Sons, Inc., Chichester (1996)

    Google Scholar 

  14. Smart Card Alliance: Secure Personal Identification Systems - Policy, Process and Technology Choices foar a Privacy-Sensitive Solution. Smart Card Alliance White Paper (January 2002)

    Google Scholar 

  15. Smart Card Alliance: Smart Cards and Biometrics in a Privacy-Sensitive Secure Personal Identification System. Smart Card Alliance White Paper (May 2002)

    Google Scholar 

  16. GSAA Government Smart Card Group: Guidelines for Placing Biometrics in Smart Cards (September 1998)

    Google Scholar 

  17. Osborne, M., Ratha, N.K.: A JC-BioAPI Compliant Smart Card with Biometrics for Secure Access Control, January 2003. LNCS. Springer, Heidelberg (2003)

    Google Scholar 

  18. Sanchez-Reillo, R.: Including Biometric Authentication in a Smart Card Operating System, January 2001. LNCS. Springer, Heidelberg (2001)

    Google Scholar 

  19. Podio, F.L., Dunn, J.S., Reinert, L., Tilton, C.J., O’Gorman, L., Collier, M.P., Jerde, M., Wirtz, B.: Common Biometric Exchange File Format. NISTIR 6529 (January 2001)

    Google Scholar 

  20. Schneier, B.: Security pitfalls in cryptography. In: Proc. of CardTech/SecureTech, Washinton D.C. (April 1998)

    Google Scholar 

  21. Ratha, N.K., Connell, J.H., Bolle, R.M.: A biometrics-based secure authentication system. IBM Thomas J. Watson Research Center

    Google Scholar 

  22. Jee, H.K., Lee, K.H., Chung, Y.W.: Integrating the Face Verification Algorithm into the Smart Card System. Electronics and Telecommunication Research Institute, Daejeon (2001)

    Google Scholar 

  23. Kocher, P., Jaffe, J., Jun, B.: Differential power analysis: Leaking secrets. Crypto. 1999, 388–397 (1999)

    Google Scholar 

  24. BioAPI Consortium, http://www.bioapi.org

  25. Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digitial signatures and public-key cryptosystems. Communications of the ACM 21, 2–120 (1978)

    Article  MathSciNet  Google Scholar 

  26. NIST: Digital Signature Standard, National Institute of Standards and Technology (NIST). FIPS Publication 186 (May 1994)

    Google Scholar 

  27. Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE trans, Inform. Theory, IT 22, 644–654 (1976)

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Baltatu, M., D’Alessandro, R., D’Amico, R. (2004). Toward Ubiquitous Acceptance of Biometric Authentication: Template Protection Techniques. In: Maltoni, D., Jain, A.K. (eds) Biometric Authentication. BioAW 2004. Lecture Notes in Computer Science, vol 3087. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-25976-3_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-25976-3_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22499-0

  • Online ISBN: 978-3-540-25976-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics