Corpus ID: 17499272

Secure Biometric Authentication System Architecture using Error Correcting Codes and Distributed Cryptography

@inproceedings{Maiorana2007SecureBA,
  title={Secure Biometric Authentication System Architecture using Error Correcting Codes and Distributed Cryptography},
  author={Emanuele Maiorana and Chiara Ercole},
  year={2007}
}
The most emerging technology for people identification and authentication is biometrics. [...] Key Method Specifically, we propose a method, based on user adaptive error correction codes, to secure the stored templates and achieve the requisite of cancelability of the templates. The proposed architecture is applied either to signature and iris recognition.Expand
A Review on Biometric Authentication Techniques
 Abstract: Advancement in the Information Technology field also makes the security of the information an important part of it. Therefore, security becomes a major issue and the need forExpand
Feature Level Fusion of Multibiometric Cryptosystem in Distributed System
Multibiometrics is the combination of one or more biometrics (e.g., Fingerprint, Iris, and Face). Researchers are focusing on how to provide security to the system, the template which was generatedExpand
Iris Biometric Cryptosystems
TLDR
It is not feasible for most biometric characteristics to extract cryptographic keys directly, so the storage of biometric-dependent public information applied to retrieve or generate keys is referred to as helper data. Expand
Context-based texture analysis for secure revocable iris-biometric key generation
TLDR
This work presents an iris-biometric cryptosystem, based on the idea of exploiting the most reliable components of iriscodes, and provides fully revocable cryptographic keys, directly derived from biometric data, thus, neither plainBiometric data nor encrypted biometricData has to be stored in templates. Expand
Block error correction codes for face recognition
TLDR
This paper investigates the modelling of error patterns in different parts/blocks of face images as a result of differences in illumination conditions, and uses appropriate error correction codes to deal with the corresponding distortion. Expand
Advances, Applications, and Challenges
TLDR
With respect to the design goals, biometric cryptosystems and cancelable biometrics offer significant advantages to enhance the privacy and security of biometric systems, providing reliable biometric authentication at a high security level. Expand
Image Compression Impact on Iris Recognition
TLDR
Detailed investigations of the effect of image compression on iris biometrics in order to provide an efficient storage and rapid transmission of biometric records are motivated. Expand
FE-SViT
TLDR
A bio-crypto-oriented fingerprint verification scheme - Selective Vertex-indexed Triangulation (SViT) which maps minutia global topology to local triangulation with minimum information loss is introduced and high verification accuracy is achieved. Expand
Ensuring patients' privacy in a cryptographic-based-electronic health records using bio-cryptography
TLDR
The development of privacy and security system for cryptography-based-EHR by taking advantage of the uniqueness of fingerprint and iris characteristic features to secure cryptographic keys in a bio-cryptography framework is presented. Expand
State-of-the-Art in Iris Biometrics
TLDR
Iris biometrics has received remarkable attention in the biometric community due to its unrivaled properties and a lot of research effort has been invested to improve iris recognition. Expand
...
1
2
3
...

References

SHOWING 1-10 OF 43 REFERENCES
Biometric cryptosystems: issues and challenges
TLDR
This work presents various methods that monolithically bind a cryptographic key with the biometric template of a user stored in the database in such a way that the key cannot be revealed without a successful biometric authentication. Expand
Privacy-protected biometric templates: acoustic ear identification
Unique Biometric Identifiers offer a very convenient way for human identification and authentication. In contrast to passwords they have hence the advantage that they can not be forgotten or lost. InExpand
Secure Biometrics Via Syndromes
TLDR
The secure biometric storage problem is considered by discussing the insecurities in current systems, the reasons why password hashing/encryption algorithms are unsuitable for biometrics, and a proposed framework based on syndrome codes and the Slepian-Wolf theorem is proposed. Expand
Safety of templates in biometric person authentication using error-correcting code
TLDR
A technique is proposed that partially deletes and splits template information so as to prevent template restoration using only registered template information while enabling restoration for only that template's owner using error-correcting code and can be applied to general biometric authentication systems. Expand
Protecting Face Biometric Data on Smartcard with Reed-Solomon Code
  • Yi C. Feng, P. Yuen
  • Computer Science
  • 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06)
  • 2006
TLDR
The proposed method is developed based on the Reed-Solomon codes, with two modifications, and since the dimension of the face feature vector is relatively large, it is found that it will not only affect the performance, but also the security of the encoding algorithm. Expand
Hiding Biometric Data
TLDR
This work introduces two applications of an amplitude modulation-based watermarking method, in which a user's biometric data is hidden in a variety of images and has the ability to increase the security of both the hiddenBiometric data and host images. Expand
Biometric hash based on statistical features of online signatures
TLDR
First tests show that the system is actuality able to generate stable biometric hash values of the users and although the system was exposed to skilled forgeries, no test person was able to reproduce another subject's hash vector. Expand
An introduction to biometric recognition
TLDR
A brief overview of the field of biometrics is given and some of its advantages, disadvantages, strengths, limitations, and related privacy concerns are summarized. Expand
Enhancing security and privacy in biometrics-based authentication systems
TLDR
The inherent strengths of biometrics-based authentication are outlined, the weak links in systems employing biometric authentication are identified, and new solutions for eliminating these weak links are presented. Expand
Cryptographic keys from dynamic hand-signatures with biometric secrecy preservation and replaceability
TLDR
This work proposes a method of extracting cryptographic key from dynamic handwritten signatures that does not require storage of the biometric template or any statistical information that could be used to reconstruct the biometrics, and follows the design principles of block ciphers to result in unpredictable key space and secure construction. Expand
...
1
2
3
4
5
...