Abstract
In this paper, the authors consider the prospects for embedding privacy into biometric technology through biometric encryption (BE) to deliver both privacy and security, particularly as more and more countries are exploring the use of biometric solutions for the purpose of authentication. This discussion arises from Commissioner Ann Cavoukian’s seminal work in the area of BE and Max Snijder’s early work on anonymous biometrics and e-Identity. It touches on the distinguishing features of the algorithmic process defined by BE, the terminology that best describes this process, and provides a springboard for further thought leadership on the policies and guidelines needed to distinguish between conventional and untraceable biometrics schemes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Snijder, M.: Biometrics and (e-) Identity. In: Policy Forum on Outsourcing of Systems for Detection, Identification and Authentication, London, February 9 (2009) http://www.hideproject.org/downloads/HIDE_PF-Outsourcing-Presentation_Max_Snijder-20090206.pdf , http://www.bioethics.ie/uploads/docs/Biometrics_Conference_Final.pdf
Cavoukian, A., Stoianov, A.: Biometric Encryption: A Positive-Sum Technology that Achieves Strong Authentication, Security AND Privacy (March 2007), http://www.ipc.on.ca/images/Resources/up-1bio_encryp.pdf
Cavoukian, A., Stoianov, A.: Biometric Encryption: The New Breed of Untraceable Biometrics. In: Boulgouris, N.V., Plataniotis, K.N., Micheli-Tzanakou, E. (eds.) Biometrics: fundamentals, theory, and systems, ch. 26, pp. 655–718. Wiley-IEEE Press (2009)
Cappelli, R., Lumini, A., Maio, D., Maltoni, D.: Fingerprint Image Reconstruction from Standard Templates. IEEE Transactions On Pattern Analysis And Machine Intelligence 29(9), 1489–1503 (2007)
Feng, J., Jain, A.K.: FM Model Based Fingerprint Reconstruction from Minutiae Template. In: Tistarelli, M., Nixon, M.S. (eds.) ICB 2009. LNCS, vol. 5558, pp. 544–553. Springer, Heidelberg (2009)
Cavoukian, A.: Fingerprint Biometrics: Address Privacy Before Deployment. IPC (November 2008), http://www.ipc.on.ca/images/Resources/fingerprint-biosys-priv.pdf
“Harmonized biometric vocabulary”. JTC 1/SC 37/WG 1
Bringer, J., Chabanne, H.: An authentication protocol with encrypted biometric data. In: Vaudenay, S. (ed.) AFRICACRYPT 2008. LNCS, vol. 5023, pp. 109–124. Springer, Heidelberg (2008)
Stoianov, A.: Cryptographically Secure Biometrics. In: Proceedings of the Biometric Technology for Human Identification VII, SPIE International Symposium on Defense, Security and Sensing, Orlando, FL (April 2010)
Sheng, W., Howells, G., Fairhurst, M., Deravi, F.: Template-free biometric-key generation by means of fuzzy genetic clustering. IEEE Transactions on Information Forensics And Security 3(2), 183–191 (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Cavoukian, A., Snijder, M., Stoianov, A., Chibba, M. (2010). Privacy and Biometrics for Authentication Purposes: A Discussion of Untraceable Biometrics and Biometric Encryption. In: Kumar, A., Zhang, D. (eds) Ethics and Policy of Biometrics. ICEB 2010. Lecture Notes in Computer Science, vol 6005. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12595-9_3
Download citation
DOI: https://doi.org/10.1007/978-3-642-12595-9_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-12594-2
Online ISBN: 978-3-642-12595-9
eBook Packages: Computer ScienceComputer Science (R0)