Security Efficiency Analysis of a Biometric Fuzzy Extractor for Iris Templates

  • F. Hernández Álvarez
  • L. Hernández Encinas
Conference paper
Part of the Advances in Intelligent and Soft Computing book series (AINSC, volume 63)


A Biometric fuzzy extractor scheme for iris templates was recently presented in [3]. This fuzzy extractor binds a cryptographic key with the iris template of a user, allowing to recover such cryptographic key by authenticating the user by means of a new iris template from her. In this work, an analysis of the security efficiency of this fuzzy extractor is carried out by means of a study about the behavior of the scheme with cryptographic keys of different bitlengths: 64, 128, 192, and 256. The different sizes of the keys permit to analyze the variability of the intra- and inter-user in the iris templates.


Biometrics Iris Template False Acceptance Rate False Rejection Rate Fuzzy extractor 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Diez Laiz, E.: Master Thesis, Universidad Politécnica de Madrid (to appear)Google Scholar
  2. 2.
    Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. SIAM Journal Computing 38(1), 97–139 (2008)zbMATHCrossRefMathSciNetGoogle Scholar
  3. 3.
    Hernández Álvarez, F., Hernández Encinas, L., Sánchez Ávila, C.: Biometric Fuzzy Extractor Scheme for Iris Templates. In: Proc. of The 2009 World Congress in Computer Science, Computer Engineering, and Applied Computing, WORLDCOMP 2009 (to appear, 2009)Google Scholar
  4. 4.
    Juels, A., Sudan, M.: A fuzzy vault scheme. Designs, Codes and Cryptography 38(2), 237–257 (2006)zbMATHCrossRefMathSciNetGoogle Scholar
  5. 5.
    Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: Proc. of the 6th ACM conference on Computer and Communications Security, pp. 28–36 (1999)Google Scholar
  6. 6.
    Jain, A.K., Nandakumar, K., Nagar, A.: Biometric Template Security. Journal on Advances in Signal Processing 8(2), 17 (2008)Google Scholar
  7. 7.
    Lee, Y.-J., Bae, K., Lee, S.-J., Park, K.R., Kim, J.H.: Biometric key binding: Fuzzy vault based on iris images. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol. 4642, pp. 800–808. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  8. 8.
    Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)zbMATHGoogle Scholar
  9. 9.
    Tong, V.V.T., Sibert, H., Lecœur, J., Girault, M.: Biometric fuzzy extractors made practical: A proposal based on fingerCodes. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol. 4642, pp. 604–613. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  10. 10.
    Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.K.: Biometric Cryptosystems: Issues and Challenges. Proc. of the IEEE 92(6), 948–960 (2004)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • F. Hernández Álvarez
    • 1
  • L. Hernández Encinas
    • 1
  1. 1.Department of Information Processing and CodingApplied Physics Institute, CSICMadridSpain

Personalised recommendations