Skip to main content

New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates

  • Conference paper
  • First Online:
Audio- and Video-Based Biometric Person Authentication (AVBPA 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2688))

Abstract

In biometrics, a human being needs to be identified based on some characteristic physiological parameters. Often this recognition is part of some security system. Secure storage of reference data (i.e., user templates) of individuals is a key concern. It is undesirable that a dishonest verifier can misuse parameters that he obtains before or during a recognition process. We propose a method that allows a verifier to check the authenticity of the prover in a way that the verifier does not learn any information about the biometrics of the prover, unless the prover willingly releases these parameters. To this end, we introduce the concept of a delta-contracting and epsilon-revealing function which executes preprocessing in the biometric authentication scheme. It is believed that this concept can become a building block of a public infrastructure for biometric authentication that nonetheless preserves privacy of the participants.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. R. Papu, B. Recht, J. Taylor and N. Gerhenfeld, “Physical one-way functions”, Science, Vol. 297, 20 Sept. 2002, pp. 2026–2030.

    Google Scholar 

  2. S. Pankanti, R.M. Bolle and A. Jain, Biometrics-The future of Identification, IEEE Computer, Volume 33, No. 2, pp. 46–49, February 2002.

    Google Scholar 

  3. D. Polemi, “Review and evaluation of Biometric Techniques for Identification and Authentication-Final Report”, 1997, http://www.cordis.lu/infosec/src/stud5fr.htm

  4. Bruce Schneier, Applied Cryptography, J. Wiley, New York, 1993.

    MATH  Google Scholar 

  5. B. Chen and G.W. Wornell, “Digital Watermarking and Information embedding using dither modulation”, IEEE Workshop on Multimedia Signal Processing, Redondo Beach, CA, 1998.

    Google Scholar 

  6. A. Juels and M. Wattenberg. A Fuzzy Commitment Scheme. In G. Tsudik, ed., Sixth ACM Conference on Computer and Communications Security, pages 28–36, ACM Press, 1999.

    Google Scholar 

  7. Ari Juels en Madhu Sudan, “A fuzzy Vault scheme”, ICIT Proceedings Int. Symp. on Inf. Theory, p. 408, 30 Juni–5 July 2002, Lausanne.

    Google Scholar 

  8. D. Denteneer, J.P. Linnartz, P. Tuyls, E. Verbitskiy, “Reliable (robust) biometric Authentication with privacy protection”, acc. for The IEEE Benelux Symp. on Inf. Theory, Veldhoven, The Netherlands, 2003.

    Google Scholar 

  9. G.I. Davida, Y. Frankel, and B.J. Matt. On enabling secure applications through off-line biometric identification. In IEEE Symposium on Privacy and Security, 1998.

    Google Scholar 

  10. G. I. Davida, Y. Frankel, and B.J. Matt. On the relation of error-correction and cryptography to an offline biometric based identification scheme. In proceedings WCC99, Workshop on Coding and Cryptography, 1999.

    Google Scholar 

  11. 11 C. Soutar: Biometric Encryption for secure key generation, January 1998. Presentation at the 1998 RSA Data Security Conference

    Google Scholar 

  12. C. Soutar and G.J. Tomko: Secure private key generation using a fingerprint. In CardTech/SecurTech Conference Proceedings, Vol 1, pages 245–252, May 1996.

    Google Scholar 

  13. R. Chandrasekaran. Brave new World: ID systems using the human body are here, but privacy issues persist. Washington Post, 30 March 1997, p. HO–1

    Google Scholar 

  14. 15 A.J. Menezes, P.C. van Oorschot and S.A. Vanstone, “Handbook of Applied Cryptopgraphy”, CRC Press, New York, 96.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Linnartz, JP., Tuyls, P. (2003). New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates. In: Kittler, J., Nixon, M.S. (eds) Audio- and Video-Based Biometric Person Authentication. AVBPA 2003. Lecture Notes in Computer Science, vol 2688. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44887-X_47

Download citation

  • DOI: https://doi.org/10.1007/3-540-44887-X_47

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-40302-9

  • Online ISBN: 978-3-540-44887-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics