CHAPTER 11 – Securing Biometric Data

Securing access to physical locations and to data if of primary concern in many personal, commercial, governmental and military contexts. Classic solutions include carrying an identifying document or remembering a password. Problems with the former include forgeries while problems with the latter include poorly-chosen or forgotten passwords. Computer-verifiable biometrics, such as fingerprints and iris scans, provide an attractive alternative to conventional solutions. Biometrics have the advantage that, unlike passwords, they do not have to be remembered and, unlike identifying documents, they are difficult to forge. However, they have characteristics that raise new security challenges. Edited Book on Distributed Source Coding This work may not be copied or reproduced in whole or in part for any commercial purpose. Permission to copy in whole or in part without payment of fee is granted for nonprofit educational and research purposes provided that all such whole or partial copies include the following: a notice that such copying is by permission of Mitsubishi Electric Research Laboratories, Inc.; an acknowledgment of the authors and individual contributions to the work; and all applicable portions of the copyright notice. Copying, reproduction, or republishing for any other purpose shall require a license with payment of fee to Mitsubishi Electric Research Laboratories, Inc. All rights reserved. Copyright c ©Mitsubishi Electric Research Laboratories, Inc., 2008 201 Broadway, Cambridge, Massachusetts 02139

[1]  Libor Masek,et al.  Recognition of Human Iris Patterns for Biometric Identification , 2003 .

[2]  Anil K. Jain,et al.  Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.

[3]  Yair Frankel,et al.  On enabling secure applications through off-line biometric identification , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).

[4]  Rudolf Ahlswede,et al.  Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.

[5]  Stark C. Draper,et al.  Using Distributed Source Coding to Secure Fingerprint Biometrics , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.

[6]  Bernd Girod,et al.  Image Authentication Based on Distributed Source Coding , 2007, 2007 IEEE International Conference on Image Processing.

[7]  Koichi Sasakawa,et al.  Fingerprint Authentication Based on Matching Scores with Other Data , 2006, ICB.

[8]  S. Yang,et al.  Secure fuzzy vault based fingerprint verification system , 2004, Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, 2004..

[9]  Sharath Pankanti,et al.  Biometrics: a grand challenge , 2004, ICPR 2004.

[10]  Anil K. Jain,et al.  FVC2002: Second Fingerprint Verification Competition , 2002, Object recognition supported by user interaction for service robots.

[11]  Thomas M. Cover,et al.  A Proof of the Data Compression Theorem of Slepian and Wolf for Ergodic Sources , 1971 .

[12]  Andrew Beng Jin Teoh,et al.  Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[13]  Stark C. Draper,et al.  Feature extraction for a Slepian-Wolf biometric system using LDPC codes , 2008, 2008 IEEE International Symposium on Information Theory.

[14]  Nalini K. Ratha,et al.  Cancelable Biometrics: A Case Study in Fingerprints , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[15]  Sharath Pankanti,et al.  Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.

[16]  X. Jin Factor graphs and the Sum-Product Algorithm , 2002 .

[17]  Sergey Yekhanin,et al.  Secure Biometrics Via Syndromes , 2005 .

[18]  R. A. McDonald,et al.  Noiseless Coding of Correlated Information Sources , 1973 .

[19]  Anton H. M. Akkermans,et al.  Face recognition with renewable and privacy preserving binary templates , 2005, Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05).

[20]  Nalini K. Ratha,et al.  Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[21]  Jack K. Wolf,et al.  Noiseless coding of correlated information sources , 1973, IEEE Trans. Inf. Theory.

[22]  Stark C. Draper,et al.  Secure Storage of Fingerprint Biometrics Using Slepian-Wolf Codes , 2007 .

[23]  Rüdiger L. Urbanke,et al.  Design of capacity-approaching irregular low-density parity-check codes , 2001, IEEE Trans. Inf. Theory.

[24]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[25]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[26]  Sharath Pankanti,et al.  Biometrics: a grand challenge , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..

[27]  Anil K. Jain,et al.  Multibiometric systems: fusion strategies and template security , 2008 .

[28]  Ross J. Anderson,et al.  Combining cryptography with biometrics effectively , 2005 .

[29]  Brendan J. Frey,et al.  Factor graphs and the sum-product algorithm , 2001, IEEE Trans. Inf. Theory.

[30]  Sharath Pankanti,et al.  Fuzzy Vault for Fingerprints , 2005, AVBPA.

[31]  Anil K. Jain,et al.  On-line fingerprint verification , 1996, Proceedings of 13th International Conference on Pattern Recognition.

[32]  Stark C. Draper,et al.  Feature transformation of biometric templates for secure biometric systems based on error correcting codes , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.

[33]  T. Charles Clancy,et al.  Secure smartcardbased fingerprint authentication , 2003, WBMA '03.