Skip to main content
Log in

Christian Rathgeb, Benjamin Tams, Johannes Merkle, Ulrike Korte, Matthias Neu

Multi-biometrische Kryptosysteme

Fuzzy Vault mit Gesicht und Fingerabdrücken

  • Schwerpunkt
  • Published:
Datenschutz und Datensicherheit - DuD Aims and scope Submit manuscript

Zusammenfassung

Biometrische Kryptosysteme ermöglichen eine biometrische Erkennung, ohne dass die gespeicherten Referenzdaten biometrische Merkmale preisgegeben. Damit können bei biometrischen Anwendungen die Interessen des Datenschutzes gewahrt werden. In den BioKeyS-Projekten werden im Auftrag des Bundesamts für Sicherheit in der Informationstechnik (BSI) biometrische Kryptosysteme entworfen, implementiert und untersucht. Dieser Beitrag gibt einen Einblick in die Entwicklung eines multibiometrischen Kryptosystems basierend auf dem Fuzzy Vault Konzept, welches das Gesicht und vier Fingerabdrücke kombiniert.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Literatur

  1. C. Rathgeb and A. Uhl, “A survey on biometric cryptosystems and cancelable biometrics,” EURASIP Journal on Information Security, vol. 2011, no. 3, 2011.

  2. K. Nandakumar and A. K. Jain, “Biometric template protection: Bridging the performance gap between theory and practice,” IEEE Signal Processing Magazine – Special Issue on Biometric Security and Privacy, pp. 1–12, 2015.

  3. ISO/IEC JTC 1/SC 27 IT Security techniques, ISO/IEC 24745:2011. Information technology – Security techniques – Biometric information protection, 2011.

  4. A. Juels and M. Wattenberg, “A fuzzy commitment scheme,” in 6th ACM Conf. on Computer and Communications Security (CCS), 1999, pp. 28–36.

  5. A. Juels and M. Sudan, “A fuzzy vault scheme,” in IEEE Int’l Symposium on Information Theory (ISIT), 2002, p. 408.

  6. C. Rathgeb und C. Busch, „Multi-biometric Template Protection: Issues and Challenges,“ in New Trends and Developments in Biometrics, InTech, 2012.

  7. J. Merkle, T. Kevenaar, and U. Korte, “Multi-modal and multi-instance fusion for biometric cryptosystems,” in Int’l Conf. of Biometrics Special Interest Group (BIOSIG), 2012, pp. 1–6.

  8. M.-H. Lim, A. B. J. Teoh, and J. Kim, “Biometric feature-type transformation: Making templates compatible for secret protection,” IEEE Signal Processing Magazine, vol. 32, no. 5, pp. 77–87, 2015.

  9. B. Tams, “Unlinkable minutiae-based fuzzy vault for multiple fingerprints,” IET Biometrics, vol. 5, pp. 170–180, 2016.

  10. C. Rathgeb, B. Tams, J. Wagner, and C. Busch, “Unlinkable improved multi-biometric iris fuzzy vault,” EURASIP Journal on Information Security, vol. 2016, 2016.

  11. K. Nandakumar und A. Jain, „Multibiometric Template Security Using Fuzzy Vault,“ in International Conference on Biometrics: Theory, Applications and Systems (BTAS), 2008.

  12. V. S. Meenakshia und G. Padmavathi, „Security analysis of password hardened multimodal biometric fuzzy vault with combined feature points extracted from fingerprint, iris and retina for high security applications,“ Proc. Computer. Science, 2010.

  13. A. Nagar, K. Nandakumar, and A. Jain, “Multibiometric cryptosystems based on feature-level fusion,” Trans. on Information Forensics and Security, vol. 7, no. 1, pp. 255–268, 2012.

  14. K. Zhang, Z. Zhang, Z. Li and Y. Qiao, “Joint Face Detection and Alignment Using Multitask Cascaded Convolutional Networks,” in IEEE Signal Processing Letters, vol. 23, no. 10, pp. 1499-1503, 2016.

  15. J. Deng, J. Guo, N. Xue, and S. Zafeiriou, “ArcFace: Additive angular margin loss for deep face recognition,” in Conf. on Computer Vision and Pattern Recognition (CVPR), 2019, pp. 4685–4694.

  16. C. Rathgeb, J. Merkle, J. Scholz, B. Tams und V. Nesterowicz, „Deep Face Fuzzy Vault: Implementation and Performance,“ Computers & Secuirty, 2022.

  17. J. Merkle, B. Tams, B. Dieckmann und U. Korte, „xTARP: Improving the Tented Arch Reference Point Detection Algorithm“, in Int’l Conf. of Biometrics Special Interest Group (BIOSIG), 2017.

  18. V. Guruswami and M. Sudan, “Improved decoding of Reed-Solomon and algebraic-geometric codes,” IEEE Transactions on Information Theory, vol. 45, pp. 1757–1767, 1998.

  19. A. Acar, H. Aksu, A. S. Uluagac, and M. Conti, “A survey on homomorphic encryption schemes: Theory and implemention,” ACM Computing Surveys (CSUR), vol. 51, no. 4, pp. 1–35, 2018.

  20. Y. Sutcu, H. T. Sencar, and N. Memon, “How to measure biometric information?” in Int’l Conf. on Pattern Recognition (ICPR), 2010, pp. 1469–1472.

  21. BioKeyS: Kryptographisch-biometrische Authentisierungssysteme mittels biometrischer Template-Protection-Verfahren. URL: https://www.bsi.bund.de/DE/Themen/Verbraucherinnen-und-Verbraucher/Informationen-und-Empfehlungen/Technologien_sicher_gestalten/Biometrie/BSIProjekte/BioKeyS/biokeys.html

  22. J. Merkle, U. Korte, H. Ihmor, M. Niesing and M. Schwaiger: “Security Capacity of the Fuzzy Fingerprint Vault”, International Journal on Advances in Security, Vol. 3, no. 3&4, S. 146-168, 2010.

  23. J. Merkle, U. Korte, H. Ihmor, M. Niesing, and M. Schwaiger: “Performance of the Fuzzy Vault for Multiple Fingerprints”, in Int’l Conference of the Biometrics Special Interest Group (BIOSIG, 57-72, 2010.

  24. M. Neu, U. Korte, M. Ullmann: “Improvement of Fuzzy Vault for Multiple Fingerprints with Angles”, Int’l Conference of the Biometrics Special Interest Group (BIOSIG), 233-240, 2016.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Christian Rathgeb.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rathgeb, C., Merkle, J., Tams, B. et al. Multi-biometrische Kryptosysteme. Datenschutz Datensich 47, 31–36 (2023). https://doi.org/10.1007/s11623-022-1712-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11623-022-1712-6

Navigation