Incremental Design of Secure Biometric Identification and Authentication

被引:0
|
作者
Zhou, Linghui [1 ,2 ]
Oechtering, Tobias J. [1 ,2 ]
Skoglund, Mikael [1 ,2 ]
机构
[1] KTH Royal Inst Technol, Div Informat Sci & Engn, S-10044 Stockholm, Sweden
[2] KTH Digital Future Ctr, S-10044 Stockholm, Sweden
基金
瑞典研究理事会;
关键词
D O I
10.1109/ISIT45174.2021.9518285
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this work, we study incrementally designed secure biometric identification and authentication systems, in which a new system is designed based on an existing legacy system. By taking privacy and secrecy into consideration, we characterize the fundamental trade-offs among the identification rate, secret key rates, and privacy leakage rate.
引用
收藏
页码:3196 / 3201
页数:6
相关论文
共 50 条
  • [1] Design and Implementation of an IoT Based Secure Biometric Authentication System
    Joshy, Annies
    Jalaja, M. J.
    2017 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, INFORMATICS, COMMUNICATION AND ENERGY SYSTEMS (SPICES), 2017,
  • [2] A Survey on Biometric Authentication: Towards Secure and Privacy-Preserving Identification
    Rui, Zhang
    Yan, Zheng
    IEEE ACCESS, 2019, 7 : 5994 - 6009
  • [3] On privacy in secure biometric authentication systems
    Ignatenko, Tanya
    Willems, Frans
    2007 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOL II, PTS 1-3, 2007, : 121 - +
  • [4] Secure Authentication Using Biometric Methods
    Rejman-Greene, Marek
    Information Security Technical Report, 2002, 7 (03): : 30 - 40
  • [5] Secure biometric authentication with improved accuracy
    Barbosa, Manuel
    Brouard, Thierry
    Cauchie, Stephane
    de Sousa, Simao Melo
    INFORMATION SECURITY AND PRIVACY, 2008, 5107 : 21 - +
  • [6] A secure biometric authentication based on PEKS
    Zhang, Yue
    Qin, Jing
    Du, Lihua
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (04): : 1111 - 1123
  • [7] Design of a Secure Biometric Authentication Framework Using PKI and FIDO in Fintech Environments
    Kim, Jae Jung
    Hong, Seng Phil
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (12): : 69 - 79
  • [8] Secure Behavioral Biometric Authentication with Leap Motion
    Xiao, Grady
    Milanova, Mariofanna
    Xie, Mengjun
    2016 4TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), 2016, : 112 - 118
  • [9] Private Eyes: Secure Remote Biometric Authentication
    Syta, Ewa
    Fischer, Michael J.
    Wolinsky, David
    Silberschatz, Abraham
    Gallegos-Garcia, Gina
    Ford, Bryan
    2015 12TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (ICETE), VOL 4, 2015, : 243 - 250
  • [10] ECG BASED BIOMETRIC FOR DOUBLY SECURE AUTHENTICATION
    Safie, Sairul I.
    Soraghan, John J.
    Petropoulakis, Lykourgos
    19TH EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO-2011), 2011, : 2274 - 2278