Abstract
The goal of this research is to develop provable secure computation techniques for two biometric security tasks; namely biometric data retrieval and authentication. We first present models for privacy and security that delineate the conditions under which biometric data disclosure are allowed, the conditions under which the protocol for data exchange should be provable secure, and the conditions under which the computation should be provable private. We then present a novel technique based on singular value decomposition and homomorphic encryption to achieve secure computation for biometric data retrieval. Finally we show a proof-of-concept implementation of the proposed techniques to realize a privacy preserving speaker verification system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ratha, N., Connell, J., Bolle, R.: Enhancing Security and Privacy in Biometrics-Based Authentication Systems. IBM Systems Journal 40(3), 614–634 (2001)
Newton, E., Sweeney, L., Malin, B.: Preserving Privacy by De-Identifying Facial Images. IEEE Transactions on Knowledge and Data Engineering 17, 232–243 (2005)
Gross, R., Airoldi, E., Malin, B., Sweeney, L.: Integrating Utility into Face De-Identification
Sutcu, Y., Li, Q., Memon, N.: Protecting Biometric Templates with Sketch: Theory and Practice. IEEE Transactions on Information Forensics and Security (2007)
Wickramasuriya, J., Datt, M., Mehrotra, S., Venkatasubramanian, N.: Privacy Protecting Data Collection in Media Spaces. In: ACM Int. Conf. on Multimedia, New York (2004)
Modi, S.K., Elliott, S.J.: Impact of Image Quality on Performance: Comparison of Young and Elderly Fingerprints. In: Sirlantzis, K. (ed.) 6th Int. Conf. on Recent Advances in Soft Computing (RASC 2006), pp. 449–454 (2006)
Yao, A.C.: Protocols for secure computations. In: 23rd IEEE Sym. on Foundations of Computer Science (1982)
Goldreich, O., Micali, S., Wigderson, A.: How to Play Any Mental Game. In: 19th Annual ACM Symposium on Theory of Computing, pp. 218–229 (1987)
Goldreich, O.: Secure Multi-Party Computation (working draft), http://www.wisdom.weizmann.ac.il/~oded/pp.html
Du, W., Atallah, M.J.: Privacy-Preserving Cooperative Scientific Computations. In: 14th IEEE Computer Security Foundations Workshop, pp. 273–282 (2001)
Du, W., Atallah, M.J.: Secure Multi-Party Computation Problems and Their Applications: A Review and Open Problems. In: New Security Paradigms Workshop, pp. 11–20 (2001)
Brassard, G., Crepeau, C., Robert, J.: All-or-Nothing Disclosure of Secrets. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 234–238. Springer, Heidelberg (1987)
Evan, S., Goldreich, O., Lempel, A.: A Randomized Protocol for Signing Contracts. Communications of the ACM 28, 637–647 (1985)
Naor, M., Pinkas, B.: Efficient Oblivious Transfer Protocols. In: 20th Annual ACM-SIAM Symposium on Discrete Algorithms, Washington D.C, pp. 448–457 (2001)
Press, W.H., Flannery, B.P., Teukolsky, S.A., Vetterling, W.T.: Numberical Recipes in C: The Art of Scientific Computing, 2nd edn. Cambridge University Press, Cambridge (1992)
Muller, N., Magaia, L., Herbst, B.M.: Singular Value Decomposition, Eigenfaces, and 3D Reconstructions. SIAM Review 46(3), 518–545 (2004)
Saha, G., Chakraborty, S., Senapati, S.: A New Silence Removal & Endpoint Detection Algorithm for Speech & Speaker Recognition Applications. In: Proc. of NCC 2005 (January 2005)
Thrasyvoulou, T., Benton, S.: Speech Parameterization Using the Mel Scale (Part II) (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sy, B. (2008). Secure Computation for Privacy Preserving Biometric Data Retrieval and Authentication. In: Ortiz-Arroyo, D., Larsen, H.L., Zeng, D.D., Hicks, D., Wagner, G. (eds) Intelligence and Security Informatics. EuroIsI 2008. Lecture Notes in Computer Science, vol 5376. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-89900-6_16
Download citation
DOI: https://doi.org/10.1007/978-3-540-89900-6_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-89899-3
Online ISBN: 978-3-540-89900-6
eBook Packages: Computer ScienceComputer Science (R0)