The FERET Evaluation Methodology for Face-Recognition Algorithms
IEEE Transactions on Pattern Analysis and Machine Intelligence
Secure smartcardbased fingerprint authentication
WBMA '03 Proceedings of the 2003 ACM SIGMM workshop on Biometrics methods and applications
Journal of Cognitive Neuroscience
From Scores to Face Templates: A Model-Based Approach
IEEE Transactions on Pattern Analysis and Machine Intelligence
EURASIP Journal on Advances in Signal Processing
A Biometric Key-Binding and Template Protection Framework Using Correlation Filters
ICB '09 Proceedings of the Third International Conference on Advances in Biometrics
A Security Analysis of Biometric Template Protection Schemes
ICIAR '09 Proceedings of the 6th International Conference on Image Analysis and Recognition
Chaos and NDFT-based spread spectrum concealing of fingerprint-biometric data into audio signals
Digital Signal Processing
Sorted index numbers for privacy preserving face recognition
EURASIP Journal on Advances in Signal Processing - Special issue on recent advances in biometric systems: a signal processing perspective
A hybrid approach for generating secure and discriminating face template
IEEE Transactions on Information Forensics and Security
Fingerprint template protection using fuzzy vault
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part III
Multi-factor biometrics for authentication: a false sense of security
Proceedings of the 12th ACM workshop on Multimedia and security
An analysis of random projection for changeable and privacy-preserving biometric verification
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Securing biometric templates for reliable identity authentication
ICIC'05 Proceedings of the 2005 international conference on Advances in Intelligent Computing - Volume Part II
A high performance fingerprint liveness detection method based on quality related features
Future Generation Computer Systems
Distinguishing users with capacitive touch communication
Proceedings of the 18th annual international conference on Mobile computing and networking
Spiral cube for biometric template protection
ICISP'12 Proceedings of the 5th international conference on Image and Signal Processing
Hi-index | 0.00 |
The goal of a biometric encryption system is to embed a secret into a biometric template in a way that can only be decrypted with a biometric image from the enroled person. This paper describes a potential vulnerability in such systems that allows a less-than-brute force regeneration of the secret and an estimate of the enrolled image. This vulnerability requires the biometric comparison to “leak” some information from which an analogue for a match score may be calculated. Using this match score value, a “hill-climbing” attack is performed against the algorithm to calculate an estimate of the enrolled image, which is then used to decrypt the code. Results are shown against a simplified implementation of the algorithm of Soutar et al. (1998).