2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops 2012
DOI: 10.1109/cvprw.2012.6239222
|View full text |Cite
|
Sign up to set email alerts
|

PRIVV: Private remote iris-authentication with Vaulted Verification

Abstract: Iris biometrics are one of the strongest modalities in terms of performance, and as such, are used in several highsecurity scenarios. However, remote/network authentication creates its own class of problems that have not previously been considered. In this work, we adapt Vaulted Verification, a novel remote matching protocol, to work with iris biometrics in a network authentication setting. We give an overview of how Vaulted Verification works and show how to adapt it to the unique challenges of iris biometric… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2013
2013
2016
2016

Publication Types

Select...
2
1

Relationship

2
1

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 20 publications
0
3
0
Order By: Relevance
“…As with most secure biometric systems, this protocol contains many layers of security. As mentioned previously, the base security of this protocol is similar to the work done by Wilber, et al 1,2 After enrollment, the client never sends out non-encrypted data, the matching is done on the client after decryption with the user supplied password. From enrollment to verification it is assumed that the communication is happening over a secure encryption protocol, SSL or TLS for example, and an attacker cannot ease drop on the communication.…”
Section: Security Analysismentioning
confidence: 92%
See 1 more Smart Citation
“…As with most secure biometric systems, this protocol contains many layers of security. As mentioned previously, the base security of this protocol is similar to the work done by Wilber, et al 1,2 After enrollment, the client never sends out non-encrypted data, the matching is done on the client after decryption with the user supplied password. From enrollment to verification it is assumed that the communication is happening over a secure encryption protocol, SSL or TLS for example, and an attacker cannot ease drop on the communication.…”
Section: Security Analysismentioning
confidence: 92%
“…The Vaulted Verification protocol is a vision based protocol that allows for remote verification in a privacy-preserving way. 1,2 The Vaulted Verification protocol will be discussed further in Section 3.…”
Section: Introductionmentioning
confidence: 99%
“…There have been several variations of the VV protocol over the years, including extensions to iris [26], fingerprint [2], and voice [12,11,10] biometrics. The latter extensions incorporated public key cryptography, and reduced communication overhead by using index tables.…”
Section: Introductionmentioning
confidence: 99%