Advertisement

New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates

  • Linnartz Jean-Paul 
  • Pim Tuyls
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2688)

Abstract

In biometrics, a human being needs to be identified based on some characteristic physiological parameters. Often this recognition is part of some security system. Secure storage of reference data (i.e., user templates) of individuals is a key concern. It is undesirable that a dishonest verifier can misuse parameters that he obtains before or during a recognition process. We propose a method that allows a verifier to check the authenticity of the prover in a way that the verifier does not learn any information about the biometrics of the prover, unless the prover willingly releases these parameters. To this end, we introduce the concept of a delta-contracting and epsilon-revealing function which executes preprocessing in the biometric authentication scheme. It is believed that this concept can become a building block of a public infrastructure for biometric authentication that nonetheless preserves privacy of the participants.

Keywords

Biometric Data Biometric Template Quantization Index Modulation Quantization Step Size Cryptographic Function 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    R. Papu, B. Recht, J. Taylor and N. Gerhenfeld, “Physical one-way functions”, Science, Vol. 297, 20 Sept. 2002, pp. 2026–2030.Google Scholar
  2. [2]
    S. Pankanti, R.M. Bolle and A. Jain, Biometrics-The future of Identification, IEEE Computer, Volume 33, No. 2, pp. 46–49, February 2002.Google Scholar
  3. [3]
    D. Polemi, “Review and evaluation of Biometric Techniques for Identification and Authentication-Final Report”, 1997, http://www.cordis.lu/infosec/src/stud5fr.htm
  4. [4]
    Bruce Schneier, Applied Cryptography, J. Wiley, New York, 1993.zbMATHGoogle Scholar
  5. [5]
    B. Chen and G.W. Wornell, “Digital Watermarking and Information embedding using dither modulation”, IEEE Workshop on Multimedia Signal Processing, Redondo Beach, CA, 1998.Google Scholar
  6. [7]
    A. Juels and M. Wattenberg. A Fuzzy Commitment Scheme. In G. Tsudik, ed., Sixth ACM Conference on Computer and Communications Security, pages 28–36, ACM Press, 1999.Google Scholar
  7. [8]
    Ari Juels en Madhu Sudan, “A fuzzy Vault scheme”, ICIT Proceedings Int. Symp. on Inf. Theory, p. 408, 30 Juni–5 July 2002, Lausanne.Google Scholar
  8. [9]
    D. Denteneer, J.P. Linnartz, P. Tuyls, E. Verbitskiy, “Reliable (robust) biometric Authentication with privacy protection”, acc. for The IEEE Benelux Symp. on Inf. Theory, Veldhoven, The Netherlands, 2003.Google Scholar
  9. [10]
    G.I. Davida, Y. Frankel, and B.J. Matt. On enabling secure applications through off-line biometric identification. In IEEE Symposium on Privacy and Security, 1998.Google Scholar
  10. [11]
    G. I. Davida, Y. Frankel, and B.J. Matt. On the relation of error-correction and cryptography to an offline biometric based identification scheme. In proceedings WCC99, Workshop on Coding and Cryptography, 1999.Google Scholar
  11. [12]
    11 C. Soutar: Biometric Encryption for secure key generation, January 1998. Presentation at the 1998 RSA Data Security ConferenceGoogle Scholar
  12. [13]
    C. Soutar and G.J. Tomko: Secure private key generation using a fingerprint. In CardTech/SecurTech Conference Proceedings, Vol 1, pages 245–252, May 1996.Google Scholar
  13. [14]
    R. Chandrasekaran. Brave new World: ID systems using the human body are here, but privacy issues persist. Washington Post, 30 March 1997, p. HO–1Google Scholar
  14. [16]
    15 A.J. Menezes, P.C. van Oorschot and S.A. Vanstone, “Handbook of Applied Cryptopgraphy”, CRC Press, New York, 96.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Linnartz Jean-Paul 
    • 1
  • Pim Tuyls
    • 1
  1. 1.WY7, Nat.Lab.Philips ResearchEindhovenThe Netherlands

Personalised recommendations