Skip to main navigation Skip to search Skip to main content

Privacy protection in high security biometrics applications

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

22 Scopus citations

Abstract

While biometrics is useful for secure and accurate identification of a person, it also has serious privacy implications in handling large databases of biometrics. Standard encryption techniques have limited use for handling biometrics templates and signals as intra-person variations can't be handled effectively using information security techniques. As a way to enhance privacy and security of biometrics databases, we present a pattern recognition-based model to analyze the threats to a biometrics-based authentication system and also a novel solution to enhances privacy. Cancelable biometrics is an emerging concept, where transformations that hide the biometrics signatures (fingerprints, faces and iris) are designed so that the identity can be established with added security. Other methods have been proposed for enhancing privacy in biometrics. In this paper, we will describe our threat model for biometrics recognition and recent advances proposed for privacy enhancements for fingerprint and iris biometrics.

Original languageEnglish
Title of host publicationEthics and Policy of Biometrics - Third International Conference on Ethics and Policy of Biometrics and International Data Sharing, ICEB 2010, Revised Selected Papers
Pages62-69
Number of pages8
DOIs
StatePublished - 2010
Event3rd International Conference on Ethics and Policy of Biometrics and International Data Sharing, ICEB 2010 - Hong Kong, Hong Kong
Duration: Jan 4 2010Jan 5 2010

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6005 LNCS

Conference

Conference3rd International Conference on Ethics and Policy of Biometrics and International Data Sharing, ICEB 2010
Country/TerritoryHong Kong
CityHong Kong
Period01/4/1001/5/10

Fingerprint

Dive into the research topics of 'Privacy protection in high security biometrics applications'. Together they form a unique fingerprint.

Cite this