Inside risks: the uses and abuses of biometrics
Communications of the ACM
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Password hardening based on keystroke dynamics
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Communications of the ACM
Biometrics, Personal Identification in Networked Society: Personal Identification in Networked Society
Fundamentals of Convolutional Coding
Fundamentals of Convolutional Coding
Information Theory and Reliable Communication
Information Theory and Reliable Communication
Information Theory: Coding Theorems for Discrete Memoryless Systems
Information Theory: Coding Theorems for Discrete Memoryless Systems
High Confidence Visual Recognition of Persons by a Test of Statistical Independence
IEEE Transactions on Pattern Analysis and Machine Intelligence
Handbook of Fingerprint Recognition
Handbook of Fingerprint Recognition
Biometric Recognition: Security and Privacy Concerns
IEEE Security and Privacy
Cryptographic Key Generation from Voice
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Enhancing security and privacy in biometrics-based authentication systems
IBM Systems Journal - End-to-end security
Biometric Systems: Technology, Design and Performance Evaluation
Biometric Systems: Technology, Design and Performance Evaluation
Maintaining secrecy when information leakage is unavoidable
Maintaining secrecy when information leakage is unavoidable
Face Recognition with Renewable and Privacy Preserving Binary Templates
AUTOID '05 Proceedings of the Fourth IEEE Workshop on Automatic Identification Advanced Technologies
Elements of Information Theory (Wiley Series in Telecommunications and Signal Processing)
Elements of Information Theory (Wiley Series in Telecommunications and Signal Processing)
Combining Crypto with Biometrics Effectively
IEEE Transactions on Computers
IEEE Transactions on Pattern Analysis and Machine Intelligence
Generating Cancelable Fingerprint Templates
IEEE Transactions on Pattern Analysis and Machine Intelligence
EURASIP Journal on Advances in Signal Processing
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
SIAM Journal on Computing
Embedding Renewable Cryptographic Keys into Continuous Noisy Data
ICICS '08 Proceedings of the 10th International Conference on Information and Communications Security
Achieving Secure Fuzzy Commitment Scheme for Optical PUFs
IIH-MSP '09 Proceedings of the 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing
On the interplay between Shannon's information measures and reliability criteria
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 1
Biometric systems: privacy and secrecy aspects
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
New shielding functions to enhance privacy and prevent misuse of biometric templates
AVBPA'03 Proceedings of the 4th international conference on Audio- and video-based biometric person authentication
Identification and secret-key generation in biometric systems with protected templates
Proceedings of the 12th ACM workshop on Multimedia and security
Secure sketch for biometric templates
ASIACRYPT'06 Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security
Cancelable key-based fingerprint templates
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Practical biometric authentication with template protection
AVBPA'05 Proceedings of the 5th international conference on Audio- and Video-Based Biometric Person Authentication
Performance prediction methodology for biometric systems using a large deviations approach
IEEE Transactions on Signal Processing - Part II
Protecting Biometric Templates With Sketch: Theory and Practice
IEEE Transactions on Information Forensics and Security - Part 2
Common randomness in information theory and cryptography. II. CR capacity
IEEE Transactions on Information Theory
Common randomness and secret key generation with a helper
IEEE Transactions on Information Theory
Secrecy capacities for multiple terminals
IEEE Transactions on Information Theory
A simple proof of the entropy-power inequality
IEEE Transactions on Information Theory
Hardening fingerprint Fuzzy vault using password
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Hi-index | 0.00 |
In this review, biometric systems are studied from an information theoretical point of view. In the first part biometric authentication systems are studied. The objective of these systems is, observing correlated enrollment and authentication biometric sequences, to generate or convey as large as possible secret keys by interchanging a public message, while minimizing privacy leakage. Here privacy leakage is defined as the amount of information that this public message contains about the biometric enrollment sequence. In this setting also the secrecy leakage, that is, the amount of information the public message leaks about the secret key, should be negligible. Next identification biometric systems are investigated. These systems should be able to identify as many individuals as possible while being able to assign as large as possible secret keys to each individual and again minimize the privacy leakage. To realize these systems public reference data are stored in the database. Leakage is defined with respect to these reference data. For all these biometric systems fundamental limits are determined in the current work. Finally, a popular practical construction for biometric systems, fuzzy commitment, is analyzed with respect to both its theoretical performance and performance related to the code choice.