2009 30th IEEE Symposium on Security and Privacy 2009
DOI: 10.1109/sp.2009.24
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Weaknesses in Biometric Sketches

Abstract: The increasing use of biometrics has given rise to new privacy concerns. Biometric encryption systems have been proposed in order to alleviate such concerns: rather than comparing the biometric data directly, a key is derived from these data and subsequently knowledge of this key is proved. One specific application of biometric encryption is the use of biometric sketches: in this case biometric template data are protected with biometric encryption. We address the question whether one can undermine a user's pri… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
123
0

Year Published

2010
2010
2016
2016

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 140 publications
(124 citation statements)
references
References 21 publications
1
123
0
Order By: Relevance
“…Boyen [1] studies the re-usability of sketches where the concern is whether multiple sketches of the same biometric data reveal sensitive information. This security model is further extended and studied by Boyen et al [2] and Simoens et al [20], where the latter work focuses more on privacy issues. Kholmatov et al [12] and Hong et al [9] demonstrate such limitations by giving correlation attacks on known schemes.…”
Section: Related Workmentioning
confidence: 99%
“…Boyen [1] studies the re-usability of sketches where the concern is whether multiple sketches of the same biometric data reveal sensitive information. This security model is further extended and studied by Boyen et al [2] and Simoens et al [20], where the latter work focuses more on privacy issues. Kholmatov et al [12] and Hong et al [9] demonstrate such limitations by giving correlation attacks on known schemes.…”
Section: Related Workmentioning
confidence: 99%
“…The aim of a biometric cryptosystem, which features the n-indistinguishability attribute as defined by Simoens et al [12] is that no adversary has a significant advantage over random guessing in determining whether n sketches {P 1 , P 2 , · · · P n } are related or not.…”
Section: Function Used During Verification That Given a Word X And Anmentioning
confidence: 99%
“…Simoens et al [12] model n-indistinguishability as a game where it is assumed that an adversary has obtained a database of protected biometric references and wants to find the sketches that are related to the reference he holds. As it is the customary in cryptography, the adversary is assumed to know all algorithms used to protect the biometric references.…”
Section: Function Used During Verification That Given a Word X And Anmentioning
confidence: 99%
See 2 more Smart Citations