Abstract
A Biometric fuzzy extractor scheme for iris templates was recently presented in [3]. This fuzzy extractor binds a cryptographic key with the iris template of a user, allowing to recover such cryptographic key by authenticating the user by means of a new iris template from her. In this work, an analysis of the security efficiency of this fuzzy extractor is carried out by means of a study about the behavior of the scheme with cryptographic keys of different bitlengths: 64, 128, 192, and 256. The different sizes of the keys permit to analyze the variability of the intra- and inter-user in the iris templates.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Diez Laiz, E.: Master Thesis, Universidad Politécnica de Madrid (to appear)
Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. SIAM Journal Computing 38(1), 97–139 (2008)
Hernández Álvarez, F., Hernández Encinas, L., Sánchez Ávila, C.: Biometric Fuzzy Extractor Scheme for Iris Templates. In: Proc. of The 2009 World Congress in Computer Science, Computer Engineering, and Applied Computing, WORLDCOMP 2009 (to appear, 2009)
Juels, A., Sudan, M.: A fuzzy vault scheme. Designs, Codes and Cryptography 38(2), 237–257 (2006)
Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: Proc. of the 6th ACM conference on Computer and Communications Security, pp. 28–36 (1999)
Jain, A.K., Nandakumar, K., Nagar, A.: Biometric Template Security. Journal on Advances in Signal Processing 8(2), 17 (2008)
Lee, Y.-J., Bae, K., Lee, S.-J., Park, K.R., Kim, J.H.: Biometric key binding: Fuzzy vault based on iris images. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol. 4642, pp. 800–808. Springer, Heidelberg (2007)
Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)
Tong, V.V.T., Sibert, H., Lecœur, J., Girault, M.: Biometric fuzzy extractors made practical: A proposal based on fingerCodes. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol. 4642, pp. 604–613. Springer, Heidelberg (2007)
Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.K.: Biometric Cryptosystems: Issues and Challenges. Proc. of the IEEE 92(6), 948–960 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Álvarez, F.H., Encinas, L.H. (2009). Security Efficiency Analysis of a Biometric Fuzzy Extractor for Iris Templates. In: Herrero, Á., Gastaldo, P., Zunino, R., Corchado, E. (eds) Computational Intelligence in Security for Information Systems. Advances in Intelligent and Soft Computing, vol 63. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04091-7_20
Download citation
DOI: https://doi.org/10.1007/978-3-642-04091-7_20
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-04090-0
Online ISBN: 978-3-642-04091-7
eBook Packages: EngineeringEngineering (R0)