Biometric systems: Privacy and secrecy aspects

T Ignatenko, FMJ Willems - IEEE Transactions on Information …, 2009 - ieeexplore.ieee.org
This paper addresses privacy leakage in biometric secrecy systems. Four settings are
investigated. The first one is the standard Ahlswede-Csiszar secret-generation setting in …

Fundamental limits for privacy-preserving biometric identification systems that support authentication

T Ignatenko, FMJ Willems - IEEE Transactions on Information …, 2015 - ieeexplore.ieee.org
In this paper, we analyze two types of biometric identification systems with protected
templates that also support authentication. In the first system, two terminals observe …

Biometric security from an information-theoretical perspective

T Ignatenko, FMJ Willems - Foundations and Trends® in …, 2012 - nowpublishers.com
In this review, biometric systems are studied from an information theoretical point of view. In
the first part biometric authentication systems are studied. The objective of these systems is …

Privacy issues on biometric systems

M Faundez-Zanuy - IEEE Aerospace and Electronic Systems …, 2005 - ieeexplore.ieee.org
In the XXI st century, there is a strong interest on privacy issues. Technology permits
obtaining personal information without individuals' consent, computers make it feasible to …

[图书][B] Biometric security

J Hu, DCL Ngo, ABJ Teoh - 2015 - books.google.com
Modern biometrics delivers an enhanced level of security by means of a “proof of property”.
The design and deployment of a biometric system, however, hide many pitfalls, which, when …

Privacy protection in biometric-based recognition systems: A marriage between cryptography and signal processing

M Barni, G Droandi, R Lazzeretti - IEEE Signal Processing …, 2015 - ieeexplore.ieee.org
Systems employing biometric traits for people authentication and identification are
witnessing growing popularity due to the unique and indissoluble link between any …

Privacy–security trade-offs in biometric security systems—Part I: Single use case

L Lai, SW Ho, HV Poor - IEEE Transactions on Information …, 2010 - ieeexplore.ieee.org
This is the first part of a two-part paper on the information theoretic study of biometric security
systems. In this paper, the design of single-use biometric security systems is analyzed from …

Privacy-security tradeoffs in biometric security systems

L Lai, SW Ho, HV Poor - 2008 46th Annual Allerton Conference …, 2008 - ieeexplore.ieee.org
Biometric security systems are studied from an information theoretic perspective. A
fundamental tradeoff between privacy, measured by the normalized equivocation rate of the …

Privacy–security trade-offs in biometric security systems—Part II: Multiple use case

L Lai, SW Ho, HV Poor - IEEE Transactions on information …, 2010 - ieeexplore.ieee.org
This is the second part of a two-part paper on the information theoretic study of biometric
security systems. In this paper, the performance of reusable biometric security systems, in …

[PDF][PDF] Biometric encryption: The new breed of untraceable biometrics

A Cavoukian, A Stoianov - Biometrics: fundamentals, theory, and …, 2009 - academia.edu
Biometric technologies promise many benefits, including stronger user authentication,
greater user convenience, improved security, and operational efficiencies. These …