FuzzyHash: A secure biometric template protection technique

被引:4
作者
Jin, Andrew Teoh Beng [1 ]
Kim, Jaihie [1 ]
机构
[1] Yonsei Univ, BERC, Seoul 120749, South Korea
来源
PROCEEDINGS OF THE FRONTIERS IN THE CONVERGENCE OF BIOSCIENCE AND INFORMATION TECHNOLOGIES | 2007年
关键词
D O I
10.1109/FBIT.2007.31
中图分类号
Q81 [生物工程学(生物技术)]; Q93 [微生物学];
学科分类号
071005 ; 0836 ; 090102 ; 100705 ;
摘要
Biometrics is likely to provide a new level of security to applications since application users will need to prove their identity when attempting access. Yet if the stored biometric template is compromised then the conventional biometric recognition system is vulnerable to privacy invasion, which is also a permanent loss because the biometric template is not replaceable. We introduce a new technique for protecting the biometric template called FuzzyHashing. It takes inspiration in the cryptographic hashing function, which endows it with properties that are desirable for improved security such as: one-way transformation, confusion, diffusion etc. After an enumeration of the design requirements of FuzzyHashing we demonstrate one of its realizations in the context of face biometrics.
引用
收藏
页码:688 / 694
页数:7
相关论文
共 15 条
  • [1] [Anonymous], P IEEE INT S INF THE
  • [2] BOULT TE, 2007, P COMP VIS IN PRESS
  • [3] Confusion/diffusion capabilities of some robust hash functions
    Coskun, Baris
    Memon, Nasir
    [J]. 2006 40TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS, VOLS 1-4, 2006, : 1188 - 1193
  • [4] On enabling secure applications through off-line biometric identification
    Davida, GI
    Frankel, Y
    Matt, BJ
    [J]. 1998 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1998, : 148 - 157
  • [5] Juels A, 1999, 6TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P28, DOI 10.1145/319709.319714
  • [6] NANDAKUMAR K, 2007, 2 INT C BIO IN PRESS
  • [7] PURSER M, 1995, INTRO ERROR CORRECTI
  • [8] SCHNEIER B, 1999, COMMUNICATION ACM, V42
  • [9] COMMUNICATION THEORY OF SECRECY SYSTEMS
    SHANNON, CE
    [J]. BELL SYSTEM TECHNICAL JOURNAL, 1949, 28 (04): : 656 - 715
  • [10] Biometric encryption™ using image processing
    Soutar, C
    Roberge, D
    Stoianov, A
    Gilroy, R
    Kumar, BVKV
    [J]. OPTICAL SECURITY AND COUNTERFEIT DETERRENCE TECHNIQUES II, 1998, 3314 : 178 - 188