Skip to main content

Secure Computation for Privacy Preserving Biometric Data Retrieval and Authentication

  • Conference paper
Intelligence and Security Informatics (EuroIsI 2008)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 5376))

Included in the following conference series:

Abstract

The goal of this research is to develop provable secure computation techniques for two biometric security tasks; namely biometric data retrieval and authentication. We first present models for privacy and security that delineate the conditions under which biometric data disclosure are allowed, the conditions under which the protocol for data exchange should be provable secure, and the conditions under which the computation should be provable private. We then present a novel technique based on singular value decomposition and homomorphic encryption to achieve secure computation for biometric data retrieval. Finally we show a proof-of-concept implementation of the proposed techniques to realize a privacy preserving speaker verification system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ratha, N., Connell, J., Bolle, R.: Enhancing Security and Privacy in Biometrics-Based Authentication Systems. IBM Systems Journal 40(3), 614–634 (2001)

    Article  Google Scholar 

  2. Newton, E., Sweeney, L., Malin, B.: Preserving Privacy by De-Identifying Facial Images. IEEE Transactions on Knowledge and Data Engineering 17, 232–243 (2005)

    Article  Google Scholar 

  3. Gross, R., Airoldi, E., Malin, B., Sweeney, L.: Integrating Utility into Face De-Identification

    Google Scholar 

  4. Sutcu, Y., Li, Q., Memon, N.: Protecting Biometric Templates with Sketch: Theory and Practice. IEEE Transactions on Information Forensics and Security (2007)

    Google Scholar 

  5. Wickramasuriya, J., Datt, M., Mehrotra, S., Venkatasubramanian, N.: Privacy Protecting Data Collection in Media Spaces. In: ACM Int. Conf. on Multimedia, New York (2004)

    Google Scholar 

  6. Modi, S.K., Elliott, S.J.: Impact of Image Quality on Performance: Comparison of Young and Elderly Fingerprints. In: Sirlantzis, K. (ed.) 6th Int. Conf. on Recent Advances in Soft Computing (RASC 2006), pp. 449–454 (2006)

    Google Scholar 

  7. Yao, A.C.: Protocols for secure computations. In: 23rd IEEE Sym. on Foundations of Computer Science (1982)

    Google Scholar 

  8. Goldreich, O., Micali, S., Wigderson, A.: How to Play Any Mental Game. In: 19th Annual ACM Symposium on Theory of Computing, pp. 218–229 (1987)

    Google Scholar 

  9. Goldreich, O.: Secure Multi-Party Computation (working draft), http://www.wisdom.weizmann.ac.il/~oded/pp.html

  10. Du, W., Atallah, M.J.: Privacy-Preserving Cooperative Scientific Computations. In: 14th IEEE Computer Security Foundations Workshop, pp. 273–282 (2001)

    Google Scholar 

  11. Du, W., Atallah, M.J.: Secure Multi-Party Computation Problems and Their Applications: A Review and Open Problems. In: New Security Paradigms Workshop, pp. 11–20 (2001)

    Google Scholar 

  12. Brassard, G., Crepeau, C., Robert, J.: All-or-Nothing Disclosure of Secrets. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 234–238. Springer, Heidelberg (1987)

    Chapter  Google Scholar 

  13. Evan, S., Goldreich, O., Lempel, A.: A Randomized Protocol for Signing Contracts. Communications of the ACM 28, 637–647 (1985)

    Article  MathSciNet  Google Scholar 

  14. Naor, M., Pinkas, B.: Efficient Oblivious Transfer Protocols. In: 20th Annual ACM-SIAM Symposium on Discrete Algorithms, Washington D.C, pp. 448–457 (2001)

    Google Scholar 

  15. Press, W.H., Flannery, B.P., Teukolsky, S.A., Vetterling, W.T.: Numberical Recipes in C: The Art of Scientific Computing, 2nd edn. Cambridge University Press, Cambridge (1992)

    MATH  Google Scholar 

  16. Muller, N., Magaia, L., Herbst, B.M.: Singular Value Decomposition, Eigenfaces, and 3D Reconstructions. SIAM Review 46(3), 518–545 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  17. Saha, G., Chakraborty, S., Senapati, S.: A New Silence Removal & Endpoint Detection Algorithm for Speech & Speaker Recognition Applications. In: Proc. of NCC 2005 (January 2005)

    Google Scholar 

  18. Thrasyvoulou, T., Benton, S.: Speech Parameterization Using the Mel Scale (Part II) (2003)

    Google Scholar 

  19. http://www.qcwireless.net/biometric_ppr/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sy, B. (2008). Secure Computation for Privacy Preserving Biometric Data Retrieval and Authentication. In: Ortiz-Arroyo, D., Larsen, H.L., Zeng, D.D., Hicks, D., Wagner, G. (eds) Intelligence and Security Informatics. EuroIsI 2008. Lecture Notes in Computer Science, vol 5376. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-89900-6_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-89900-6_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-89899-3

  • Online ISBN: 978-3-540-89900-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics