The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Over the past decade, the trustworthiness of biometrics during authentication, and mostly, verification processes has been compromised by spoofing attackers sprang up to exploit the security gaps. In terms of spoofing, a non-colluding honest entity tries to fake somebody else's identity by presenting samples of that person's traits, or tries to gain benefit from the “leakage” of stored biometric information...
In this paper, we extend the information theoretic secure constructions for biometrics to the computational setting. Based on semantically secure encryption, we introduce robust, fully private and secure biometric key distillation and verification. Our model incorporates an adversary with side information who has access to a database with reference information. Even though our schemes are based on...
The challenge in applying the known information theoretical measures for biometric authentication systems is that on one hand these measures are defined in a specific context and on the other hand there are several constructions known for the protection of biometric information. The goal of this work is to organize and conceptualize the existing knowledge in the area of security of biometrics and...
The widespread deployment of surveillance cameras has raised serious privacy concerns. Many privacy-enhancing schemes have been recently proposed to identify selected individuals and redact their images in the surveillance video. To identify individuals, the best known approach is to use biometric signals as they are immutable and highly discriminative. If misused, these characteristics of biometrics...
In this paper, we propose a secure and robust biometric hashing method. We use Radon transform, min-max quantizer and Reed-Muller decoder in this method. Our goal is to preserve privacy in a biometric recognition system while achieving the desirable accuracy rate. We do the verification using the hash values and hence increase the security of the system. In addition, we guarantee the irreversibility...
In this paper, we describe a new primitive for error-tolerant searchable encryption and a security model for it. This generic scheme permits to make searches on encrypted data with only an approximation of some keyword. It enables to efficiently query secure databases in order to get the exact data with a close estimation of it. An application to biometric identification arises from this construction...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.