Biometric Security from an Information -Theoretical Perspective

被引:30
|
作者
Ignatenko, Tanya [1 ]
Willems, Frans M. J. [1 ]
机构
[1] Eindhoven Univ Technol, Den Dolech 2, Eindhoven, Netherlands
关键词
D O I
10.1561/0100000051
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In this review, biometric systems are studied from an information theoretical point of view. In the first part biometric authentication systems are studied. The objective of these systems is, observing correlated enrollment and authentication biometric sequences, to generate or convey as large as possible secret keys by interchanging a public message, while minimizing privacy leakage. Here privacy leakage is defined as the amount of information that this public message contains about the biometric enrollment sequence. In this setting also the secrecy leakage, that is, the amount of information the public message leaks about the secret key, should be negligible. Next identification biometric systems are investigated. These systems should be able to identify as many individuals as possible while being able to assign as large as possible secret keys to each individual and again minimize the privacy leakage. To realize these systems public reference data are stored in the database. Leakage is defined with respect to these reference data. For all these biometric systems fundamental limits are determined in the current work. Finally, a popular practical construction for biometric systems, fuzzy commitment, is analyzed with respect to both its theoretical performance and performance related to the code choice.
引用
收藏
页码:135 / 316
页数:28
相关论文
共 50 条
  • [31] Theoretical Foundation for CMA-ES from Information Geometry Perspective
    Youhei Akimoto
    Yuichi Nagata
    Isao Ono
    Shigenobu Kobayashi
    [J]. Algorithmica, 2012, 64 : 698 - 716
  • [32] Information and Communication Technologies exclusively for consumer behavior from a theoretical perspective
    Rodolfo Lalaleo-Analuisa, Freddy
    Mauricio Bonilla-Jurado, Diego
    Enrique Robles-Salguero, Rodolfo
    [J]. RETOS-REVISTA DE CIENCIAS DE LA ADMINISTRACION Y ECONOMIA, 2021, 11 (21): : 147 - 164
  • [33] An Information Theoretical Model to Analyze the Security of Blockchains
    Alhefdi, Mohammad
    Alharthi, Abdulrahman M.
    Tanik, Murat M.
    [J]. SOUTHEASTCON 2021, 2021, : 566 - 568
  • [34] Organizational Information Security Management for Sustainable Information Systems: An Unethical Employee Information Security Behavior Perspective
    Chu, Amanda M. Y.
    So, Mike K. P.
    [J]. SUSTAINABILITY, 2020, 12 (08)
  • [35] Biometric template security
    Jain, Anil K.
    Nandakumar, Karthik
    Nagar, Abhishek
    [J]. EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2008,
  • [36] Biometric system security
    Wirtz, B
    [J]. SECURING ELECTRONIC BUSINESS PROCESSES, 2004, : 108 - 119
  • [37] Security of Biometric Systems
    Adamek, Milan
    Matysek, Miroslav
    Neumann, Petr
    [J]. 25TH DAAAM INTERNATIONAL SYMPOSIUM ON INTELLIGENT MANUFACTURING AND AUTOMATION, 2014, 2015, 100 : 169 - 176
  • [38] Biometric security technology
    Faundez-Zanuy, Marcos
    [J]. IEEE AEROSPACE AND ELECTRONIC SYSTEMS MAGAZINE, 2006, 21 (06) : 15 - 26
  • [39] Biometric Security Standardization
    Trikos, Mladen
    Tot, Ivan
    Bajcetic, Jovan
    Lalovic, Komlen
    Jovanovic, Borisa
    Bogicevic, Dusan
    [J]. 2019 ZOOMING INNOVATION IN CONSUMER TECHNOLOGIES CONFERENCE (ZINC), 2019, : 17 - 20
  • [40] ANALYSIS OF THE SECURITY OF LINEAR BLINDING TECHNIQUES FROM AN INFORMATION THEORETICAL POINT OF VIEW
    Bianchi, Tiziano
    Piva, Alessandro
    Barni, Mauro
    [J]. 2011 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, 2011, : 5852 - 5855