Capacity and Examples of Template-Protecting Biometric Authentication Systems

  • Pim Tuyls
  • Jasper Goseling
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3087)


In this paper, we formulate precisely the requirements for privacy protecting biometric authentication systems. The secrecy capacity Cs is investigated for the discrete and the continuous case. We present, furthermore, a general algorithm that meets the requirements and achieves Cs as well as Cid (the identification capacity). Finally, we present some practical constructions of the general algorithm and analyze their properties.


Authentication System Enrollment Phase Biometric System Authentication Phase Biometric Authentication 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Putte, T.v.d., Keuning, J.: Biometrical fingerprint recognition: Don’t get your fingers burned. In: IFIP TC8/WG8.8 Fourth Working Conference on Smart Card Research and Advanced Applications, pp. 289–303. Kluwer Academic Publishers, Dordrecht (2000)Google Scholar
  2. 2.
    Bolle, R.M., Connell, J., Pankanti, S., Ratha, N.K., Senior, A.W.: Biometrics 101. Report RC22481, IBM Research (2002)Google Scholar
  3. 3.
    Maltoni, D., Maio, D., Jain, A.K., Prabhakar, S.: Handbook of Fingerprint Recognition. Springer, New York (2003)zbMATHGoogle Scholar
  4. 4.
    Matsumoto, T., Matsumoto, H., Yamada, K., Hoshino, S.: Impact of artificial “gummy” fingers on fingerprint systems. In: Optical Sec. and Counterfeit Deterrence Techn. IV. Proc. of SPIE, vol. 4677 (2002)Google Scholar
  5. 5.
    Hill, C.J.: Risk of masquerade arising from the storage of biometrics. Bachelor of science thesis, Dept. of CS, Australian, National University (2002)Google Scholar
  6. 6.
    Schneier, B.: Inside risks: The uses and abuses of biometrics. Comm. of the ACM 42, 136 (1999)CrossRefGoogle Scholar
  7. 7.
    Penrose, L.: Dermatoglyphic topology. Nature 205, 545–546 (1965)CrossRefGoogle Scholar
  8. 8.
    Mulvhill, J.: The genesis of dermatoglyphics. The Journal of Pediatrics 75, 579–589 (1969)CrossRefGoogle Scholar
  9. 9.
    Babler, W.: Embryologic development of epidermal ridges and their configuration. Birth Defects Original Article Series, vol. 27 (1991)Google Scholar
  10. 10.
    Bolling, J.: A window to your health. Jacksonville Medicine 51 (2000) (Special Issue: Retinal Diseases)Google Scholar
  11. 11.
    Davida, G., Frankel, Y., Matt, B.: On enabling secure applications through offline biometric identification. In: Proc. of the IEEE 1998 Symp. on Security and Privacy, Oakland, Ca, pp. 148–157 (1998)Google Scholar
  12. 12.
    Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: Sixth ACM Conf. on Comp. and Comm. Security, Singapore, pp. 28–36 (1999)Google Scholar
  13. 13.
    Ratha, N., Connell, J., Bolle, R.: Enhancing security and privacy in biometricsbased authentication systems. IBM Systems Journal 40, 614–634 (2001)CrossRefGoogle Scholar
  14. 14.
    Juels, A., Sudan, M.: A fuzzy vault scheme. In: Proc. of the 2002 IEEE Int. Symp. on Inf. Theory, Lausanne, Switzerland, p. 408 (2002)Google Scholar
  15. 15.
    Linnartz, J.P., Tuyls, P.: New shielding functions to enhance privacy and prevent misuse of biometric templates. In: Proc. of the 4th Int. Conf. on Audio and Video Based Biometric Person Authentication, Guildford, UK, pp. 393–402 (2003)Google Scholar
  16. 16.
    Verbitskiy, E., Tuyls, P., Denteneer, D., Linnartz, J.P.: Reliable biometric authentication with privacy protection. In: Proc. of the 24th Symp. on Inf. Theory in the Benelux, Veldhoven, The Netherlands, pp. 125–132 (2003)Google Scholar
  17. 17.
    Csirmaz, L., Katona, G.: Geometrical cryptography. In: Proc. of the Int. Workshop on Coding and Cryptography, Versailles, France, pp. 101–109 (2003)Google Scholar
  18. 18.
    Ahlswede, R., Csiszar, I.: Common randomness in information theory and cryptography. I. secret sharing 39, 1121–1132 (1993)zbMATHMathSciNetGoogle Scholar
  19. 19.
    Maurer, U., Wolf, S.: Information-theoretic key agreement: From weak to strong secrecy for free. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 351–368. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  20. 20.
    Bennett, C.: Quantum cryptography: Uncertainty in the service of privacy. Science Magazine 257, 752–753 (1992)Google Scholar
  21. 21.
    O’Sullivan, J.A., Schmid, N.A.: Large deviations performance analysis for biometrics recognition. In: Proc. of the 40th Allerton Conference (2002)Google Scholar
  22. 22.
    Willems, F.M.J., Kalker, T., Goseling, J., Linnartz, J.P.: On the capacity of a biometrical identification system. In: Proc. of the 2003 IEEE Int. Symp. on Inf. Theory, Yokohama, Japan, p. 82 (2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • Pim Tuyls
    • 1
  • Jasper Goseling
    • 1
  1. 1.Philips ResearchEindhovenThe Netherlands

Personalised recommendations