2010
DOI: 10.1007/978-3-642-13241-4_18
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Preserving Key Generation for Iris Biometrics

Abstract: Abstract. In this work we present a new technique for generating cryptographic keys out of iris textures implementing a key-generation scheme. In contrast to existing approaches to iris-biometric cryptosystems the proposed scheme does not store any biometric data, neither in raw nor in encrypted form, providing high secrecy in terms of template protection. The proposed approach is tested on a widely used database revealing key generation rates above 95%.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2011
2011
2024
2024

Publication Types

Select...
4
4
2

Relationship

1
9

Authors

Journals

citations
Cited by 30 publications
(8 citation statements)
references
References 16 publications
(34 reference statements)
0
8
0
Order By: Relevance
“…The best Genuine Acceptance Rate (GAR) reported was 83.4% and 91.1% respectively for CASIAv1 and CASIAv3 iris databases (Center for Biometrics and Security Research, Beijing, China) under adequate system security. Rathgeb et al [28] have proposed an iris key generation scheme based on interval mapping for iris features in real values. The highest key generation rate reported on CASIAv3 was 95.09% for five enrollment samples.…”
Section: Related Work Problem Definitionmentioning
confidence: 99%
“…The best Genuine Acceptance Rate (GAR) reported was 83.4% and 91.1% respectively for CASIAv1 and CASIAv3 iris databases (Center for Biometrics and Security Research, Beijing, China) under adequate system security. Rathgeb et al [28] have proposed an iris key generation scheme based on interval mapping for iris features in real values. The highest key generation rate reported on CASIAv3 was 95.09% for five enrollment samples.…”
Section: Related Work Problem Definitionmentioning
confidence: 99%
“…Privacy-preserving finger code authentication [25], and privacy-preserving key generation for iris biometrics [26] are two approaches that apply cryptographic methods to maintain the privacy of fingerprint and iris data. However, these solutions also need more efficient procedures, as cryptographic approaches are inefficient in calculations [26,27]. Privacy-preserving fingerprint and iris analysis can be possible future applications for PEEP, but this needs further investigation.…”
Section: Related Workmentioning
confidence: 99%
“…Rathgeb and Uhl [86] extended the scheme of [82] to iris biometrics generating 128-bit keys. In [87] the authors apply a context-based reliable component selection and construct intervals for the most reliable features of each subject.…”
Section: ) Quantization Schemesmentioning
confidence: 99%