[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1007/11527923_45guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Practical biometric authentication with template protection

Published: 20 July 2005 Publication History

Abstract

In this paper we show the feasibility of template protecting biometric authentication systems. In particular, we apply template protection schemes to fingerprint data. Therefore we first make a fixed length representation of the fingerprint data by applying Gabor filtering. Next we introduce the reliable components scheme. In order to make a binary representation of the fingerprint images we extract and then quantize during the enrollment phase the reliable components with the highest signal to noise ratio. Finally, error correction coding is applied to the binary representation. It is shown that the scheme achieves an EER of approximately 4.2% with secret length of 40 bits in experiments.

References

[1]
A.M. Bazen and S.H. Gerez, Systematic Methods for the Computation of the Directional Field and Singular Points of Fingerprints IEEE Trans. PAMI,2002, 24, 7, 905-919.
[2]
A.M. Bazen and R.N.J. Veldhuis, Detection of cores in fingerprints with improved dimension reduction Proc. SPS 2004, 41-44, Hilvarenbeek, The Netherlands,
[3]
A.M. Bazen and R.N.J. Veldhuis, Likelihood Ratio-Based Biometric Verification, IEEE Trans. Circuits and Systems for Video Technology, 2004, 14, 1, 86-94.
[4]
J. Bolling, A window to your health, In Jacksonville Medicine, 51, Special Issue: Retinal deseases.
[5]
Y. Dodis, L. Reyzin, A. Smith, Fuzzy Extractors: How to generate strong secret keys from biometrics and other noisy data, In Advances in Cryptology - Eurocrypt'04, LNCS 3027, 523-540, 2004.
[6]
A.K. Jain and S. Prabhakar and L. Hong and S. Pankanti, Filterbank-Based Fingerprint Matching, IEEE Trans. Image Processing, 2000, 9, 5, 846-859.
[7]
U. Uludag, S. Pankanti, S. Prabhakar, and A.K. Jain, Biometric Cryptosystems: Issues and Challenges, In Proceedings of the IEEE, Vol. 92, 6, June 2004.
[8]
A. Juels, M. Sudan, A Fuzzy Vault Scheme Proceedings of the 2002 International Symposium on Information Theory (ISIT 2002), Lausanne.
[9]
A. Juels and M. Wattenberg, A fuzzy commitment scheme, 6th ACM Conference on Computer and Communication Security, p. 28-36, 1999.
[10]
J.-P. Linnartz and P. Tuyls, New shielding functions to enhance privacy and prevent misuse of biometric templates, 4th International Conference on Audio- and Video-Based Biometric Person Authentication, 2003.
[11]
D. Maio, D. Maltoni, R. Cappelli, J.L. Wayman and A.K. Jain, FVC2000: Fingerprint Verification Competition, IEEE Trans. PAMI, 2002, 24, 3, 402- 412.
[12]
D. Maltoni, D. Maio, A. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition, Springer-Verlag New-York 2003.
[13]
L. Penrose, Dermatoglyphic topology, Nature, 205, (1965) 545-546.
[14]
B. Schneier, Inside risks: The uses and abuses of Biometrics, Communications of the ACM, 42, p136, 1999.
[15]
C. Soutar, D. Roberge, S.A. Stojanov, R. Gilroy and B.V.K. Vijaya Kumar, Biometric Encryption-Enrollment and Verification Procedures, Proc. of SPIE, Vol. 3386, 24-35, April 1998.
[16]
P. Tuyls and J. Goseling, Capacity and Examples of Template Protecting Biometric Authentication Systems, Biometric Authentication Workshop (BioAW 2004), LNCS 3087, 158-170, Prague, 2004.
[17]
P. Tuyls, E. Verbitskiy, T. Ignatenko, D. Schobben and T.H. Akkermans Privacy Protected Biometric Templates: Ear Identification Proceedings of SPIE, Vol. 5404, 176-182, April 2004.

Cited By

View all
  • (2025)Remote secure object authenticationComputers and Security10.1016/j.cose.2024.104131148:COnline publication date: 1-Jan-2025
  • (2022)A Secure Authentication Protocol for Cholesteric Spherical Reflectors Using Homomorphic EncryptionProgress in Cryptology - AFRICACRYPT 202210.1007/978-3-031-17433-9_18(425-447)Online publication date: 18-Jul-2022
  • (2019)A Survey on Modality Characteristics, Performance Evaluation Metrics, and Security for Traditional and Wearable Biometric SystemsACM Computing Surveys10.1145/330955052:2(1-36)Online publication date: 7-May-2019
  • Show More Cited By
  1. Practical biometric authentication with template protection

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    AVBPA'05: Proceedings of the 5th international conference on Audio- and Video-Based Biometric Person Authentication
    July 2005
    1129 pages
    ISBN:3540278877
    • Editors:
    • Takeo Kanade,
    • Anil Jain,
    • Nalini K. Ratha

    Sponsors

    • Springer
    • Motorola: Motorola
    • IAPR: International Association for Pattern Recognition
    • IBMR: IBM Research
    • Identix: Identix

    Publisher

    Springer-Verlag

    Berlin, Heidelberg

    Publication History

    Published: 20 July 2005

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 30 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2025)Remote secure object authenticationComputers and Security10.1016/j.cose.2024.104131148:COnline publication date: 1-Jan-2025
    • (2022)A Secure Authentication Protocol for Cholesteric Spherical Reflectors Using Homomorphic EncryptionProgress in Cryptology - AFRICACRYPT 202210.1007/978-3-031-17433-9_18(425-447)Online publication date: 18-Jul-2022
    • (2019)A Survey on Modality Characteristics, Performance Evaluation Metrics, and Security for Traditional and Wearable Biometric SystemsACM Computing Surveys10.1145/330955052:2(1-36)Online publication date: 7-May-2019
    • (2019)Security Requirements for Store-on-Client and Verify-on-Server Secure Biometric AuthenticationEmerging Technologies for Authorization and Authentication10.1007/978-3-030-39749-4_6(86-103)Online publication date: 27-Sep-2019
    • (2019)Obfuscated Fuzzy Hamming Distance and Conjunctions from Subset Product ProblemsTheory of Cryptography10.1007/978-3-030-36030-6_4(81-110)Online publication date: 1-Dec-2019
    • (2019)Offline Signature Verification Using Textural DescriptorsPattern Recognition and Image Analysis10.1007/978-3-030-31321-0_16(177-188)Online publication date: 1-Jul-2019
    • (2017)An approach to matching fingerprints using cryptographic one-way hashesInternational Journal of Biometrics10.1504/IJBM.2017.0866459:3(205-224)Online publication date: 1-Jan-2017
    • (2017)Ensemble audio segmentation for radio and television programmesMultimedia Tools and Applications10.1007/s11042-016-3386-276:5(7421-7444)Online publication date: 1-Mar-2017
    • (2017)Secured Offline Authentication on Industrial Mobile Robots Using Biometric DataRoboCup 2017: Robot World Cup XXI10.1007/978-3-030-00308-1_12(143-155)Online publication date: 27-Jul-2017
    • (2015)Security and efficiency analysis of the Hamming distance computation protocol based on oblivious transferSecurity and Communication Networks10.5555/2914422.29144898:18(4123-4135)Online publication date: 1-Dec-2015
    • Show More Cited By

    View Options

    View options

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media