Secure Methods for Fuzzy Key Binding in Biometric Authentication Applications

被引:4
|
作者
Bui, Francis Minhthang [1 ]
Hatzinakos, Dimitrios [1 ]
机构
[1] Univ Toronto, Edward S Rogers Sr Dept Elect & Comp Engn, Toronto, ON M5S 3G4, Canada
关键词
D O I
10.1109/ACSSC.2008.5074642
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Biometric methods are increasingly being utilized for security applications. A major challenge is that the physiological signals involved typically have a high degree of noise. This characteristic negates conventional cryptographic solutions. Therefore, alternative authentication methods based on fuzzy commitment and multibit quantization index modulation are considered. Using the electrocardiogram biometiic as a case study, it is shown that these methods offer the flexibility of designing security constraints in a statistical manner. By providing the means to balance the trade-off between system robustness and security, this flexibility facilitates the application of biometric security in a wider range of scenarios.
引用
收藏
页码:1363 / 1367
页数:5
相关论文
共 50 条
  • [1] Secure Authentication Using Biometric Methods
    Rejman-Greene, Marek
    [J]. Information Security Technical Report, 2002, 7 (03): : 30 - 40
  • [2] Fuzzy identity based signature with applications to biometric authentication
    Yang, Piyi
    Cao, Zhenfu
    Dong, Xiaolei
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (04) : 532 - 540
  • [3] A secure fuzzy extractor based biometric key authentication scheme for body sensor network in Internet of Medical Things
    Mahendran, Rakesh Kumar
    Velusamy, Parthasarathy
    [J]. COMPUTER COMMUNICATIONS, 2020, 153 : 545 - 552
  • [4] Combining Steganography and Biometric Cryptosystems for Secure Mutual Authentication and Key Exchange
    Al-Assam, Hisham
    Rashid, Rasber
    Jassim, Sabah
    [J]. 2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 369 - 374
  • [5] On privacy in secure biometric authentication systems
    Ignatenko, Tanya
    Willems, Frans
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOL II, PTS 1-3, 2007, : 121 - +
  • [6] Secure biometric authentication with improved accuracy
    Barbosa, Manuel
    Brouard, Thierry
    Cauchie, Stephane
    de Sousa, Simao Melo
    [J]. INFORMATION SECURITY AND PRIVACY, 2008, 5107 : 21 - +
  • [7] A secure biometric authentication based on PEKS
    Zhang, Yue
    Qin, Jing
    Du, Lihua
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (04): : 1111 - 1123
  • [8] Fuzzy Key Binding Strategies Based on Quantization Index Modulation (QIM) for Biometric Encryption (BE) Applications
    Bui, Francis Minhthang
    Martin, Karl
    Lu, Haiping
    Plataniotis, Konstantinos N.
    Hatzinakos, Dimitrios
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (01) : 118 - 132
  • [9] Anonymous and robust biometric authentication scheme for secure social IoT healthcare applications
    Arpitha T.
    Chouhan D.
    Shreyas J.
    [J]. Journal of Engineering and Applied Science, 2024, 71 (01):
  • [10] Provably secure biometric based authentication and key agreement protocol for wireless sensor networks
    Srinivas, Jangirala
    Mishra, Dheerendra
    Mukhopadhyay, Sourav
    Kumari, Saru
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (04) : 875 - 895