Abstract
In biometrics, a human being needs to be identified based on some characteristic physiological parameters. Often this recognition is part of some security system. Secure storage of reference data (i.e., user templates) of individuals is a key concern. It is undesirable that a dishonest verifier can misuse parameters that he obtains before or during a recognition process. We propose a method that allows a verifier to check the authenticity of the prover in a way that the verifier does not learn any information about the biometrics of the prover, unless the prover willingly releases these parameters. To this end, we introduce the concept of a delta-contracting and epsilon-revealing function which executes preprocessing in the biometric authentication scheme. It is believed that this concept can become a building block of a public infrastructure for biometric authentication that nonetheless preserves privacy of the participants.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
R. Papu, B. Recht, J. Taylor and N. Gerhenfeld, “Physical one-way functions”, Science, Vol. 297, 20 Sept. 2002, pp. 2026–2030.
S. Pankanti, R.M. Bolle and A. Jain, Biometrics-The future of Identification, IEEE Computer, Volume 33, No. 2, pp. 46–49, February 2002.
D. Polemi, “Review and evaluation of Biometric Techniques for Identification and Authentication-Final Report”, 1997, http://www.cordis.lu/infosec/src/stud5fr.htm
Bruce Schneier, Applied Cryptography, J. Wiley, New York, 1993.
B. Chen and G.W. Wornell, “Digital Watermarking and Information embedding using dither modulation”, IEEE Workshop on Multimedia Signal Processing, Redondo Beach, CA, 1998.
A. Juels and M. Wattenberg. A Fuzzy Commitment Scheme. In G. Tsudik, ed., Sixth ACM Conference on Computer and Communications Security, pages 28–36, ACM Press, 1999.
Ari Juels en Madhu Sudan, “A fuzzy Vault scheme”, ICIT Proceedings Int. Symp. on Inf. Theory, p. 408, 30 Juni–5 July 2002, Lausanne.
D. Denteneer, J.P. Linnartz, P. Tuyls, E. Verbitskiy, “Reliable (robust) biometric Authentication with privacy protection”, acc. for The IEEE Benelux Symp. on Inf. Theory, Veldhoven, The Netherlands, 2003.
G.I. Davida, Y. Frankel, and B.J. Matt. On enabling secure applications through off-line biometric identification. In IEEE Symposium on Privacy and Security, 1998.
G. I. Davida, Y. Frankel, and B.J. Matt. On the relation of error-correction and cryptography to an offline biometric based identification scheme. In proceedings WCC99, Workshop on Coding and Cryptography, 1999.
11 C. Soutar: Biometric Encryption for secure key generation, January 1998. Presentation at the 1998 RSA Data Security Conference
C. Soutar and G.J. Tomko: Secure private key generation using a fingerprint. In CardTech/SecurTech Conference Proceedings, Vol 1, pages 245–252, May 1996.
R. Chandrasekaran. Brave new World: ID systems using the human body are here, but privacy issues persist. Washington Post, 30 March 1997, p. HO–1
15 A.J. Menezes, P.C. van Oorschot and S.A. Vanstone, “Handbook of Applied Cryptopgraphy”, CRC Press, New York, 96.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Linnartz, JP., Tuyls, P. (2003). New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates. In: Kittler, J., Nixon, M.S. (eds) Audio- and Video-Based Biometric Person Authentication. AVBPA 2003. Lecture Notes in Computer Science, vol 2688. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44887-X_47
Download citation
DOI: https://doi.org/10.1007/3-540-44887-X_47
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-40302-9
Online ISBN: 978-3-540-44887-7
eBook Packages: Springer Book Archive