A privacy-compliant fingerprint recognition system based on homomorphic encryption and fingercode templates

M Barni, T Bianchi, D Catalano… - 2010 fourth IEEE …, 2010 - ieeexplore.ieee.org
2010 fourth IEEE international conference on biometrics: theory …, 2010ieeexplore.ieee.org
The privacy protection of the biometric data is an important research topic, especially in the
case of distributed biometric systems. In this scenario, it is very important to guarantee that
biometric data cannot be steeled by anyone, and that the biometric clients are unable to
gather any information different from the single user verification/identification. In a biométrie
system with high level of privacy compliance, also the server that processes the biométrie
matching should not learn anything on the database and it should be impossible for the …
The privacy protection of the biometric data is an important research topic, especially in the case of distributed biometric systems. In this scenario, it is very important to guarantee that biometric data cannot be steeled by anyone, and that the biometric clients are unable to gather any information different from the single user verification/identification. In a biométrie system with high level of privacy compliance, also the server that processes the biométrie matching should not learn anything on the database and it should be impossible for the server to exploit the resulting matching values in order to extract any knowledge about the user presence or behavior. Within this conceptual framework, in this paper we propose a novel complete demonstrator based on a distributed biométrie system that is capable to protect the privacy of the individuals by exploiting cryptosystems. The implemented system computes the matching task in the encrypted domain by exploiting homomorphic encryption and using Fingercode templates. The paper describes the design methodology of the demonstrator and the obtained results. The demonstrator has been fully implemented and tested in real applicative conditions. Experimental results show that this method is feasible in the cases where the privacy of the data is more important than the accuracy of the system and the obtained computational time is satisfactory.
ieeexplore.ieee.org
以上显示的是最相近的搜索结果。 查看全部搜索结果