The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The impressive amount of recent technological advancements in the area of information systems have brought along, besides the multitude of positive aspects, some negative aspects too. The most obvious one is represented by the fact that the technological innovations are prone to various categories of threats. Making sure that information stays safe, unaltered and secret is an integral part of providing...
Over the past decade, the trustworthiness of biometrics during authentication, and mostly, verification processes has been compromised by spoofing attackers sprang up to exploit the security gaps. In terms of spoofing, a non-colluding honest entity tries to fake somebody else's identity by presenting samples of that person's traits, or tries to gain benefit from the “leakage” of stored biometric information...
We analyze the security of biometric template protection methods that involve trusted hardware. The methods are defined in the black box security model, i.e., we consider components that perform operations on the biometric data they contain and only the input-output behaviour of these components is analyzed. The functionality that is implemented by these black boxes is assumed to be known, but as...
The secure set-intersection protocol is a cryptographic protocol that retrieves the intersection of two or more datasets without revealing any additional information apart from the intersection data. In this paper we formalize the secure matching tag, which is frequently used in the existing secure set-intersection protocols, and propose applying the tag to privacy-enhancing biometrics. Due to the...
Crypto-biometric systems, which combine biometrics with cryptographic systems, are gaining more and more attention. Person verification with high degree of assurance offered by biometrics can greatly improve the security of a cryptographic system. In such systems, a stable crypto-biometric key (to be used for cryptography) is derived from biometrics and a strong link between the user identity and...
In this work we advocate an approach for the statistical performance analysis of an identification system. The statistical performance analysis is accomplished for the corresponding probability of miss and false acceptance based on the order statistic list decoding framework.
Scalable Securing biometric information has become essential with growing biometric applications in different sectors of society. Vulnerability assessment plays a key role in improving the security of any security system by identifying the potential vulnerabilities and proposing countermeasures to mitigate the threats posed by them. In this work self-generated and dynamic helper data based system...
Biometrics lack revocability and privacy while cryptography cannot detect the user's identity. By obtaining cryptographic keys using biometrics, one can achieve the properties such as revocability, assurance about user's identity, and privacy. In this paper, we propose a multi-biometric based cryptographic key regeneration scheme. Since left and right irises of a person are uncorrelated, we treat...
In this paper, we propose a secure and robust biometric hashing method. We use Radon transform, min-max quantizer and Reed-Muller decoder in this method. Our goal is to preserve privacy in a biometric recognition system while achieving the desirable accuracy rate. We do the verification using the hash values and hence increase the security of the system. In addition, we guarantee the irreversibility...
The security of wireless body sensor network (BSN) is very important to telemedicine and m-healthcare, and it still remains a critical challenge. This paper presents a novel key distribution solution which allows two sensors in one BSN to agree on a changeable cryptographic key. A previously published scheme, fuzzy vault, is firstly applied to secure the random cryptographic key generated from electrocardiographic...
When biometric recognition is used for identification or verification it is important to assure the privacy of the data subject. This can be accomplished by using template protection mechanisms. These transform a feature vector that is derived from a data subject's biometric characteristic into a protected template (pseudo identity) and thus guarantee that no additional information such as health-related...
The challenges in biometrics research activities have expanded recently to include the maintenance of security and privacy of biometric templates beside the traditional work to improve accuracy, speed, and robustness. Revocable biometric templates and biometric cryptosystems have been developed as template protection measures. Revocability means that biometric templates could be revoked in the same...
Cancelable biometrics were introduced by Ratha et al. in 2001 to obtain templates which are renewable and do not let come back to the original biometric trait. We extend this technique to achieve the property of untraceability among different identifications across time. To this end, we need time-dependent templates. We here describe a system relying on time-dependent cancelable biometrics and analyse...
In recent years the protection of biometric data has gained increased interest from the scientific community. Methods such as the helper data system, fuzzy extractors, fuzzy vault and cancellable biometrics have been proposed for protecting biometric data. Most of these methods use cryptographic primitives and require a binary representation from the real-valued biometric data. Hence, the similarity...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.