Incremental Design of Secure Biometric Identification and Authentication

被引:0
|
作者
Zhou, Linghui [1 ,2 ]
Oechtering, Tobias J. [1 ,2 ]
Skoglund, Mikael [1 ,2 ]
机构
[1] KTH Royal Inst Technol, Div Informat Sci & Engn, S-10044 Stockholm, Sweden
[2] KTH Digital Future Ctr, S-10044 Stockholm, Sweden
基金
瑞典研究理事会;
关键词
D O I
10.1109/ISIT45174.2021.9518285
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this work, we study incrementally designed secure biometric identification and authentication systems, in which a new system is designed based on an existing legacy system. By taking privacy and secrecy into consideration, we characterize the fundamental trade-offs among the identification rate, secret key rates, and privacy leakage rate.
引用
收藏
页码:3196 / 3201
页数:6
相关论文
共 50 条
  • [31] Polar Codes for Biometric Identification and Authentication
    Zhou, Linghui
    Oechtering, Tobias J.
    Skoglund, Mikael
    2021 IEEE INFORMATION THEORY WORKSHOP (ITW), 2021,
  • [32] Secure biometric system design
    Yanushkevich, Svetlana N.
    2012 THIRD INTERNATIONAL CONFERENCE ON EMERGING SECURITY TECHNOLOGIES (EST), 2012, : 1 - 7
  • [33] Fully Featured Secure Biometric Smart Card Device for Fingerprint-based Authentication and Identification
    Beauge, Lionel
    Drygajlo, Andrzej
    MM&SEC 2010: 2010 ACM SIGMM MULTIMEDIA AND SECURITY WORKSHOP, PROCEEDINGS, 2010, : 181 - 186
  • [34] Incremental updating of advanced correlation filters for biometric authentication systems
    Savvides, M
    Venkataramani, K
    Kumar, BVKV
    2003 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOL III, PROCEEDINGS, 2003, : 229 - 232
  • [35] DESIGN OF A DUAL BIOMETRIC AUTHENTICATION SYSTEM
    Singh, Tripty
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 845 - 850
  • [36] Secure authentication system that generates seed from biometric information
    Kim, Y
    Ahn, JH
    Byun, H
    APPLIED OPTICS, 2005, 44 (05) : 735 - 741
  • [37] Lattice-Based Secure Biometric Authentication for Hamming Distance
    Cheon, Jung Hee
    Kim, Dongwoo
    Kim, Duhyeong
    Lee, Joohee
    Shin, Junbum
    Song, Yongsoo
    INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 653 - 672
  • [38] Appearance-based biometric recognition: Secure authentication and cancellability
    Dabbah, M. A.
    Woo, W. L.
    Dlay, S. S.
    PROCEEDINGS OF THE 2007 15TH INTERNATIONAL CONFERENCE ON DIGITAL SIGNAL PROCESSING, 2007, : 479 - +
  • [39] Blind Authentication: A Secure Crypto-Biometric Verification Protocol
    Upmanyu, Maneesh
    Namboodiri, Anoop M.
    Srinathan, Kannan
    Jawahar, C. V.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (02) : 255 - 268
  • [40] Secure biometric template generation for multi-factor authentication
    Khan, Salman H.
    Akbar, M. Ali
    Shahzad, Farrukh
    Farooq, Mudassar
    Khan, Zeashan
    PATTERN RECOGNITION, 2015, 48 (02) : 458 - 472