Skip to main content

Additive Block Coding Schemes for Biometric Authentication with the DNA Data

  • Conference paper
Biometrics and Identity Management (BioID 2008)

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 5372))

Included in the following conference series:

Abstract

To implement a biometric authentication scheme, the templates of a group of people are stored in the database (DB) under the names of these people. Some person presents a name, and the scheme compares the template of this person and the template associated with the claimed person to accept or reject their identity [1]. The templates of people stored in the DB should be protected against attacks for discovery the biometrics and attacks for successful passing through the verification test. The authentication algorithm developed by Juels and Wattenberg [2] is a possible solution to the problem. However, implementations of this algorithm for practical data require generalized versions of the algorithm and their analysis. We introduce a mathematical model for DNA measurements and present such a generalization. Some numerical results illustrate the correction of errors for the DNA measurements of a legitimate user and protection of templates against attacks for successful passing the verification stage by an attacker.

This work was partially supported by the DFG.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bolle, R.M., Connell, J.H., Pankanti, S., Ratha, N.K., Senior, A.W.: Guide to Biometrics. Springer, NY (2004)

    Book  Google Scholar 

  2. Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: Proc. 6th ACM Conf. on Computer and Communication Security, pp. 28–36 (1999)

    Google Scholar 

  3. Korte, U., Krawczak, M., Merkle, J., Plaga, R., Niesing, M., Tiemann, C., Han Vinck, A.J., Martini, U.: A cryptographic biometric authentication system based on genetic fingerprints. In: Proc. Sicherheit 2008, Saarbrucken, Germany, pp. 263–276 (2008)

    Google Scholar 

  4. Balakirsky, V.B., Ghazaryan, A.R., Han Vinck, A.J.: Performance of additive block coding schemes oriented to biometric authentication. In: Proc. 29th Symp. on Information Theory in the Benelux, Leuven, Belgium (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Balakirsky, V.B., Ghazaryan, A.R., Vinck, A.J.H. (2008). Additive Block Coding Schemes for Biometric Authentication with the DNA Data. In: Schouten, B., Juul, N.C., Drygajlo, A., Tistarelli, M. (eds) Biometrics and Identity Management. BioID 2008. Lecture Notes in Computer Science, vol 5372. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-89991-4_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-89991-4_17

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-89990-7

  • Online ISBN: 978-3-540-89991-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics