Loading [a11y]/accessibility-menu.js
Towards efficient privacy-preserving two-stage identification for fingerprint-based biometric cryptosystems | IEEE Conference Publication | IEEE Xplore

Towards efficient privacy-preserving two-stage identification for fingerprint-based biometric cryptosystems


Abstract:

Biometric template protection schemes in particular, biometric cryptosystems bind secret keys to biometric data, i.e. complex key retrieval processes are performed at eac...Show More

Abstract:

Biometric template protection schemes in particular, biometric cryptosystems bind secret keys to biometric data, i.e. complex key retrieval processes are performed at each authentication attempt. Focusing on biometric identification exhaustive 1: N comparisons are required for identifying a biometric probe. As a consequence comparison time frequently dominates the overall computational workload, preventing biometric cryptosystems from being operated in identification mode. In this paper we propose a computational efficient two-stage identification system for fingerprint-biometric cryptosystems. Employing the concept of adaptive Bloom filter-based cancelable biometrics, pseudonymous binary prescreeners are extracted based on which top-candidates are returned from a database. Thereby the number of required key-retrieval processes is reduced to a fraction of the total. Experimental evaluations confirm that, by employing the proposed technique, biometric cryptosystems, e.g. fuzzy vault scheme, can be enhanced in order to enable a real-time privacy preserving identification, while at the same time biometric performance is maintained.
Date of Conference: 29 September 2014 - 02 October 2014
Date Added to IEEE Xplore: 29 December 2014
Electronic ISBN:978-1-4799-3584-0
Conference Location: Clearwater, FL, USA

References

References is not available for this document.