2007
DOI: 10.1109/tifs.2007.902022
|View full text |Cite
|
Sign up to set email alerts
|

Protecting Biometric Templates With Sketch: Theory and Practice

Abstract: Abstract-Secure storage of biometric templates has become an increasingly important issue in biometric authentication systems. We study how secure sketch, a recently proposed errortolerant cryptographic primitive, can be applied to protect the templates. We identify several practical issues that are not addressed in the existing theoretical framework, and show the subtleties in evaluating the security of practical systems. We propose a general framework to design and analyze secure sketch for biometric templat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
102
0
1

Year Published

2008
2008
2018
2018

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 227 publications
(103 citation statements)
references
References 31 publications
(61 reference statements)
0
102
0
1
Order By: Relevance
“…Ho et al [8] propose a dual-factor scheme where a user needs to read out a one-time password generated from a token, and both the password and the voice features are used for authentication. Sutcu et al [22] study secure sketch for face features and give an example of how the sketch scheme can be used together with a smartcard to achieve better security.…”
Section: Related Workmentioning
confidence: 99%
“…Ho et al [8] propose a dual-factor scheme where a user needs to read out a one-time password generated from a token, and both the password and the voice features are used for authentication. Sutcu et al [22] study secure sketch for face features and give an example of how the sketch scheme can be used together with a smartcard to achieve better security.…”
Section: Related Workmentioning
confidence: 99%
“…The inherent feature of practically all state-of-the-art authentication protocols robust to noise is the storage of some additional information (a.k.a. helper data) assisting in the reliable extraction of a common secret at the enrollment (encoder) and authentication (decoder) sides [1,2,3]. At the same time, since the helper data is somehow input dependent, it raises natural concerns that it should provide little information about the secret extracted from the noisy data (secrecy leak) and input itself (privacy leak).…”
Section: Introductionmentioning
confidence: 99%
“…The bin index M serves as the helper data and the sequence index S within the bin is the key. The secure sketch approach [3] and Slepian-Wolf based authentication using syndrome coding [2] are exactly based on this architecture. The authentication layer is based on the classical cryptographic authentication as for the noiseless digital inputs.…”
Section: Introductionmentioning
confidence: 99%
“…For example, as mentioned above, biometrics can be used to protect the key in cryptography, while cryptography and data hiding can be used to protect biometric templates. Noticeable efforts have been made along this line over the past decade [7][27] [4][31] [36]. In this paper, we attempt to present an overview of the state-of-the-art of research in this increasingly important topic by putting biometrics, cryptography and data hiding in the same context of security enhancement.…”
Section: Introductionmentioning
confidence: 99%