Entropy analysis and new constructions of biometric key generation systems

被引:27
作者
Golic, Jovan Dj. [1 ]
Baltatu, Madalina [1 ]
机构
[1] Telecom Italia, Secur Innovat, I-10148 Turin, Italy
关键词
biometric authentication; biometric key; covering radius; Euclidean metric; face biometrics; Hamming metric; key revocation; perfect codes; Reed-Solomon codes; Shannon entropy; template protection;
D O I
10.1109/TIT.2008.920211
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a new, soft two-level approach for the generation of multiple and revocable biometric keys, adapted to the analog nature of biometric signals, is proposed. It consists of a novel randomized soft code-offset construction for the Euclidean metric, at the first level, and a code-redundancy construction for the Hamming metric, possibly based on a Reed-Solomon code, at the second level. The Shannon entropy analysis shows that the new construction achieves optimal security with respect to biometric template protection, whereas the previously proposed constructions for the Euclidean metric are shown to be insecure in the multiple-key setting. In addition, a general code-offset construction for the Hamming metric is analyzed in terms of the Shannon entropy instead of the usual min entropy. This allows a nice characterization of the codes that provide biometric template protection in the multiple-key scenario as well as a further differentiation among these codes with respect to the achievable security level.
引用
收藏
页码:2026 / 2040
页数:15
相关论文
共 26 条
[1]   COMMON RANDOMNESS IN INFORMATION-THEORY AND CRYPTOGRAPHY .1. SECRET SHARING [J].
AHLSWEDE, R ;
CSISZAR, I .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1993, 39 (04) :1121-1132
[2]  
[Anonymous], 2005, COMPUTER
[3]  
Bicego M, 2005, LECT NOTES COMPUT SC, V3781, P15, DOI 10.1007/11569947_3
[4]  
Boyen X., 2004, Proceedings of the 11th ACM Conference on Computer and Communications Security, P82, DOI DOI 10.1145/1030083.1030096
[5]  
Chang EC, 2006, LECT NOTES COMPUT SC, V4004, P59
[6]  
CHOR B, 1990, LECT NOTES COMPUT SC, V435, P299
[7]   On enabling secure applications through off-line biometric identification [J].
Davida, GI ;
Frankel, Y ;
Matt, BJ .
1998 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1998, :148-157
[8]  
Dodis Y, 2004, LECT NOTES COMPUT SC, V3027, P523
[9]  
Feng Y. Cheng, 2006, PROTECTING FACE BIOM, P29
[10]   ON THE RELATIONSHIP BETWEEN THE INFORMATION MEASURES AND THE BAYES PROBABILITY OF ERROR [J].
GOLIC, JD .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1987, 33 (05) :681-693