Security and Privacy in Biometrics

This important text/reference presents the latest secure and privacy-compliant techniques in automatic human recognition. Featuring viewpoints from an international selection of experts in the field, the comprehensive coverage spans both theory and practical implementations, taking into consideration all ethical and legal issues. Topics and features: presents a unique focus on novel approaches and new architectures for unimodal and multimodal template protection; examines signal processing techniques in the encrypted domain, security and privacy leakage assessment, and aspects of standardization; describes real-world applications, from face and fingerprint-based user recognition, to biometrics-based electronic documents, and biometric systems employing smart cards; reviews the ethical implications of the ubiquity of biometrics in everyday life, and its impact on human dignity; provides guidance on best practices for the processing of biometric data within a legal framework.

[1]  William C. Barker,et al.  TECHNOLOGY ADMINISTRATION , 2004 .

[2]  Elaine B. Barker,et al.  Recommendation for key management: , 2019 .

[3]  Silvio Micali,et al.  How to play ANY mental game , 1987, STOC.

[4]  Justin Smith Freedom of information and data protection , 2011 .

[5]  Benny Pinkas,et al.  SCiFI - A System for Secure Face Identification , 2010, 2010 IEEE Symposium on Security and Privacy.

[6]  Josh Benaloh,et al.  Dense Probabilistic Encryption , 1999 .

[7]  Javier Herranz,et al.  Additively Homomorphic Encryption with d-Operand Multiplications , 2010, IACR Cryptol. ePrint Arch..

[8]  Mauro Barni,et al.  Gram-Schmidt Orthogonalization on Encrypted Vectors , 2011 .

[9]  Doerte K. Rappe Homomorphic cryptosystems and their applications , 2005, IACR Cryptol. ePrint Arch..

[10]  Ronald L. Rivest,et al.  ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .

[11]  Irma van der Ploeg,et al.  The illegal body: `Eurodac' and the politics of biometric identification , 1999, Ethics and Information Technology.

[12]  Benny Pinkas,et al.  Fairplay - Secure Two-Party Computation System (Awarded Best Student Paper!) , 2004 .

[13]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[14]  Ahmad-Reza Sadeghi,et al.  Efficient privacy-preserving classification of ECG signals , 2009, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS).

[15]  Donald Beaver,et al.  Precomputing Oblivious Transfer , 1995, CRYPTO.

[16]  Roy Coleman Surveillance as Social Sorting: Privacy, Risk and Digital Discrimination , 2003 .

[17]  David J. Phillips Privacy policy and PETs , 2001, New Media Soc..

[18]  Zekeriya Erkin,et al.  Secure signal processing: Privacy preserving cryptographic protocols for multimedia , 2010 .

[19]  Pierluigi Failla Heuristic Search in Encrypted Graphs , 2010, 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies.

[20]  Oded Goldreich,et al.  A randomized protocol for signing contracts , 1985, CACM.

[21]  Craig Gentry,et al.  Fully Homomorphic Encryption over the Integers , 2010, EUROCRYPT.

[22]  Ahmad-Reza Sadeghi,et al.  Practical Secure Evaluation of Semi-Private Functions , 2009, IACR Cryptol. ePrint Arch..

[23]  Vincent Leith,et al.  The Rijndael Block Cipher , 2010 .

[24]  A. Yao,et al.  Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.

[25]  Stefan Katzenbeisser,et al.  Privacy-Preserving Face Recognition , 2009, Privacy Enhancing Technologies.

[26]  Shantanu Rane,et al.  Privacy preserving string comparisons based on Levenshtein distance , 2010, 2010 IEEE International Workshop on Information Forensics and Security.

[27]  Z. Zai-feng A Novel Image Compression Coding Algorithm Based on Pulse-Coupled Neural Network and Gram-Schmidt Orthogonal Base , 2006 .

[28]  E. J. Koops,et al.  D3.16: Biometrics: PET or PIT? , 2009 .

[29]  Vinod M. Prabhakaran,et al.  On compressing encrypted data , 2004, IEEE Transactions on Signal Processing.

[30]  Benny Pinkas,et al.  Secure Two-Party Computation is Practical , 2009, IACR Cryptol. ePrint Arch..

[31]  Mauro Barni,et al.  Privacy preserving evaluation of signal quality with application to ECG analysis , 2010, 2010 IEEE International Workshop on Information Forensics and Security.

[32]  N. Koblitz A Course in Number Theory and Cryptography , 1987 .

[33]  Gene H. Golub,et al.  Matrix computations , 1983 .

[34]  Ahmad-Reza Sadeghi,et al.  Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima , 2009, IACR Cryptol. ePrint Arch..

[35]  Mauro Barni,et al.  On the Implementation of the Discrete Fourier Transform in the Encrypted Domain , 2009, IEEE Transactions on Information Forensics and Security.

[36]  Vladimir Kolesnikov,et al.  Improved Garbled Circuit: Free XOR Gates and Applications , 2008, ICALP.

[37]  Chris Conley,et al.  Ethical Implications of Emerging Technologies: A Survey , 2007 .

[38]  Ahmad-Reza Sadeghi,et al.  Privacy-Preserving ECG Classification With Branching Programs and Neural Networks , 2011, IEEE Transactions on Information Forensics and Security.

[39]  Yehuda Lindell,et al.  Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries , 2008, SCN.

[40]  A.C.J. Sprokkereef,et al.  The Use of Privacy Enhancing Aspects of Biometrics : Biometrics as a PET (privacy enhancing technology) in the Dutch private and semi-public domain , 2009 .

[41]  Moni Naor,et al.  Efficient oblivious transfer protocols , 2001, SODA '01.

[42]  Ramakrishnan Srikant,et al.  Privacy-preserving data mining , 2000, SIGMOD '00.

[43]  Annemarie Sprokkereef,et al.  Data Protection and the Use of Biometric Data in the EU , 2007, FIDIS.

[44]  Emmanuel Bresson,et al.  A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications , 2003, ASIACRYPT.

[45]  Stefan Katzenbeisser,et al.  A Buyer–Seller Watermarking Protocol Based on Secure Embedding , 2008, IEEE Transactions on Information Forensics and Security.

[46]  Yuval Ishai,et al.  Priced Oblivious Transfer: How to Sell Digital Goods , 2001, EUROCRYPT.

[47]  Kuldip K. Paliwal,et al.  Fast principal component analysis using fixed-point algorithm , 2007, Pattern Recognit. Lett..

[48]  Silvio Micali,et al.  Probabilistic Encryption , 1984, J. Comput. Syst. Sci..

[49]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[50]  Jeroen Doumen,et al.  Using Secret Sharing for Searching in Encrypted Data , 2004, Secure Data Management.

[51]  Andrew Chi-Chih Yao,et al.  Protocols for secure computations , 1982, FOCS 1982.

[52]  A.C.J. Sprokkereef,et al.  ETHICAL PRACTICE IN THE USE OF BIOMETRIC IDENTIFIERS WITHIN THE EU , 2007 .

[53]  Claudio Orlandi,et al.  A New Approach to Practical Active-Secure Two-Party Computation , 2012, IACR Cryptol. ePrint Arch..

[54]  Ivan Damgård,et al.  Efficient and Secure Comparison for On-Line Auctions , 2007, ACISP.

[55]  Sophocles J. Orfanidis,et al.  GramSchmidt Neural Nets , 1990, Neural Computation.

[56]  Ivan Damgård,et al.  A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System , 2001, Public Key Cryptography.

[57]  Craig Gentry,et al.  Fully homomorphic encryption using ideal lattices , 2009, STOC '09.

[58]  Craig Gentry,et al.  A Simple BGN-Type Cryptosystem from LWE , 2010, EUROCRYPT.

[59]  Vincenzo Piuri,et al.  A privacy-compliant fingerprint recognition system based on homomorphic encryption and Fingercode templates , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[60]  E. Kushilevitz Foundations of Cryptography Foundations of Cryptography , 2014 .

[61]  C. Chui,et al.  Wavelets on a Bounded Interval , 1992 .

[62]  Vitaly Shmatikov,et al.  Privacy-preserving remote diagnostics , 2007, CCS '07.

[63]  Ahmad-Reza Sadeghi,et al.  Secure Evaluation of Private Linear Branching Programs with Medical Applications , 2009, ESORICS.

[64]  Ahmad-Reza Sadeghi,et al.  Modular Design of Efficient Secure Function Evaluation Protocols , 2010 .

[65]  Herman T. Tavani,et al.  Privacy protection, control of information, and privacy-enhancing technologies , 2001, CSOC.

[66]  Yuval Ishai,et al.  Extending Oblivious Transfers Efficiently , 2003, CRYPTO.

[67]  P. Thompson Digital Identity , 2003 .

[68]  Yehuda Lindell,et al.  A Proof of Security of Yao’s Protocol for Two-Party Computation , 2009, Journal of Cryptology.

[69]  Nils J. Nilsson,et al.  A Formal Basis for the Heuristic Determination of Minimum Cost Paths , 1968, IEEE Trans. Syst. Sci. Cybern..

[70]  Ahmad-Reza Sadeghi,et al.  Efficient Privacy-Preserving Face Recognition , 2009, ICISC.

[71]  Ueli Maurer,et al.  Unbreakable Keys from Random Noise; ; ; Security with noisy data : on private biometrics, secure key storage and anti-counterfeiting , 2007 .

[72]  Dan Boneh,et al.  Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.

[73]  Mauro Barni,et al.  Composite Signal Representation for Fast and Storage-Efficient Processing of Encrypted Signals , 2010, IEEE Transactions on Information Forensics and Security.