Secure and Efficient Protocols for Iris and Fingerprint Identification
نویسندگان
چکیده
Recent advances in biometric recognition and the increasing use of biometric data prompt significant privacy challenges associated with the possible misuse, loss or theft, of biometric data. Biometric matching is often performed by two mutually suspicious parties, one of which holds one biometric image while the other owns a possibly large biometric collection. Due to privacy and liability considerations, neither party is willing to share its data. This gives rise to the need to develop secure computation techniques over biometric data where no information is revealed to the parties except the outcome of the comparison or search. To address the problem, in this work we develop and implement the first privacy-preserving identification protocol for iris codes. We also design and implement a secure protocol for fingerprint identification based on FingerCodes with a substantial improvement in the performance compared to existing solutions. We show that new techniques and optimizations employed in this work allow us to achieve particularly efficient protocols suitable for large data sets and obtain notable performance gain compared to the state-of-the-art prior work.
منابع مشابه
Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...
متن کاملSecure and Ef icient Iris and Fingerprint Identi ication
Advances in biometric recogni on and the increasing use of biometric data prompt significant privacy challenges associated with the possible misuse, loss, or the of biometric data. Biometric comparisons are o en performed by two mutually distrus ul par es, one of which holds a biometric sample while the other owns a possibly large collec on of biometric data. Due to privacy and liability consid...
متن کاملProvably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...
متن کاملSecure Fingerprint Alignment and Matching Protocols
We present three private fingerprint alignment and matching protocols, based on precise and efficient fingerprint recognition algorithms that use minutia points. Our protocols allow two or more semi-honest parties to compare privately-held fingerprints in a secure way such that nothing more than an accurate score of how well the fingerprints match is revealed to output recipients. To the best o...
متن کاملPoster: Secure Computation of Fingerprint Alignment and Matching
Secure computation with biometric data is a challenging topic and attention to this area has grown during recent years. This is because biometric data is highly sensitive and requires protection when used in a variety of applications including biometric verification and identification. Fingerprint images are one of the most accurate type of biometry used in these applications and they are highl...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2010 شماره
صفحات -
تاریخ انتشار 2010