Biometric Security from an Information -Theoretical Perspective

被引:30
|
作者
Ignatenko, Tanya [1 ]
Willems, Frans M. J. [1 ]
机构
[1] Eindhoven Univ Technol, Den Dolech 2, Eindhoven, Netherlands
关键词
D O I
10.1561/0100000051
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In this review, biometric systems are studied from an information theoretical point of view. In the first part biometric authentication systems are studied. The objective of these systems is, observing correlated enrollment and authentication biometric sequences, to generate or convey as large as possible secret keys by interchanging a public message, while minimizing privacy leakage. Here privacy leakage is defined as the amount of information that this public message contains about the biometric enrollment sequence. In this setting also the secrecy leakage, that is, the amount of information the public message leaks about the secret key, should be negligible. Next identification biometric systems are investigated. These systems should be able to identify as many individuals as possible while being able to assign as large as possible secret keys to each individual and again minimize the privacy leakage. To realize these systems public reference data are stored in the database. Leakage is defined with respect to these reference data. For all these biometric systems fundamental limits are determined in the current work. Finally, a popular practical construction for biometric systems, fuzzy commitment, is analyzed with respect to both its theoretical performance and performance related to the code choice.
引用
收藏
页码:135 / 316
页数:28
相关论文
共 50 条
  • [1] Robust Biometric Authentication from an Information Theoretic Perspective
    Grigorescu, Andrea
    Boche, Holger
    Schaefer, Rafael F.
    [J]. ENTROPY, 2017, 19 (09)
  • [2] A biometric standard for information management and security
    Matyas, SM
    Stapleton, J
    [J]. COMPUTERS & SECURITY, 2000, 19 (05) : 428 - 441
  • [3] Adversarial Biometric Recognition [A review on biometric system security from the adversarial machine-learning perspective]
    Biggio, Battista
    Fumera, Giorgio
    Russu, Paolo
    Didaci, Luca
    Roli, Fabio
    [J]. IEEE SIGNAL PROCESSING MAGAZINE, 2015, 32 (05) : 31 - 41
  • [4] An Information Theoretic Framework for Biometric Security Systems
    Lai, Lifeng
    Ho, Siu-Wai
    Poor, H. Vincent
    [J]. ADVANCES IN BIOMETRICS, 2009, 5558 : 879 - +
  • [5] Biometric user authentication for heightened information security
    Xiao, QH
    [J]. BIOMETRIC AUTHENTICATION, PROCEEDINGS, 2004, 3072 : 708 - 715
  • [6] Unraveling juxtaposed effects of biometric characteristics on user security behaviors: A controversial information technology perspective
    Zhang, Jing
    Liu, Zilong
    Luo, Xin
    [J]. DECISION SUPPORT SYSTEMS, 2024, 183
  • [7] Security Perspective of Biometric Recognition and Machine Learning Techniques
    Arslan, Bilgehan
    Yorulmaz, Ezgi
    Akca, Burcin
    Sagiroglu, Seref
    [J]. 2016 15TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2016), 2016, : 492 - 497
  • [8] Information security of healthcare systems: using a biometric approach
    Andreeva, E.
    [J]. MODELLING IN MEDICINE AND BIOLOGY X, 2013, 17 : 109 - 115
  • [9] Theoretical aspects of information security
    Vydrin A.S.
    [J]. Journal of Mathematical Sciences, 2009, 156 (2) : 261 - 275
  • [10] Face detection of ubiquitous surveillance images for biometric security from an image enhancement perspective
    Iqbal, Kashif
    Odetayo, Michael O.
    James, Anne
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2014, 5 (01) : 133 - 146