Incremental Design of Secure Biometric Identification and Authentication

被引:0
|
作者
Zhou, Linghui [1 ,2 ]
Oechtering, Tobias J. [1 ,2 ]
Skoglund, Mikael [1 ,2 ]
机构
[1] KTH Royal Inst Technol, Div Informat Sci & Engn, S-10044 Stockholm, Sweden
[2] KTH Digital Future Ctr, S-10044 Stockholm, Sweden
基金
瑞典研究理事会;
关键词
D O I
10.1109/ISIT45174.2021.9518285
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this work, we study incrementally designed secure biometric identification and authentication systems, in which a new system is designed based on an existing legacy system. By taking privacy and secrecy into consideration, we characterize the fundamental trade-offs among the identification rate, secret key rates, and privacy leakage rate.
引用
收藏
页码:3196 / 3201
页数:6
相关论文
共 50 条
  • [41] A hardware implementation of fingerprint verification for secure biometric authentication systems
    Chung, YW
    Moon, D
    Pan, SB
    Kim, M
    Kim, K
    IMAGE ANALYSIS AND RECOGNITION, PT 2, PROCEEDINGS, 2004, 3212 : 770 - 777
  • [42] Secure Methods for Fuzzy Key Binding in Biometric Authentication Applications
    Bui, Francis Minhthang
    Hatzinakos, Dimitrios
    2008 42ND ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS, VOLS 1-4, 2008, : 1363 - 1367
  • [43] Secure Computation for Privacy Preserving Biometric Data Retrieval and Authentication
    Sy, Bon
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2008, 5376 : 143 - 154
  • [44] Secure and Privacy Preserving Biometric Authentication Using Watermarking Technique
    Pal, Doyel
    Khethavath, Praveenkumar
    Thomas, Johnson P.
    Chen, Tingting
    SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 146 - 156
  • [45] iiCardiac Rhythm - Biometric based Secure Authentication for IEEE 802.15.6
    Belinda, Carmel Mary
    Sugumaran, Tolstoy
    Kannan, E.
    2014 INTERNATIONAL CONFERENCE ON SCIENCE ENGINEERING AND MANAGEMENT RESEARCH (ICSEMR), 2014,
  • [46] PCA Authentication of Facial Biometric in the Secure Randomized Mapping Domain
    Dabbah, M. A.
    Dlay, S. S.
    Woo, W. L.
    2008 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES: FROM THEORY TO APPLICATIONS, VOLS 1-5, 2008, : 1191 - 1195
  • [47] On the Design of Secure Multimedia Authentication
    Wang, Jinwei
    Lue, Jianmin
    Lian, Shiguo
    Liu, Guangjie
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2009, 15 (02) : 426 - 443
  • [48] Design of Multiple Share Creation with Optimal Signcryption based Secure Biometric Authentication System for Cloud Environment
    Prabhu D.
    Vijay Bhanu S.
    Suthir S.
    International Journal of Computers and Applications, 2022, 44 (11) : 1047 - 1055
  • [49] IncreAuth: Incremental-Learning-Based Behavioral Biometric Authentication on Smartphones
    Shen, Zhihao
    Li, Shun
    Zhao, Xi
    Zou, Jianhua
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (01) : 1589 - 1603
  • [50] SECURE VOTER AUTHENTICATION FOR RELIABLE VOTING PROCESS USING RFID AND BIOMETRIC
    Bharath, S.
    Tharun, S.
    Kalanandhini, G.
    INTERNATIONAL JOURNAL OF EARLY CHILDHOOD SPECIAL EDUCATION, 2022, 14 (05) : 286 - 294