DocumentCode :
1780585
Title :
Towards efficient privacy-preserving two-stage identification for fingerprint-based biometric cryptosystems
Author :
Tams, Benjamin ; Rathgeb, Christian
Author_Institution :
Inst. for Math. Stochastics, Univ. of Gottingen, Gottingen, Germany
fYear :
2014
fDate :
Sept. 29 2014-Oct. 2 2014
Firstpage :
1
Lastpage :
8
Abstract :
Biometric template protection schemes in particular, biometric cryptosystems bind secret keys to biometric data, i.e. complex key retrieval processes are performed at each authentication attempt. Focusing on biometric identification exhaustive 1: N comparisons are required for identifying a biometric probe. As a consequence comparison time frequently dominates the overall computational workload, preventing biometric cryptosystems from being operated in identification mode. In this paper we propose a computational efficient two-stage identification system for fingerprint-biometric cryptosystems. Employing the concept of adaptive Bloom filter-based cancelable biometrics, pseudonymous binary prescreeners are extracted based on which top-candidates are returned from a database. Thereby the number of required key-retrieval processes is reduced to a fraction of the total. Experimental evaluations confirm that, by employing the proposed technique, biometric cryptosystems, e.g. fuzzy vault scheme, can be enhanced in order to enable a real-time privacy preserving identification, while at the same time biometric performance is maintained.
Keywords :
biometrics (access control); data privacy; data structures; fingerprint identification; fuzzy set theory; image retrieval; private key cryptography; adaptive Bloom filter-based cancelable biometrics; biometric performance analysis; biometric probe identification; biometric template protection schemes; comparison time; complex key retrieval processes; computational efficient two-stage identification system; computational workload; data authentication; fingerprint-based biometric cryptosystems; fuzzy vault scheme; privacy-preserving two-stage identification; pseudonymous binary prescreener extraction; real-time privacy preserving identification; secret keys; Authentication; Cryptography; Databases; Fingerprint recognition; Measurement; Privacy;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Biometrics (IJCB), 2014 IEEE International Joint Conference on
Conference_Location :
Clearwater, FL
Type :
conf
DOI :
10.1109/BTAS.2014.6996241
Filename :
6996241
Link To Document :
بازگشت