Open Access
A Review Regarding the Biometrics Cryptography Challenging Design and Strategies
Mohamed Soltane,Lotfi Messikh,Abdelhalim Zaoui +2 more
- Vol. 8, Iss: 4, pp 41-64
TLDR
This paper reviews the state of the art biometrics Cryptosystems from the Point of Challenging Designs Strategies with a focus on the fuzzy vault construct, which secures both the secret key and the biometric template by binding them within a cryptographic framework.Abstract:
As the information age matures, a biometric identification technology will be at the heart of computer interaction with humans and the biosphere in which they reside. Hence, the reliable information security mechanisms are needed to combat the rising magnitude of identity theft. While cryptography is a powerful tool to achieve information security, one of the main challenges in cryptosystems is to maintain the secrecy of the cryptographic keys. Template protection techniques prevent stored reference data from revealing private biometric information and enhance the security of biometric systems against attacks such as identity theft and cross matching. A critical issue in biometric systems is to protect the template of a user which is typically stored in a database or a smart card. The fuzzy vault construct is a challenging biometric cryptosystem that secures both the secret key and the biometric template by binding them within a cryptographic framework. The helper data itself do not leak any information about the biometric template, yet contain sufficient information to align the template and query biometric accurately. This paper reviews the state of the art biometrics Cryptosystems from the Point of Challenging Designs Strategies.read more
Citations
More filters
Journal ArticleDOI
Multi-instance cancellable biometrics schemes based on generative adversarial network
TL;DR: The security of the proposed multi-instance cancellable biometric schemes based on iris traits is analyzed, and their robustness against two well-known types of attacks is proven.
Proceedings Article
Cryptographic keygeneration from biometric data using lattice Mapping
TL;DR: In this paper, a lattice mapping based fuzzy commitment method for cryptographic key generation from biometric data is proposed. But the proposed method does not address the security weaknesses of conventional key release systems using pass-codes, tokens or pattern recognition based biometrics.
References
More filters
Proceedings ArticleDOI
A fuzzy commitment scheme
Ari Juels,Martin Wattenberg +1 more
TL;DR: Because the fuzzy commitment scheme is tolerant of error, it is capable of protecting biometric data just as conventional cryptographic techniques, like hash functions, are used to protect alphanumeric passwords.
Journal ArticleDOI
Enhancing security and privacy in biometrics-based authentication systems
TL;DR: The inherent strengths of biometrics-based authentication are outlined, the weak links in systems employing biometric authentication are identified, and new solutions for eliminating these weak links are presented.
Proceedings ArticleDOI
A fuzzy vault scheme
Ari Juels,Madhu Sudan +1 more
TL;DR: In this article, the authors describe a fuzzy vault construction that allows Alice to place a secret value /spl kappa/ in a secure vault and lock it using an unordered set A of elements from some public universe U. If Bob tries to "unlock" the vault using B, he obtains the secret value if B is close to A, i.e., only if A and B overlap substantially.
Journal ArticleDOI
Biometric template security
TL;DR: This work presents a high-level categorization of the various vulnerabilities of a biometric system and discusses countermeasures that have been proposed to address these vulnerabilities.
Journal ArticleDOI
Biometric cryptosystems: issues and challenges
TL;DR: This work presents various methods that monolithically bind a cryptographic key with the biometric template of a user stored in the database in such a way that the key cannot be revealed without a successful biometric authentication.
Related Papers (5)
A review on performance,security and various biometric template protection schemes for biometric authentication systems
Arpita Sarkar,Binod Kumar Singh +1 more