scispace - formally typeset
Open Access

A Review Regarding the Biometrics Cryptography Challenging Design and Strategies

Mohamed Soltane, +2 more
- Vol. 8, Iss: 4, pp 41-64
TLDR
This paper reviews the state of the art biometrics Cryptosystems from the Point of Challenging Designs Strategies with a focus on the fuzzy vault construct, which secures both the secret key and the biometric template by binding them within a cryptographic framework.
Abstract
As the information age matures, a biometric identification technology will be at the heart of computer interaction with humans and the biosphere in which they reside. Hence, the reliable information security mechanisms are needed to combat the rising magnitude of identity theft. While cryptography is a powerful tool to achieve information security, one of the main challenges in cryptosystems is to maintain the secrecy of the cryptographic keys. Template protection techniques prevent stored reference data from revealing private biometric information and enhance the security of biometric systems against attacks such as identity theft and cross matching. A critical issue in biometric systems is to protect the template of a user which is typically stored in a database or a smart card. The fuzzy vault construct is a challenging biometric cryptosystem that secures both the secret key and the biometric template by binding them within a cryptographic framework. The helper data itself do not leak any information about the biometric template, yet contain sufficient information to align the template and query biometric accurately. This paper reviews the state of the art biometrics Cryptosystems from the Point of Challenging Designs Strategies.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Multi-instance cancellable biometrics schemes based on generative adversarial network

TL;DR: The security of the proposed multi-instance cancellable biometric schemes based on iris traits is analyzed, and their robustness against two well-known types of attacks is proven.
Proceedings Article

Cryptographic keygeneration from biometric data using lattice Mapping

G. Zheng
TL;DR: In this paper, a lattice mapping based fuzzy commitment method for cryptographic key generation from biometric data is proposed. But the proposed method does not address the security weaknesses of conventional key release systems using pass-codes, tokens or pattern recognition based biometrics.
References
More filters
Proceedings ArticleDOI

A fuzzy commitment scheme

TL;DR: Because the fuzzy commitment scheme is tolerant of error, it is capable of protecting biometric data just as conventional cryptographic techniques, like hash functions, are used to protect alphanumeric passwords.
Journal ArticleDOI

Enhancing security and privacy in biometrics-based authentication systems

TL;DR: The inherent strengths of biometrics-based authentication are outlined, the weak links in systems employing biometric authentication are identified, and new solutions for eliminating these weak links are presented.
Proceedings ArticleDOI

A fuzzy vault scheme

TL;DR: In this article, the authors describe a fuzzy vault construction that allows Alice to place a secret value /spl kappa/ in a secure vault and lock it using an unordered set A of elements from some public universe U. If Bob tries to "unlock" the vault using B, he obtains the secret value if B is close to A, i.e., only if A and B overlap substantially.
Journal ArticleDOI

Biometric template security

TL;DR: This work presents a high-level categorization of the various vulnerabilities of a biometric system and discusses countermeasures that have been proposed to address these vulnerabilities.
Journal ArticleDOI

Biometric cryptosystems: issues and challenges

TL;DR: This work presents various methods that monolithically bind a cryptographic key with the biometric template of a user stored in the database in such a way that the key cannot be revealed without a successful biometric authentication.
Related Papers (5)
Trending Questions (2)
What are the current standards and best practices for designing safe biometric systems?

The provided paper does not specifically mention the current standards and best practices for designing safe biometric systems.

What are the main issues with biometric cryptosystems?

The main issue with biometric cryptosystems is maintaining the secrecy of the cryptographic keys. Template protection techniques are used to prevent stored reference data from revealing private biometric information and enhance the security of biometric systems against attacks such as identity theft and cross matching.