CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Guide to Biometrics
Constructing Passwords from Biometrical Data
ICB '09 Proceedings of the Third International Conference on Advances in Biometrics
A simple scheme for constructing fault-tolerant passwords from biometric data
EURASIP Journal on Information Security
Biometric authentication based on significant parameters
BioID'11 Proceedings of the COST 2101 European conference on Biometrics and ID management
Hi-index | 0.00 |
To implement a biometric authentication scheme, the templates of a group of people are stored in the database (DB) under the names of these people. Some person presents a name, and the scheme compares the template of this person and the template associated with the claimed person to accept or reject their identity [1]. The templates of people stored in the DB should be protected against attacks for discovery the biometrics and attacks for successful passing through the verification test. The authentication algorithm developed by Juels and Wattenberg [2] is a possible solution to the problem. However, implementations of this algorithm for practical data require generalized versions of the algorithm and their analysis. We introduce a mathematical model for DNA measurements and present such a generalization. Some numerical results illustrate the correction of errors for the DNA measurements of a legitimate user and protection of templates against attacks for successful passing the verification stage by an attacker.