Conclusions
We have described a general set-up and examples for biometric authentication/key generation schemes that satisfy the following properties:
- Robust to noise
- Versatile
- Zero-revealing
- Privacy protection
Biometrics nicely adhere to the same theoretical foundations as communication systems (Shannon channel capacity)
Major steps forward are to be expected once the link to information and communication theory and DSP can fully be exploited
Biometric systems need a proper “key management solution”, e.g. to protect privacy, to counter dishonest verifiers