Design Aspects of Secure Biometric Systems and Biometrics in the Encrypted Domain

This chapter introduces the main security requirements for the biometric processing pipeline and summarizes general design principles and approaches. General IT security principles are reflected and selected paradigms such as template protection by biometric hashing, fuzzy commitment schemes, and fuzzy extractors are reviewed. Further, we discuss the design principles of biometric matching algorithms that operate in the encrypted domain. The overall algorithm design, implementation, and configuration issues are summarized and discussed in an exemplary manner for the case of face biometrics.

[1]  Anil K. Jain,et al.  Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.

[2]  Franz Pichler,et al.  Advances in Cryptology — EUROCRYPT’ 85 , 2000, Lecture Notes in Computer Science.

[3]  Andrew Beng Jin Teoh,et al.  Cancellable biometrics and annotations on BioHash , 2008, Pattern Recognit..

[4]  Stefan Katzenbeisser,et al.  Protection and Retrieval of Encrypted Multimedia Content: When Cryptography Meets Signal Processing , 2007, EURASIP J. Inf. Secur..

[5]  Claus Vielhauer,et al.  Reverse-engineer methods on a biometric hash algorithm for dynamic handwriting , 2010, MM&Sec '10.

[6]  Jana Dittmann,et al.  Trust in E-Technologies , 2006 .

[7]  Kevin W. Bowyer,et al.  Analysis of template aging in iris biometrics , 2012, 2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.

[8]  Alessandra Lumini,et al.  Fake fingertip generation from a minutiae template , 2008, 2008 19th International Conference on Pattern Recognition.

[9]  Aggelos Kiayias,et al.  Traceable Signatures , 2004, EUROCRYPT.

[10]  Stefan Katzenbeisser,et al.  Privacy-Preserving Face Recognition , 2009, Privacy Enhancing Technologies.

[11]  Matt Bishop Introduction to Computer Security , 2004 .

[12]  Benny Pinkas,et al.  SCiFI - A System for Secure Face Identification , 2010, 2010 IEEE Symposium on Security and Privacy.

[13]  Mauro Barni,et al.  eSketch: a privacy-preserving fuzzy commitment scheme for authentication using encrypted biometrics , 2010, MM&Sec '10.

[14]  Rafail Ostrovsky,et al.  Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..

[15]  Ahmad-Reza Sadeghi,et al.  Efficient Privacy-Preserving Face Recognition , 2009, ICISC.

[16]  Jana Dittmann,et al.  Printed fingerprints: a framework and first results towards detection of artificially printed latent fingerprints for forensics , 2011, Electronic Imaging.

[17]  Andreas Pfitzmann,et al.  Networks Without User Observability: Design Options , 1985, EUROCRYPT.

[18]  Michael K. Reiter,et al.  Crowds: anonymity for Web transactions , 1998, TSEC.

[19]  Ralf Steinmetz,et al.  Biometric hash based on statistical features of online signatures , 2002, Object recognition supported by user interaction for service robots.

[20]  Claus Vielhauer Biometric User Authentication for it Security - From Fundamentals to Handwriting , 2006, Advances in Information Security.

[21]  Lech J. Janczewski,et al.  Cyber Warfare and Cyber Terrorism , 2007 .

[22]  Anil K. Jain,et al.  Biometric template transformation: a security analysis , 2010, Electronic Imaging.

[23]  Mauro Barni,et al.  Composite Signal Representation for Fast and Storage-Efficient Processing of Encrypted Signals , 2010, IEEE Transactions on Information Forensics and Security.

[24]  John W. Carls A Framework for Analyzing Biometric Template Aging and Renewal Prediction , 2012 .

[25]  Qi Li,et al.  Using voice to generate cryptographic keys , 2001, Odyssey.

[26]  Julian Fiérrez,et al.  Bayesian Hill-Climbing Attack and Its Application to Signature Verification , 2007, ICB.

[27]  Bernadette Dorizzi,et al.  Enhancing Information Security and Privacy by Combining Biometrics with Cryptography , 2012, Synthesis Lectures on Information Security, Privacy, and Trust.

[28]  Klara Nahrstedt,et al.  Using Cryptographic and Watermarking Algorithms , 2001, IEEE Multim..

[29]  Satoshi Hoshino,et al.  Impact of artificial "gummy" fingers on fingerprint systems , 2002, IS&T/SPIE Electronic Imaging.

[30]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[31]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[32]  Dong Hoon Lee,et al.  Information, Security and Cryptology - ICISC 2009, 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers , 2010, ICISC.

[33]  Jana Dittmann,et al.  Proceedings of the 10th ACM workshop on Multimedia and security , 2008 .

[34]  U K Gupta,et al.  Dermatoglyphics: a study of finger tip patterns in bronchial asthma and its genetic disposition. , 2003, Kathmandu University medical journal.

[35]  Matt Bishop,et al.  Computer Security: Art and Science , 2002 .

[36]  Mehdi Khosrow-Pour,et al.  Encyclopedia of E-commerce, E-government and Mobile Commerce , 2006 .

[37]  J. Bringer,et al.  Anonymous identification with cancelable biometrics , 2009, 2009 Proceedings of 6th International Symposium on Image and Signal Processing and Analysis.

[38]  Nasir D. Memon,et al.  Protecting Biometric Templates With Sketch: Theory and Practice , 2007, IEEE Transactions on Information Forensics and Security.

[39]  Jerome H. Saltzer,et al.  The protection of information in computer systems , 1975, Proc. IEEE.

[40]  Claus Vielhauer,et al.  Biometric Hash Algorithm for Dynamic Handwriting Embedded on a Java Card , 2011, BIOID.

[41]  A. Pfitzmann,et al.  A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management , 2010 .