Secure and efficient protocols for iris and fingerprint identification

M Blanton, P Gasti - Computer Security–ESORICS 2011: 16th European …, 2011 - Springer
Computer Security–ESORICS 2011: 16th European Symposium on Research in …, 2011Springer
Recent advances in biometric recognition and the increasing use of biometric data prompt
significant privacy challenges associated with the possible misuse, loss, or theft of biometric
data. Biometric matching is often performed by two mutually distrustful parties, one of which
holds one biometric image while the other owns a possibly large biometric collection. Due to
privacy and liability considerations, neither party is willing to share its data. This gives rise to
the need to develop secure computation techniques over biometric data where no …
Abstract
Recent advances in biometric recognition and the increasing use of biometric data prompt significant privacy challenges associated with the possible misuse, loss, or theft of biometric data. Biometric matching is often performed by two mutually distrustful parties, one of which holds one biometric image while the other owns a possibly large biometric collection. Due to privacy and liability considerations, neither party is willing to share its data. This gives rise to the need to develop secure computation techniques over biometric data where no information is revealed to the parties except the outcome of the comparison or search. To address the problem, in this work we develop and implement the first privacy-preserving identification protocol for iris codes. We also design and implement a secure protocol for fingerprint identification based on FingerCodes with a substantial improvement in the performance compared to existing solutions. We show that new techniques and optimizations employed in this work allow us to achieve particularly efficient protocols suitable for large data sets and obtain notable performance gain compared to the state-of-the-art prior work.
Springer
以上显示的是最相近的搜索结果。 查看全部搜索结果