Anonymous biometrics
Outline
PPT Slide
Methods of identification
Risks
Risks in Biometric Key Management
And, ...should they all be able to get my biometrics freely from a data base?
ARCHITECTURAL ASSUMPTIONS
Benchmark: Secure password verification
Issue with Secure Biometric Verification
Literature
Vocabulary
Information Theoretic Model
Secrecy Extractor
Requirements
Generic Model
Authentication Protocol
Terminology
d-contracting: Robust against noise
Implications
Proposition 1 : G() is truly necessary
e-revealing : Secure
Three examples
System 2: Add redundancy
System 3: “Quantization Index Modulation”
Quantization Index Modulation
Error rate: False Negatives
Security: Analysis of e-revealing
The Information Theoretic Basics I
The Information Theoretic Basics II
To make it work
“Ear canal” Biometrics = Headphone-to-Ear Transfer Function
Headphone-to-Ear Transfer Function: 1 ear, population (45x8)
Results: Principal Component Transform
Conclusions
EXAMPLES
Secure Biometric Authentication Scheme (SBA)
Discrete Biometrics
Experiments
Home Page: http://www.linnartz.net