2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07 2007
DOI: 10.1109/icassp.2007.366189
|View full text |Cite
|
Sign up to set email alerts
|

Using Distributed Source Coding to Secure Fingerprint Biometrics

Abstract: We describe a method to encode fingerprint biometrics securely for use, e.g., in encryption or access control. The system is secure because the stored data does not suffice to recreate the original fingerprint biometric. Therefore, a breach in database security does not lead to the loss of biometric data. At the same time the stored data suffices to validate a probe fingerprint. Our approach is based on the use of distributed source coding techniques implemented with graphbased codes. We present a statistical … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
41
0

Year Published

2008
2008
2022
2022

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 79 publications
(41 citation statements)
references
References 7 publications
0
41
0
Order By: Relevance
“…The helper data are sent to the decoder that also observes the biometric authentication sequence and that has access to the private key . This decoder now forms an estimate of the secret that was generated by the encoder; hence, (15) where is the decoder mapping. Next we define achievability for zero-leakage systems.…”
Section: Generated-secret Systems With Zero Leakagementioning
confidence: 99%
See 1 more Smart Citation
“…The helper data are sent to the decoder that also observes the biometric authentication sequence and that has access to the private key . This decoder now forms an estimate of the secret that was generated by the encoder; hence, (15) where is the decoder mapping. Next we define achievability for zero-leakage systems.…”
Section: Generated-secret Systems With Zero Leakagementioning
confidence: 99%
“…Finally, a formal approach for designing secure biometric systems for three metric distances (Hamming, edit, and set), called fuzzy extractors, was introduced in Dodis et al [13] and Smith [36] and further elaborated in [14]. Fuzzy extractors were subsequently implemented for different biometric modalities in Sutcu et al [37] and Draper et al [15].…”
mentioning
confidence: 99%
“…Interestingly, the problem of coding distributed correlated sources has also attracted much interest in the field of video coding recently. The same framework was also employed in (Draper et al (2007)) in order to secure fingerprint biometrics, image authentication (Yao-Chung et al (2007)) and biometric authentication as a wire-tap problem (Cohen & Zemor (2004)). In the seminal work of (Pradhan & Ramchandran (2003)), the distributed source coding using syndromes scheme was proposed.…”
Section: Related Workmentioning
confidence: 99%
“…They combined the Reed-Solomon code and the Hadamard code for handling burst errors and random errors, respectively. Draper et al [32] applied the distributed source coding to protect fingerprint template and Sutcu et al [33] analyzed and implemented the sketch, which is an error tolerant cryptographic technique, for face biometric.…”
Section: A Biometric Cryptosystems Approachmentioning
confidence: 99%