Skip to main content

Privacy Protection in High Security Biometrics Applications

  • Conference paper
Ethics and Policy of Biometrics (ICEB 2010)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6005))

Included in the following conference series:

Abstract

While biometrics is useful for secure and accurate identification of a person, it also has serious privacy implications in handling large databases of biometrics. Standard encryption techniques have limited use for handling biometrics templates and signals as intra-person variations can’t be handled effectively using information security techniques. As a way to enhance privacy and security of biometrics databases, we present a pattern recognition-based model to analyze the threats to a biometrics-based authentication system and also a novel solution to enhances privacy. Cancelable biometrics is an emerging concept, where transformations that hide the biometrics signatures (fingerprints, faces and iris) are designed so that the identity can be established with added security. Other methods have been proposed for enhancing privacy in biometrics. In this paper, we will describe our threat model for biometrics recognition and recent advances proposed for privacy enhancements for fingerprint and iris biometrics.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Rood, E., Jain, A.K.: Biometric research agenda: Report of the NSF workshop. In: Workshop for a Biometric Research Agenda, Morgantown, WV (July 2003)

    Google Scholar 

  2. Matsumoto, T., Matsumoto, H., Yamada, K., Hoshino, S.: Impact of artificial gummy fingers on fingerprint systems. In: Proceedings of SPIE, Optical Security and Counterfeit Deterrence Techniques IV, vol. 8577 (2002)

    Google Scholar 

  3. Bolle, R., Connell, J., Pankanti, S., Ratha, N., Senior, A.: Guide to Biometrics. Springer, Heidelberg (2003)

    Google Scholar 

  4. Kansala, I., Tikkanen, P.: Security risk analysis of fingerprint based verification in PDAs. In: Proc. IEEE AutoID 2002, Tarrytown, NY, March 2002, pp. 76–82 (2002)

    Google Scholar 

  5. Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal 40(3), 614–634 (2001)

    Article  Google Scholar 

  6. Ratha, N.K., Connell, J.H., Bolle, R.M.: Biometrics break-ins and band aids. Pattern Recognition Letters 24(13), 2105–2113 (2003)

    Article  Google Scholar 

  7. Bolle, R.M., Connell, J.H., Ratha, N.K.: Biometric Perils and Patches. Pattern Recognition 35(12), 2727–2738 (2002)

    Article  MATH  Google Scholar 

  8. Ratha, N.K., Chikkerur, S., Connell, J.H., Bolle, R.M.: Generating cancelable fingerprint templates. IEEE Trans. on PAMI 29(4), 561–572 (2007)

    Google Scholar 

  9. Ratha, N.K., Chikkerur, S., Connell, J.H., Bolle, R.M.: Privacy enhancements for inexact biometrics templates. In: Tuyls, P., Skoric, B., Kevenaar, T. (eds.) Security with Noisy Data. Springer, Heidelberg (2007)

    Google Scholar 

  10. Chikkerur, S., Connell, J., Ratha, N.: Generating Registration-free Cancelable Fingerprint Templates. In: Proc. of BTAS 2008 Conference (September 2008)

    Google Scholar 

  11. Zuo, J., Ratha, N., Connell, J.: Cancelable Iris Biometric. In: Proc. of IAPR conf. ICPR 2008, December 2008,

    Google Scholar 

  12. Farooq, F., Bolle, R.M., Jea, T.-Y., Ratha, N.: Anonymous and Revocable Fingerprint Recognition. In: Proc. of CVPR Workshop on Biometrics, Minneapolis (2007)

    Google Scholar 

  13. Cavoukian, A., Stoianov, A.: Biometrics Encryption: A positive-sum technology that achieves strong authentication, security and privacy (2007), www.ipc.on.ca

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ratha, N.K. (2010). Privacy Protection in High Security Biometrics Applications. In: Kumar, A., Zhang, D. (eds) Ethics and Policy of Biometrics. ICEB 2010. Lecture Notes in Computer Science, vol 6005. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12595-9_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-12595-9_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-12594-2

  • Online ISBN: 978-3-642-12595-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics