Biometric Template Protection: Bridging the performance gap between theory and practice

作者: Karthik Nandakumar , Anil K. Jain

DOI: 10.1109/MSP.2015.2427849

关键词:

摘要: Biometric recognition is an integral component of modern identity management and access control systems. Due to the strong permanent link between individuals their biometric traits, exposure enrolled users? information adversaries can seriously compromise system security user privacy. Numerous techniques have been proposed for template protection over last 20 years. While these are theoretically sound, they seldom guarantee desired noninvertibility, revocability, nonlinkability properties without significantly degrading performance. The objective this work analyze factors contributing performance divide highlight promising research directions bridge gap. design invariant representations remains a fundamental problem, despite recent attempts address issue through feature adaptation schemes. difficulty in estimating statistical distribution features not only hinders development better algorithms but also diminishes ability quantify noninvertibility existing algorithms. Finally, achieving use external secrets (e.g., passwords) continues be challenging proposition. Further on above issues required cross chasm theory practice ?template protection.

参考文章(51)
Davrondzhon Gafurov, Patrick Bours, Bian Yang, Christoph Busch, Independent Performance Evaluation of Pseudonymous Identifier Fingerprint Verification Algorithms international conference on image analysis and recognition. pp. 63- 71 ,(2013) , 10.1007/978-3-642-39094-4_8
Seny Kamara, Lucas Ballard, Michael K. Reiter, The practical subtleties of biometric key generation usenix security symposium. pp. 61- 74 ,(2008)
Kenta Takahashi, Takao Murakami, A measure of information gained through biometric systems Image and Vision Computing. ,vol. 32, pp. 1194- 1203 ,(2014) , 10.1016/J.IMAVIS.2013.12.010
Yongfang Zhu, Sarat C. Dass, Anil K. Jain, Statistical Models for Assessing the Individuality of Fingerprints IEEE Transactions on Information Forensics and Security. ,vol. 2, pp. 391- 401 ,(2007) , 10.1109/TIFS.2007.903846
C. Chen, R. N. J. Veldhuis, T. A. M. Kevenaar, A. H. M. Akkermans, Biometric quantization through detection rate optimized bit allocation EURASIP Journal on Advances in Signal Processing. ,vol. 2009, pp. 29- ,(2009) , 10.1155/2009/784834
Andy Adler, Richard Youmaran, Sergey Loyka, Towards a measure of biometric feature information Pattern Analysis and Applications. ,vol. 12, pp. 261- 270 ,(2009) , 10.1007/S10044-008-0120-3
Abhishek Nagar, Karthik Nandakumar, Anil K. Jain, Biometric template transformation: a security analysis Proceedings of SPIE. ,vol. 7541, ,(2010) , 10.1117/12.839976
Shenglin Yang, Ingrid Verbauwhede, Secure IRIS Verification international conference on acoustics, speech, and signal processing. ,vol. 2, pp. 133- 136 ,(2007) , 10.1109/ICASSP.2007.366190
Ye Wang, Shantanu Rane, Stark C. Draper, Prakash Ishwar, A Theoretical Analysis of Authentication, Privacy, and Reusability Across Secure Biometric Systems IEEE Transactions on Information Forensics and Security. ,vol. 7, pp. 1825- 1840 ,(2012) , 10.1109/TIFS.2012.2210215