Biometric Security from an Information-Theoretical Perspective

IF 2 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Foundations and Trends in Communications and Information Theory Pub Date : 2012-01-30 DOI:10.1561/0100000051
T. Ignatenko, F. Willems
{"title":"Biometric Security from an Information-Theoretical Perspective","authors":"T. Ignatenko, F. Willems","doi":"10.1561/0100000051","DOIUrl":null,"url":null,"abstract":"The issue of biometric security has become a major research area recently. While systems based on iris-recognition, DNA analysis and fingerprinting are being deployed, there are instances where these alone cannot provide fool-proof security. Biometric Security from an Information-Theoretical Perspective provides an overview of the state-of-the-art of biometric security systems. Using information theoretic techniques it discusses some of the most promising methods to provide practical, but safe, systems. Biometric Security from an Information-Theoretical Perspective studies a number of problems related to the design of biometric secrecy systems for both authentication and identification. First, it reviews the problem of secret sharing in order to set theoretical grounds for the subsequent discussion of secret-key rates and privacy leakage in biometric secrecy systems. Biometric authentication systems are discussed in depth using discrete and Gaussian biometric sources, before describing biometric identification techniques in detail. Since biometric data are typically used for both identification and authentication purposes, the trade-off between identification, secret-key and privacy-leakage rates are determined. Finally, practical considerations are treated. The realization of binary biometric authentication systems with chosen secret keys, called fuzzy commitment, is analyzed. The monograph concludes by investigating how binary quantization of biometric sequences influences the performance of biometric secrecy systems with respect to secret-key rates and privacy leakage. Biometric Security from an Information-Theoretical Perspective is an in-depth review of the topic, which gives the reader an excellent starting point for further research.","PeriodicalId":45236,"journal":{"name":"Foundations and Trends in Communications and Information Theory","volume":"1 1","pages":"135-316"},"PeriodicalIF":2.0000,"publicationDate":"2012-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"53","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Foundations and Trends in Communications and Information Theory","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1561/0100000051","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS","Score":null,"Total":0}
引用次数: 53

Abstract

The issue of biometric security has become a major research area recently. While systems based on iris-recognition, DNA analysis and fingerprinting are being deployed, there are instances where these alone cannot provide fool-proof security. Biometric Security from an Information-Theoretical Perspective provides an overview of the state-of-the-art of biometric security systems. Using information theoretic techniques it discusses some of the most promising methods to provide practical, but safe, systems. Biometric Security from an Information-Theoretical Perspective studies a number of problems related to the design of biometric secrecy systems for both authentication and identification. First, it reviews the problem of secret sharing in order to set theoretical grounds for the subsequent discussion of secret-key rates and privacy leakage in biometric secrecy systems. Biometric authentication systems are discussed in depth using discrete and Gaussian biometric sources, before describing biometric identification techniques in detail. Since biometric data are typically used for both identification and authentication purposes, the trade-off between identification, secret-key and privacy-leakage rates are determined. Finally, practical considerations are treated. The realization of binary biometric authentication systems with chosen secret keys, called fuzzy commitment, is analyzed. The monograph concludes by investigating how binary quantization of biometric sequences influences the performance of biometric secrecy systems with respect to secret-key rates and privacy leakage. Biometric Security from an Information-Theoretical Perspective is an in-depth review of the topic, which gives the reader an excellent starting point for further research.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
信息理论视角下的生物识别安全
近年来,生物识别安全问题已成为一个重要的研究领域。虽然基于虹膜识别、DNA分析和指纹识别的系统正在部署,但在某些情况下,仅凭这些系统无法提供万无一失的安全性。从信息理论的角度来看生物识别安全提供了生物识别安全系统的最新技术的概述。利用信息理论技术,讨论了一些最有前途的方法来提供实用而安全的系统。《信息理论视角下的生物特征安全》研究了与生物特征认证和身份识别保密系统设计相关的一系列问题。首先,本文回顾了秘密共享问题,为后续讨论生物识别保密系统中的秘密密钥率和隐私泄露奠定理论基础。在详细描述生物识别技术之前,将使用离散和高斯生物识别源深入讨论生物识别系统。由于生物特征数据通常用于识别和身份验证目的,因此确定了识别、秘钥和隐私泄漏率之间的权衡。最后,讨论了实际问题。分析了选择密钥的二元生物特征认证系统的实现,即模糊承诺。该专著通过研究生物特征序列的二进制量化如何影响生物特征保密系统在密钥率和隐私泄漏方面的性能来结束。从信息理论的角度对生物识别安全进行了深入的回顾,为读者进一步的研究提供了一个很好的起点。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Foundations and Trends in Communications and Information Theory
Foundations and Trends in Communications and Information Theory COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS-
CiteScore
7.90
自引率
0.00%
发文量
6
期刊介绍: Foundations and Trends® in Communications and Information Theory publishes survey and tutorial articles in the following topics: - Coded modulation - Coding theory and practice - Communication complexity - Communication system design - Cryptology and data security - Data compression - Data networks - Demodulation and Equalization - Denoising - Detection and estimation - Information theory and statistics - Information theory and computer science - Joint source/channel coding - Modulation and signal design - Multiuser detection - Multiuser information theory
期刊最新文献
Probabilistic Amplitude Shaping Reed-Muller Codes Ultra-Reliable Low-Latency Communications: Foundations, Enablers, System Design, and Evolution Towards 6G Reed-Muller Codes Finite Blocklength Lossy Source Coding for Discrete Memoryless Sources
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1