Skip to main content

Robust and Secure Biometrics: Some Application Examples

  • Chapter

Abstract

In the past years there has been much theoretical interest in secure extraction of robust strings from noisy measurements. In particular this technique allows extracting robust cryptographic keys from noisy biometric data. This paper starts with an overview of the ideas behind robust and secure string extraction in terms of information reconciliation, privacy amplification and helper data. The main part of the paper gives three application examples explaining how these techniques are used to enhance the convenience and security of devices (e.g. tokens) while preserving also the privacy of the user because neither biometric information nor secret cryptographic keys need to be stored on applications. We discuss a server access token, a 3-way check for a biometric ePassport and a password vault.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Brassard, G, Salvail, L.: Secret-key reconciliation by Public Discussion, Advances in Cryptology, EUROCRYPT’93, Springer Verlag, LNCS 765, 1994, p.410–423.

    Google Scholar 

  2. Gander, M. J., Maurer, U. M.: On the secret-key rate of binary random variables. Proc.1994 IEEE International Symposium on Information Theory, p.351, 1994.

    Google Scholar 

  3. Roger L. Kay, “Protecting Mobility”, IDC White paper, 2005 http://www.synaptics.com/support/Protecting_Mobility.pdf

  4. Kevenaar, T. A. M, Schrijen, G. J., van der Veen, M., Akkermans, A. H. M. and Zuo, F.: Face Recognition with Renewable and Privacy Preserving Templates. Proc. 4th IEEE Workshop on Automatic Identification Advanced Technologies (AutolD 2005), Springer Verlag, LNCS 3546, 2005, p.21–25.

    Google Scholar 

  5. Linnartz, J. P and Tuyls P.: New shielding functions to enhance privacy and prevent misuse of biometric templates, Proc. 3rd Conf. Audio and Video Based Person Authentication (AVBPA 2003), Springer Verlag, LNCS 2688, 2003, p.238–250.

    Google Scholar 

  6. Maurer, U. M., Wolf, S.: Unconditional Secure Key Agreement and the Intrinsic Conditional Information, IEEE Trans. on Information Theory, Vol. 45, no. 2, 1999, p.499–514.

    Article  MATH  MathSciNet  Google Scholar 

  7. Tuyls P. and Goseling J.: Capacity and Examples of Template Protecting Biometric Authentication Systems, Proc. Biometric Authentication Workshop (BioAW, Prague 2004), Springer Verlag, LNCS 3087, 2004, p.158–170.

    Google Scholar 

  8. V. Shoup, “A Computational Introduction to Number Theory and Algebra”, Cambridge University Press 2005.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Friedr. Vieweg & Sohn Verlag | GWV-Fachverlage GmbH, Wiesbaden

About this chapter

Cite this chapter

Kevenaar, T., Schrijen, G.J., Akkermans, A., Damstra, M., Tuyls, P., van der Veen, M. (2006). Robust and Secure Biometrics: Some Application Examples. In: ISSE 2006 — Securing Electronic Busines Processes. Vieweg. https://doi.org/10.1007/978-3-8348-9195-2_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-8348-9195-2_21

  • Publisher Name: Vieweg

  • Print ISBN: 978-3-8348-0213-2

  • Online ISBN: 978-3-8348-9195-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics