Abstract
The determination of hashes based on biometric data is a recent topic in biometrics as it allows to handle biometric templates in a privacy manner. Two main applications are the generation of secure biometric templates and cryptographic keys. Depending on these applications, there are different requirements with regard to possible errors. On one side, authentication performance based on biometric hashes as feature representation can be measured by common biometric error rates such as EER. Thus, generated hashes for each single person have to be only similar in a certain degree. On the other side, biometric hashes for cryptographic issues have to be identical and unique for each individual, although measured data from same person differs or data from different people may be similar. Therefore, we suggest three measures to estimate the reproducibility performance of biometric hash algorithms for cryptographic applications. To prove the concept of the measures, we provide an experimental evaluation of an online handwriting based hash generation algorithm using a database of 84 users and different evaluation scenarios.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Dittmann, J., Vielhauer, C.: Encryption Related Issues. In: Joint COST 2101 and BioSecure Industrial and End-user Committee Workshop on Smart Cards and Biometrics, Lausanne (2007)
Monrose, F., Reiter, M.K., Li, Q., Wetzel, S.: Using Voice to Generate Cryptographic Keys. In: A Speaker Odyssey, the Speech Recognition Workshop, Crete (2001)
Vielhauer, C., Steinmetz, R., Mayerhöfer, A.: Biometric Hash based on Statistical Features of Online Signature. In: International Conference on Pattern Recognition, Quebec City (2002)
Sutcu, Y., Sencar, H.T., Memon, N.: A Secure Biometric Authentication Scheme Based on Robust Hashing. In: 7th workshop on Multimedia and security. ACM Press, New York (2005)
Tulyakov, S., Farooq, F., Govindaraju, V.: Symmetric Hash Functions for Fingerprint Minutiae. In: International Workshop on Pattern Recognition for Crime Prevention, Security and Surveillance, Bath (2005)
Korte, U., et al.: A cryptographic biometric authentication system based on genetic fingerprints. In: Alkassar, Siekmann (eds.) Sicherheit 2008 - Sicherheit, Schutz und Zuverlässigkeit; Beiträge der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V., Saarbrücken (2008)
Scheidat, T., Vielhauer, C.: Biometric Hashing for Handwriting: Entropy based feature selection and semantic fusion. In: SPIE - Security, Steganography and Watermarking of Multimedia Contents X, IS&T/SPIE Symposium on Electronic Imaging, San Jose, California (2008)
Bishop, M.: Computer Security: Art and Science. Addison-Wesley, Reading (2003)
Vielhauer, C.: Biometric User Authentication for IT Security: From Fundamentals to Handwriting. Springer, New York (2006)
Hamming, R.W.: Error-detecting and error-correcting codes. Bell System Technical Journal XXVI (2) (1950)
Ross, A., Nandakumar, K., Jain, A.K.: Handbook of Multibiometrics. Springer, New York (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Scheidat, T., Vielhauer, C., Dittmann, J. (2008). Advanced Studies on Reproducibility of Biometric Hashes. In: Schouten, B., Juul, N.C., Drygajlo, A., Tistarelli, M. (eds) Biometrics and Identity Management. BioID 2008. Lecture Notes in Computer Science, vol 5372. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-89991-4_16
Download citation
DOI: https://doi.org/10.1007/978-3-540-89991-4_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-89990-7
Online ISBN: 978-3-540-89991-4
eBook Packages: Computer ScienceComputer Science (R0)