Anonymous biometrics

4/10/05


Click here to start


Table of Contents

Anonymous biometrics

Outline

PPT Slide

Methods of identification

Risks

Risks in Biometric Key Management

And, ...should they all be able to get my biometrics freely from a data base?

ARCHITECTURAL ASSUMPTIONS

Benchmark: Secure password verification

Issue with Secure Biometric Verification

PPT Slide

Literature

Vocabulary

Information Theoretic Model

Secrecy Extractor

Requirements

Generic Model

Authentication Protocol

Terminology

d-contracting: Robust against noise

Implications

Proposition 1 : G() is truly necessary

e-revealing : Secure

Implications

Three examples

System 2: Add redundancy

System 3: “Quantization Index Modulation”

Quantization Index Modulation

Error rate: False Negatives

Security: Analysis of e-revealing

The Information Theoretic Basics I

The Information Theoretic Basics II

To make it work

“Ear canal” Biometrics = Headphone-to-Ear Transfer Function

Headphone-to-Ear Transfer Function: 1 ear, population (45x8)

Results: Principal Component Transform

PPT Slide

Conclusions

PPT Slide

EXAMPLES

Secure Biometric Authentication Scheme (SBA)

PPT Slide

Discrete Biometrics

PPT Slide

Experiments

“Ear canal” Biometrics = Headphone-to-Ear Transfer Function

Headphone-to-Ear Transfer Function: 1 ear, population (45x8)

Results: Principal Component Transform

Author: Verbitskiy

Home Page: http://www.linnartz.net