Abstract
While biometrics is useful for secure and accurate identification of a person, it also has serious privacy implications in handling large databases of biometrics. Standard encryption techniques have limited use for handling biometrics templates and signals as intra-person variations can’t be handled effectively using information security techniques. As a way to enhance privacy and security of biometrics databases, we present a pattern recognition-based model to analyze the threats to a biometrics-based authentication system and also a novel solution to enhances privacy. Cancelable biometrics is an emerging concept, where transformations that hide the biometrics signatures (fingerprints, faces and iris) are designed so that the identity can be established with added security. Other methods have been proposed for enhancing privacy in biometrics. In this paper, we will describe our threat model for biometrics recognition and recent advances proposed for privacy enhancements for fingerprint and iris biometrics.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Rood, E., Jain, A.K.: Biometric research agenda: Report of the NSF workshop. In: Workshop for a Biometric Research Agenda, Morgantown, WV (July 2003)
Matsumoto, T., Matsumoto, H., Yamada, K., Hoshino, S.: Impact of artificial gummy fingers on fingerprint systems. In: Proceedings of SPIE, Optical Security and Counterfeit Deterrence Techniques IV, vol. 8577 (2002)
Bolle, R., Connell, J., Pankanti, S., Ratha, N., Senior, A.: Guide to Biometrics. Springer, Heidelberg (2003)
Kansala, I., Tikkanen, P.: Security risk analysis of fingerprint based verification in PDAs. In: Proc. IEEE AutoID 2002, Tarrytown, NY, March 2002, pp. 76–82 (2002)
Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal 40(3), 614–634 (2001)
Ratha, N.K., Connell, J.H., Bolle, R.M.: Biometrics break-ins and band aids. Pattern Recognition Letters 24(13), 2105–2113 (2003)
Bolle, R.M., Connell, J.H., Ratha, N.K.: Biometric Perils and Patches. Pattern Recognition 35(12), 2727–2738 (2002)
Ratha, N.K., Chikkerur, S., Connell, J.H., Bolle, R.M.: Generating cancelable fingerprint templates. IEEE Trans. on PAMI 29(4), 561–572 (2007)
Ratha, N.K., Chikkerur, S., Connell, J.H., Bolle, R.M.: Privacy enhancements for inexact biometrics templates. In: Tuyls, P., Skoric, B., Kevenaar, T. (eds.) Security with Noisy Data. Springer, Heidelberg (2007)
Chikkerur, S., Connell, J., Ratha, N.: Generating Registration-free Cancelable Fingerprint Templates. In: Proc. of BTAS 2008 Conference (September 2008)
Zuo, J., Ratha, N., Connell, J.: Cancelable Iris Biometric. In: Proc. of IAPR conf. ICPR 2008, December 2008,
Farooq, F., Bolle, R.M., Jea, T.-Y., Ratha, N.: Anonymous and Revocable Fingerprint Recognition. In: Proc. of CVPR Workshop on Biometrics, Minneapolis (2007)
Cavoukian, A., Stoianov, A.: Biometrics Encryption: A positive-sum technology that achieves strong authentication, security and privacy (2007), www.ipc.on.ca
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ratha, N.K. (2010). Privacy Protection in High Security Biometrics Applications. In: Kumar, A., Zhang, D. (eds) Ethics and Policy of Biometrics. ICEB 2010. Lecture Notes in Computer Science, vol 6005. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12595-9_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-12595-9_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-12594-2
Online ISBN: 978-3-642-12595-9
eBook Packages: Computer ScienceComputer Science (R0)