Skip to main content

Private Person Authentication in an Ambient World

  • Chapter
  • 2203 Accesses

Part of the book series: Data-Centric Systems and Applications ((DCSA))

Abstract

Biometrics is a convenient way to identify and authenticate individuals in an ambient world. This can only be done if biometric reference information is stored in the biometric system. Storing biometric reference information without any precautions will lead to privacy and security problems. In this chapter, we present technological means to protect the biometric information stored in biometric systems (biometric template protection). After describing the most important methods that can be used for template protection, the most promising method based on techniques from the field of secure key extraction will be described in more detail and example implementations will be given for every stage of the template protection process.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   99.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. N.K. Ratha, J.H. Connell, R. Bolle (2002) Enhancing Security and Privacy of Biometric-based Authentication Systems IBM Systems Journal, Vol. 40, No. 3, 2002.

    Google Scholar 

  2. A. Juels, M. Sudan (2002) A Fuzzy Vault Scheme Proc. Intl Symp. Inf. Theory, A Lapidoth, E. Teletar, Eds., pp.408, 2002.

    Google Scholar 

  3. U. Uludag, S. Pankanti, A.K. Jain (2005) Fuzzy Vault for Fingerprints, Proc. 5th Int. Conf. on Audio-and Video-Based Biometric Person Authentication (AVBPA 2005), Springer LNCS 3546, pp.310–319, 2005.

    Google Scholar 

  4. A. Juels, M. Wattenberg (1999) A Fuzzy Commitment Scheme In G. Tsudik, Ed., 6th ACM Conf. Computer and Communication Security, pp.28–36, 1999.

    Google Scholar 

  5. J.P. Linnartz, P. Tuyls (2003) New shielding functions to enhance privacy and prevent misuse of biometric templates, Proc. 3rd Conf. on Audio and Video Based Person Authentication, LNCS 2688, pp.238–250, Springer-Verlag, 2003.

    Google Scholar 

  6. P. Tuyls, J. Goseling (2004) Capacity and Examples of Template Protecting Biometric Authentication Systems, Biometric Authentication Workshop (BioAW, Prague, 2004), LNCS 3087, pp.158–170, 2004.

    Google Scholar 

  7. P. Tuyls, M. van Dijk (2005) Robustness Reliability and Security of Biometric Key Distillation in the Information Theoretic Setting, Proc. 26th Benelux Symposium on Information Theory, 2005.

    Google Scholar 

  8. Y. Dodis, L. Reyzin, A. Smith (2004) Fuzzy extractors: How to generate strong keys from biometrics and other noisy data, Proceedings of Eurocrypt 2004, LNCS 3027, pp.523–540, Springer-Verlag, 2004.

    Google Scholar 

  9. G. Brassard, L. Salvail (1994) Secret-key reconciliation by Public Discussion, Advances in Cryptology, EUROCRYPT’93, Springer Verlag, LNCS 765, pp.410–423, 1994.

    Google Scholar 

  10. M.J. Gander, U.M. Maurer (1994) On the secret-key rate of binary random variables Proc.1994 IEEE International Symposium on Information Theory, p.351, 1994.

    Google Scholar 

  11. U.M. Maurer, S. Wolf, (1999) Unconditional Secure Key Agreement and the Intrinsic Conditional Information, IEEE Trans. on Information Theory, Vol. 45, no. 2, 1999, pp.499–514.

    Article  MATH  MathSciNet  Google Scholar 

  12. C.H. Bennett, G. Brassard, C. Crepeau, U.M. Maurer (1995) Generalized privacy amplification IEEE Transactions on Information Theory, Vol. 41, no. 6, pp.1915–1923, November 1995

    Article  MATH  MathSciNet  Google Scholar 

  13. V. Shoup (2005) A Computational Introduction to Number Theory and Algebra, Cambridge University Press, 2005

    Google Scholar 

  14. A.D. Smith (2004) Maintaining Secrecy When Information Leakage is Unavoidable, Ph.D. Thesis, MIT, August 2004.

    Google Scholar 

  15. P. Tuyls, A. Akkermans, T. Kevenaar, G.J. Schrijen, A. Bazen, R. Veldhuis (2005) Practical biometric template protection system based on reliable components, Proc. 5th Int. Conf. on Audio-and Video-Based Biometric Person Authentication (AVBPA 2005), LNCS 3546, Springer Verlag pp.436–446, 2005.

    Google Scholar 

  16. T.A.M. Kevenaar, G.J. Schrijen, M. van der Veen, A.H.M. Akkermans, F. Zuo (2005) Face Recognition with Renewable and Privacy Preserving Binary Templates, 4th IEEE Workshop on automatic identification advanced technology (AutoID 2005), LNCS 3546, pp.21–25, Springer Verlag, 2005.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Tuyls, P., Kevenaar, T. (2007). Private Person Authentication in an Ambient World. In: Petković, M., Jonker, W. (eds) Security, Privacy, and Trust in Modern Data Management. Data-Centric Systems and Applications. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69861-6_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-69861-6_27

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-69860-9

  • Online ISBN: 978-3-540-69861-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics