Skip to main content
Log in

Standardisierung von Biometric Template Protection

Aktueller Status und Bewertung der Verknüpfbarkeit

  • Schwerpunkt
  • Biometrie — Sicherheits- und Datenschutzkonzepte
  • Published:
Datenschutz und Datensicherheit - DuD Aims and scope Submit manuscript

Zusammenfassung

Die Genauigkeit und Erkennungsleistung biometrischer Systeme ermöglicht heutzutage ein vielfältiges Anwendungsspektrum (von forensischen Identifications-Systemen hin zu biometrischer Verifikation an Smartphones für Onlinebanking). Ein Einsatz in nicht-hoheitlichem Bereich erfordert jedoch die Entwicklung sicherer und datenschutzfreundlicher biometrischer Verfahren. Dabei spielt auch die Interoperabilität zwischen Systemen eine wichtige Rolle. ISO/IEC Standards unterstützen die Entwicklung sicherer und datenschutzfreundlicher biometrischer Verfahren, bekannt als Biometric Template Protection (BTP) Systeme, als auch eine geeignete Leistungsbewertung dieser Systeme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Literatur

  1. A. Jain, “Biometric recognition”, in Nature, vol. 449, no. 7158, pp. 38–40, September 2007.

    Article  Google Scholar 

  2. A. Hadid, N. Evans, S. Marcel and J. Fierrez, “Biometrics systems under spoofing attack: an evaluation methodology and lessons learned”, IEEE Signal Processing Magazine, Special Issue on Biometric Security and Privacy, Vol. 32, n. 5, pp. 20–30, September 2015.

    Article  Google Scholar 

  3. J. Galbally, R. Cappelli, A. Lumini, G. Gonzalez de Rivera, D. Malton, J. Fierrez, J. Ortega-Garcia, D. Maio, “An evaluation of direct and indirect attacks using fake fingers generated from ISO templates”, in Pattern Recognition Letters, vol. 31, no. 8, pp. 725–232, June 2010.

    Article  Google Scholar 

  4. R. Cappelli, D. Maio, A. Lumini, D. Maltoni, “Fingerprint image reconstruction from standard templates”, in IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 29, no. 9, pp. 1489–1503, August 2007.

    Article  Google Scholar 

  5. J. Galbally, A. Ross, M. Gomez-Barrero, J. Fierrez and J. Ortega-Garcia, “Iris image reconstruction from binary templates: An efficient probabilistic approach based on genetic algorithms”, in Computer Vision and Image Understanding, Vol. 117, n. 10, pp. 1512-1525, October 2013

    Article  Google Scholar 

  6. M. Gomez-Barrero, J. Galbally, A. Morales, M. A. Ferrer, J. Fierrez and J. Ortega-Garcia, “A novel hand reconstruction approach and its application to vulnerability assessment”, in Information Sciences, vol. 268, no. 0, pp. 103–121, June 2014.

    Article  Google Scholar 

  7. E. Kelkboom, J. Breebaart, T. Kevenaar, I. Buhan, I., R. Veldhuis, “Preventing the decodability attack based cross-matching in a fuzzy commitment scheme”, in IEEE Trans. on Information Forensics and Security, vol. 6, no. 1, pp. 107–121, November 2010.

    Article  Google Scholar 

  8. M. Gomez-Barrero, C. Rathgeb, J. Galbally, C. Busch and J. Fierrez, “Unlinkable and irreversible biometric template protection based on Bloom filters”, in Information Sciences, Vol. 370-371, pp. 18–32, November 2016.

    Article  MathSciNet  Google Scholar 

  9. P. Tulys, B. Skoric, T. Kevenaar, “Security with noisy data: on private biometrics, secure key storage and anti-counterfeiting”, Springer, 2007.

    Book  Google Scholar 

  10. P. Campisi, “Security and privacy in biometrics”, Springer, 2013.

    Book  Google Scholar 

  11. ISO/IEC JTC1 SC27 Security Techniques, ISO/IEC 24745:2011. Information Technology–Security Techniques–Biometric Information Protection, 2011.

  12. C. Rathgeb, A. Uhl, “A survey on biometric cryptosystems and cancelable biometrics”, in EURASIP Journal on Information Security, vol. 3, no. 1, pp. 1–25, 2011.

    Google Scholar 

  13. V. Patel, N. Ratha, R. Chellappa, “Cancelable biometrics: A review”, in IEEE Signal Processing Magazine, vol. 32, no. 5, pp. 54–65, 2015.

    Article  Google Scholar 

  14. M. Barni, G. Droandi, R. Lazzeretti, “Privacy protection in biometric-based recognition systems: A marriage between cryptography and signal processing”, in IEEE Signal Processing Magazine, vol. 32, no. 5, pp. 66–76, 2015.

    Article  Google Scholar 

  15. ISO/IEC JTC1 SC37 Biometrics, ISO/IEC 19795-1:2006. Information Technology–Biometric Performance Testing and Reporting–Part 1: Principles and Framework, 2006.

  16. ISO/IEC JTC1 SC37 Biometrics, ISO/IEC DIS 30136. Information Technology–Performance Testing of Template Protection Schemes, 2017.

  17. K. Simoens, P. Tuyls, and B. Preneel, “Privacy weaknesses in biometric sketches,” in Proc. IEEE Symp. on Security and Privacy (SP), pp. 188–203, 2009.

    Google Scholar 

  18. I. Buhan, J. Breebaart, J. Guajardo, K. De Groot, E. Kelkboom, and T. Akkermans, “A quantitative analysis of indistinguishability for a continuous domain biometric cryptosystem”, in Proc. Int. Workshop on Data Privacy Management (DPM), pp. 78–92, 2009.

    Google Scholar 

  19. I. Buhan, J. Merchan, and E. Kelkboom, “Efficient strategies for playing the indistinguishability game for fuzzy sketches”, in Proc. IEEE Workshop on Information Forensics and Security (WIFS), 2010.

    Google Scholar 

  20. E. J. Kelkboom, J. Breebaart, T. A. Kevenaar, I. Buhan, and R. N. Veldhuis, “Preventing the decodability attack based cross-matching in a fuzzy commitment scheme”, in IEEE Trans. on Information Forensics and Security, vol. 6, no. 1, pp. 107–121, 2011.

    Article  Google Scholar 

  21. A. Nagar, K. Nandakumar, and A. K. Jain, “Biometric template transformation: a security analysis,” in Proc. SPIE 7541, Media Forensics and Security II. Int. Society for Optics and Photonics, p. 75410O, 2010.

    Google Scholar 

  22. M. Ferrara, D. Maltoni, and R. Cappelli, “A two-factor protection scheme for MCC fingerprint templates”, in Proc. BIOSIG, 2014.

    Google Scholar 

  23. M. Gomez-Barrero, J. Galbally, A. Morales and J. Fierrez, “Privacy-Preserving Comparison of Variable-Length Data with Application to Biometric Template Protection”, in IEEE Access, 2017.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marta Gomez-Barrero.

Additional information

Marta Gomez-Barrero arbeitet als Postdoc in der da/sec Biometrics and Internet Security Forschungsgruppe am Center for Research in Security and Privacy, Darmstadt

Christian Rathgeb arbeitet als Postdoc in der da/sec Biometrics and Internet Security Forschungsgruppe am Center for Research in Security and Privacy, Darmstadt

Christoph Busch arbeitet als Principal Investigator in der da/sec Biometrics and Internet Security Forschungsgruppe am Center for Research in Security and Privacy, Darmstadt

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gomez-Barrero, M., Rathgeb, C. & Busch, C. Standardisierung von Biometric Template Protection. Datenschutz Datensich 41, 422–426 (2017). https://doi.org/10.1007/s11623-017-0805-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11623-017-0805-0

Navigation