A FRESH LOOK INTO THE BIOMETRIC AUTHENTICATION - Perspective from Shannon's Secrecy System and a Special Wiretap Channel

Yanling Chen, A. J. Han Vinck

2011

Abstract

In this paper, we first look at the biometric authentication scheme as an extension of Shannon's secrecy system with an error-prone key, and derive the necessary condition for the perfect secrecy. Furthermore, we show that the Juels-Wattenberg scheme is optimal by fulfilling such a condition once the biometric key and its error pattern satisfy certain statistical distributions; otherwise, it is possible to improve its performance by coding on basis of the biometric. We further confirm this proposition by reformulating the Juels-Wattenberg scheme with a smart encoder to a specific model of wiretap channel with side information, where the side information is the enrolled biometric template and assumed to be known at the encoder. The idea of the smart encoder is inspired by the fact that the authorities are collecting the biometric information from people since years, and this knowledge could in turn be used to better design the biometric systems for people's good. From an information theoretic perspective, we explore the secrecy capacity of this specific wiretap channel and demonstrate that the knowledge of the enrolled biometric template at the smart encoder does provide an advantage so as to enhance the performance of the biometric authentication scheme.

References

  1. A. Pankanti, S. P. and Jain, A. K. (2002). On the individuality of fingerprints. In IEEE Transactions on Pattern Analysis and Machine Intelligence. IEEE Computer Society.
  2. A. Pankanti, S. P. and Jain, A. K. (2002). On the individuality of fingerprints. In IEEE Transactions on Pattern Analysis and Machine Intelligence. IEEE Computer Society.
  3. Cavoukian, A. and Stoianov, A. (2009). Biometric encryption. In Encyclopedia of Biometrics. Springer.
  4. Cavoukian, A. and Stoianov, A. (2009). Biometric encryption. In Encyclopedia of Biometrics. Springer.
  5. Chen, Y. and Vinck, A. J. H. (2008). Wiretap channel with side information. In IEEE Transactions on Inforamtion Theory. IEEE Computer Society.
  6. Chen, Y. and Vinck, A. J. H. (2008). Wiretap channel with side information. In IEEE Transactions on Inforamtion Theory. IEEE Computer Society.
  7. Cohen, G. and Zémor, G. (2004). The wire-tap channel applied to biometrics. In Proc. Int. Symp. Inf. Theory & its Apps.
  8. Cohen, G. and Zémor, G. (2004). The wire-tap channel applied to biometrics. In Proc. Int. Symp. Inf. Theory & its Apps.
  9. Cover, T. M. and Thomas, J. A. (2005). Elements of Information Theory. John Wiley & Sons, Inc., New Jersey, 2nd edition.
  10. Cover, T. M. and Thomas, J. A. (2005). Elements of Information Theory. John Wiley & Sons, Inc., New Jersey, 2nd edition.
  11. J.MacWilliams, F. and Sloane, N. J. A. (1977). The Theory of Error-Correcting Codes. North-Holland, New York, 1st edition.
  12. J.MacWilliams, F. and Sloane, N. J. A. (1977). The Theory of Error-Correcting Codes. North-Holland, New York, 1st edition.
  13. Juels, A. and Sudan, M. (2006). A fuzzy vault scheme. In Design, Codes and Cryptography. Kluwer Academic Publishers.
  14. Juels, A. and Sudan, M. (2006). A fuzzy vault scheme. In Design, Codes and Cryptography. Kluwer Academic Publishers.
  15. Juels, A. and Wattenberg, M. (1999). A fuzzy commitment scheme. In Proc. 6th ACM Conf. Computer and Comm. Security. ACM.
  16. Juels, A. and Wattenberg, M. (1999). A fuzzy commitment scheme. In Proc. 6th ACM Conf. Computer and Comm. Security. ACM.
  17. Liu, W. and Chen, B. (2007). Wiretap channel with twosided channel state information. In The 41 Asilomar Conference on Signals, Systems & Computers.
  18. Liu, W. and Chen, B. (2007). Wiretap channel with twosided channel state information. In The 41 Asilomar Conference on Signals, Systems & Computers.
  19. Shannon, C. E. (1949). Communication theory of secrecy systems. In Bell Sys. Tech. J.
  20. Shannon, C. E. (1949). Communication theory of secrecy systems. In Bell Sys. Tech. J.
  21. V. B. Balakirsky, A. R. G. and Vinck, A. J. H. (2009). Permutation block coding from biometrical authentication. In Proc. 7th Int. Conf. on Computer Science and Info. Technologies.
  22. V. B. Balakirsky, A. R. G. and Vinck, A. J. H. (2009). Permutation block coding from biometrical authentication. In Proc. 7th Int. Conf. on Computer Science and Info. Technologies.
  23. Vinck, A. J. H. and Balakirsky, V. (2010). Template protection and biometric verification. In Proc. 6th AsiaEurope Workshop on Information Theory.
  24. Vinck, A. J. H. and Balakirsky, V. (2010). Template protection and biometric verification. In Proc. 6th AsiaEurope Workshop on Information Theory.
  25. Wyner, A. D. (1975). The wire-tap channel. In Bell Sys. Tech. J.
  26. Wyner, A. D. (1975). The wire-tap channel. In Bell Sys. Tech. J.
  27. Y. Dodis, R. Ostrovsky, L. R. and Smith, A. (2008). Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In SIAM Journal on Computing. Society for Industrial and Applied Mathematics (SIAM).
  28. Y. Dodis, R. Ostrovsky, L. R. and Smith, A. (2008). Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In SIAM Journal on Computing. Society for Industrial and Applied Mathematics (SIAM).
Download


Paper Citation


in Harvard Style

Chen Y. and J. Han Vinck A. (2011). A FRESH LOOK INTO THE BIOMETRIC AUTHENTICATION - Perspective from Shannon's Secrecy System and a Special Wiretap Channel . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011) ISBN 978-989-8425-71-3, pages 168-177. DOI: 10.5220/0003519001680177


in Harvard Style

Chen Y. and J. Han Vinck A. (2011). A FRESH LOOK INTO THE BIOMETRIC AUTHENTICATION - Perspective from Shannon's Secrecy System and a Special Wiretap Channel . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011) ISBN 978-989-8425-71-3, pages 168-177. DOI: 10.5220/0003519001680177


in Bibtex Style

@conference{secrypt11,
author={Yanling Chen and A. J. Han Vinck},
title={A FRESH LOOK INTO THE BIOMETRIC AUTHENTICATION - Perspective from Shannon's Secrecy System and a Special Wiretap Channel},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)},
year={2011},
pages={168-177},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003519001680177},
isbn={978-989-8425-71-3},
}


in Bibtex Style

@conference{secrypt11,
author={Yanling Chen and A. J. Han Vinck},
title={A FRESH LOOK INTO THE BIOMETRIC AUTHENTICATION - Perspective from Shannon's Secrecy System and a Special Wiretap Channel},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)},
year={2011},
pages={168-177},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003519001680177},
isbn={978-989-8425-71-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)
TI - A FRESH LOOK INTO THE BIOMETRIC AUTHENTICATION - Perspective from Shannon's Secrecy System and a Special Wiretap Channel
SN - 978-989-8425-71-3
AU - Chen Y.
AU - J. Han Vinck A.
PY - 2011
SP - 168
EP - 177
DO - 10.5220/0003519001680177


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)
TI - A FRESH LOOK INTO THE BIOMETRIC AUTHENTICATION - Perspective from Shannon's Secrecy System and a Special Wiretap Channel
SN - 978-989-8425-71-3
AU - Chen Y.
AU - J. Han Vinck A.
PY - 2011
SP - 168
EP - 177
DO - 10.5220/0003519001680177