Secure Biometrics [Concepts, authentication architectures, and challenges]

被引:61
作者
Rane, Shantanu [1 ]
Wang, Ye
Draper, Stark C. [1 ,2 ,3 ,4 ]
Ishwar, Prakash [5 ]
机构
[1] Mitsubishi Elect Res Labs, Cambridge, MA USA
[2] Univ Toronto, Toronto, ON M5S 1A1, Canada
[3] Univ Wisconsin, Madison, WI 53706 USA
[4] Univ Calif Berkeley, Berkeley, CA 94720 USA
[5] Boston Univ, Boston, MA 02215 USA
关键词
QUANTIZATION INDEX MODULATION; FUZZY VAULT; RECOGNITION; PRIVACY; ENCRYPTION;
D O I
10.1109/MSP.2013.2261691
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Biometrics are an important and widely used class of methods for identity verification and access control. Biometrics are attractive because they are inherent properties of an individual. They need not be remembered like passwords and are not easily lost or forged like identifying documents. At the same time, biometrics are fundamentally noisy and irreplaceable. There are always slight variations among the measurements of a given biometric, and, unlike passwords or identification numbers, biometrics are derived from physical characteristics that cannot easily be changed. The proliferation of biometric usage raises critical privacy and security concerns that, due to the noisy nature of biometrics, cannot be addressed using standard cryptographic methods. In this article, we present an overview of secure biometrics, also referred to as biometric template protection, an emerging class of methods that address these concerns.
引用
收藏
页码:51 / 64
页数:14
相关论文
共 64 条
  • [1] [Anonymous], 2011, 24745 ISOIE
  • [2] [Anonymous], 2003, Handbook of fingerprint recognition
  • [3] [Anonymous], ACNS
  • [4] Barni M, 2010, MM&SEC 2010: 2010 ACM SIGMM MULTIMEDIA AND SECURITY WORKSHOP, PROCEEDINGS, P231
  • [5] Blanton M, 2011, LECT NOTES COMPUT SC, V6879, P190, DOI 10.1007/978-3-642-23822-2_11
  • [6] Gait recognition: A challenging signal processing technology for biometric identification
    Boulgouris, NV
    Hatzinakos, D
    Plataniotis, KN
    [J]. IEEE SIGNAL PROCESSING MAGAZINE, 2005, 22 (06) : 78 - 90
  • [7] A survey of approaches and challenges in 3D and multi-modal 3D+2D face recognition
    Bowyer, KW
    Chang, K
    Flynn, P
    [J]. COMPUTER VISION AND IMAGE UNDERSTANDING, 2006, 101 (01) : 1 - 15
  • [8] Bringer J, 2007, LECT NOTES COMPUT SC, V4586, P96
  • [9] Bringer Julien., 2010, 2010 4 IEEE INT C BI, P1
  • [10] Fuzzy Key Binding Strategies Based on Quantization Index Modulation (QIM) for Biometric Encryption (BE) Applications
    Bui, Francis Minhthang
    Martin, Karl
    Lu, Haiping
    Plataniotis, Konstantinos N.
    Hatzinakos, Dimitrios
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (01) : 118 - 132