Privacy security trade-offs in biometric security systems part II: multiple use case
| dc.contributor.author | Lai, L. | |
| dc.contributor.author | Ho, S.W. | |
| dc.contributor.author | Poor, H. | |
| dc.date.issued | 2011 | |
| dc.description.abstract | This is the second part of a two-part paper on the information theoretic study of biometric security systems. In this paper, the performance of reusable biometric security systems, in which the same biometric information is reused in multiple locations, is analyzed. The scenario in which the subsystems are jointly designed is first considered. An outer bound on the achievable trade-off between the privacy leakage of the biometric measurements and rates of keys generated at the subsystems is derived. A scheme that achieves the derived outer bound is then presented. Next, an incremental design approach is studied, in which the biometric measurements are reused while keeping the existing system intact. An achievable privacysecurity trade-off region for this design approach is derived. It is shown that under certain conditions, the incremental design approach can achieve the performance of the joint design approach. Finally, examples are given to illustrate the results derived. © 2010 IEEE. | |
| dc.identifier.citation | IEEE Transactions on Information Forensics and Security, 2011; 6(1):140-151 | |
| dc.identifier.doi | 10.1109/TIFS.2010.2098873 | |
| dc.identifier.issn | 1556-6013 | |
| dc.identifier.issn | 1556-6021 | |
| dc.identifier.orcid | Ho, S.W. [0000-0002-8630-494X] | |
| dc.identifier.uri | https://hdl.handle.net/1959.8/116960 | |
| dc.language.iso | en | |
| dc.publisher | IEEE Signal Processing Society | |
| dc.relation.funding | National Science Foundation CCF-07-28208 | |
| dc.relation.funding | National Science Foundation CNS-09-05398 | |
| dc.relation.funding | National Science Foundation CCF-10-16671 | |
| dc.relation.funding | ARC | |
| dc.rights | Copyright 2010 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. | |
| dc.source.uri | https://doi.org/10.1109/TIFS.2010.2098873 | |
| dc.subject | biometric security | |
| dc.subject | incremental design | |
| dc.subject | joint design | |
| dc.subject | privacy–security trade-off | |
| dc.subject | reusable biometrics | |
| dc.title | Privacy security trade-offs in biometric security systems part II: multiple use case | |
| dc.type | Journal article | |
| pubs.publication-status | Published | |
| ror.mmsid | 9915909116001831 |