Abstract
Biometrics is a convenient way to identify and authenticate individuals in an ambient world. This can only be done if biometric reference information is stored in the biometric system. Storing biometric reference information without any precautions will lead to privacy and security problems. In this chapter, we present technological means to protect the biometric information stored in biometric systems (biometric template protection). After describing the most important methods that can be used for template protection, the most promising method based on techniques from the field of secure key extraction will be described in more detail and example implementations will be given for every stage of the template protection process.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
N.K. Ratha, J.H. Connell, R. Bolle (2002) Enhancing Security and Privacy of Biometric-based Authentication Systems IBM Systems Journal, Vol. 40, No. 3, 2002.
A. Juels, M. Sudan (2002) A Fuzzy Vault Scheme Proc. Intl Symp. Inf. Theory, A Lapidoth, E. Teletar, Eds., pp.408, 2002.
U. Uludag, S. Pankanti, A.K. Jain (2005) Fuzzy Vault for Fingerprints, Proc. 5th Int. Conf. on Audio-and Video-Based Biometric Person Authentication (AVBPA 2005), Springer LNCS 3546, pp.310–319, 2005.
A. Juels, M. Wattenberg (1999) A Fuzzy Commitment Scheme In G. Tsudik, Ed., 6th ACM Conf. Computer and Communication Security, pp.28–36, 1999.
J.P. Linnartz, P. Tuyls (2003) New shielding functions to enhance privacy and prevent misuse of biometric templates, Proc. 3rd Conf. on Audio and Video Based Person Authentication, LNCS 2688, pp.238–250, Springer-Verlag, 2003.
P. Tuyls, J. Goseling (2004) Capacity and Examples of Template Protecting Biometric Authentication Systems, Biometric Authentication Workshop (BioAW, Prague, 2004), LNCS 3087, pp.158–170, 2004.
P. Tuyls, M. van Dijk (2005) Robustness Reliability and Security of Biometric Key Distillation in the Information Theoretic Setting, Proc. 26th Benelux Symposium on Information Theory, 2005.
Y. Dodis, L. Reyzin, A. Smith (2004) Fuzzy extractors: How to generate strong keys from biometrics and other noisy data, Proceedings of Eurocrypt 2004, LNCS 3027, pp.523–540, Springer-Verlag, 2004.
G. Brassard, L. Salvail (1994) Secret-key reconciliation by Public Discussion, Advances in Cryptology, EUROCRYPT’93, Springer Verlag, LNCS 765, pp.410–423, 1994.
M.J. Gander, U.M. Maurer (1994) On the secret-key rate of binary random variables Proc.1994 IEEE International Symposium on Information Theory, p.351, 1994.
U.M. Maurer, S. Wolf, (1999) Unconditional Secure Key Agreement and the Intrinsic Conditional Information, IEEE Trans. on Information Theory, Vol. 45, no. 2, 1999, pp.499–514.
C.H. Bennett, G. Brassard, C. Crepeau, U.M. Maurer (1995) Generalized privacy amplification IEEE Transactions on Information Theory, Vol. 41, no. 6, pp.1915–1923, November 1995
V. Shoup (2005) A Computational Introduction to Number Theory and Algebra, Cambridge University Press, 2005
A.D. Smith (2004) Maintaining Secrecy When Information Leakage is Unavoidable, Ph.D. Thesis, MIT, August 2004.
P. Tuyls, A. Akkermans, T. Kevenaar, G.J. Schrijen, A. Bazen, R. Veldhuis (2005) Practical biometric template protection system based on reliable components, Proc. 5th Int. Conf. on Audio-and Video-Based Biometric Person Authentication (AVBPA 2005), LNCS 3546, Springer Verlag pp.436–446, 2005.
T.A.M. Kevenaar, G.J. Schrijen, M. van der Veen, A.H.M. Akkermans, F. Zuo (2005) Face Recognition with Renewable and Privacy Preserving Binary Templates, 4th IEEE Workshop on automatic identification advanced technology (AutoID 2005), LNCS 3546, pp.21–25, Springer Verlag, 2005.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Tuyls, P., Kevenaar, T. (2007). Private Person Authentication in an Ambient World. In: Petković, M., Jonker, W. (eds) Security, Privacy, and Trust in Modern Data Management. Data-Centric Systems and Applications. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69861-6_27
Download citation
DOI: https://doi.org/10.1007/978-3-540-69861-6_27
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-69860-9
Online ISBN: 978-3-540-69861-6
eBook Packages: Computer ScienceComputer Science (R0)