Privacy security trade-offs in biometric security systems part II: multiple use case

dc.contributor.authorLai, L.
dc.contributor.authorHo, S.W.
dc.contributor.authorPoor, H.
dc.date.issued2011
dc.description.abstractThis is the second part of a two-part paper on the information theoretic study of biometric security systems. In this paper, the performance of reusable biometric security systems, in which the same biometric information is reused in multiple locations, is analyzed. The scenario in which the subsystems are jointly designed is first considered. An outer bound on the achievable trade-off between the privacy leakage of the biometric measurements and rates of keys generated at the subsystems is derived. A scheme that achieves the derived outer bound is then presented. Next, an incremental design approach is studied, in which the biometric measurements are reused while keeping the existing system intact. An achievable privacysecurity trade-off region for this design approach is derived. It is shown that under certain conditions, the incremental design approach can achieve the performance of the joint design approach. Finally, examples are given to illustrate the results derived. © 2010 IEEE.
dc.identifier.citationIEEE Transactions on Information Forensics and Security, 2011; 6(1):140-151
dc.identifier.doi10.1109/TIFS.2010.2098873
dc.identifier.issn1556-6013
dc.identifier.issn1556-6021
dc.identifier.orcidHo, S.W. [0000-0002-8630-494X]
dc.identifier.urihttps://hdl.handle.net/1959.8/116960
dc.language.isoen
dc.publisherIEEE Signal Processing Society
dc.relation.fundingNational Science Foundation CCF-07-28208
dc.relation.fundingNational Science Foundation CNS-09-05398
dc.relation.fundingNational Science Foundation CCF-10-16671
dc.relation.fundingARC
dc.rightsCopyright 2010 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
dc.source.urihttps://doi.org/10.1109/TIFS.2010.2098873
dc.subjectbiometric security
dc.subjectincremental design
dc.subjectjoint design
dc.subjectprivacy–security trade-off
dc.subjectreusable biometrics
dc.titlePrivacy security trade-offs in biometric security systems part II: multiple use case
dc.typeJournal article
pubs.publication-statusPublished
ror.mmsid9915909116001831

Files

Collections