dom choice of permutations may result in a poor per-
formance in secrecy. They further demonstrated that
proper assignment of the permutations on the basis of
the biometric and the employed constant-weight code
could significantly reduces the probability of a suc-
cessful attack.
In this paper, we take a fresh look into biometric
authentication from an information-theoretic perspec-
tive. As a general model, we reconsider the biometric
authentication as an extension of Shannon’s secrecy
system. Similarly to the results for Shannon’s secrecy
system, we derive a necessary condition for obtaining
perfect secrecy, which do not depend on any specific
metric spaces. More specifically, we put our focus on
the fuzzy commitment scheme, i.e., Juels-Wattenberg
scheme as referred in the rest of the paper, as the
Hamming distance is perhaps the most natural met-
ric to consider. We show that the Juels-Wattenberg
scheme can be optimal in transmission/storage effi-
ciency under some idealized settings.
Going one step further, we notice that since years
the authorities have been collecting the biometric in-
formation from people. For instance, in most coun-
tries to apply for a visa, a digital photograph needs
to be submitted; and when one enters the border of
a country, she/he might be required to have her/his
fingerprint scanned. So we could assume that there
is a smart encoder which learns the enrolled biomet-
ric templates, and in turn may use this knowledge to
improve the performance of the current biometric au-
thentication scheme. Inspired by this observation and
previous work, we investigate the Juels-Wattenberg
scheme with a smart encoder which learns the en-
rolled biometric template. By remodeling it to a spe-
cific model of wiretap channel, we establish insights
into limitations and possible improvement on the cur-
rent biometric system.
There are two kinds of errors that biometric sys-
tems do: false rejection occurs when a legitimate user
is rejected and false acceptance occurs when an im-
poster is accepted as a legitimate user. So the perfor-
mance of the system is often illustrated by the false
rejection rate (FRR) and false accept rate (FAR). The
less are both rates, the better is the system perfor-
mance. In the reformulated systems present in this pa-
per, we use the terminologies average probability of
error at the legitimate user and the information leak-
age rate to the eavesdropper to evaluate the accuracy
and privacy performance. The former concept is by
definition the FRR; whilst the latter, as its name sug-
gests, characterizes the amount of information leak to
a third party. If the best an attacker can do is to try to
obtain the biometric template/key from the database
of the “encrypted biometric templates”, then due to
Fano’s inequality it can be shown that the FAR is up-
per bounded by the information leakage rate. One can
refer to the Appendix for a detailed proof of this.
In this paper, we use b to denote the master bio-
metric template, which is mostly generated from mul-
tiple biometric samples from the user at the enroll-
ment phase; b
′
denotes the biometric template ob-
tained at the time of authentication; while e repre-
sents the difference of the biometric readings of the
same user at two different phases. For simplicity, the
analysis of this paper is based on the following as-
sumptions.
• information is represented and transmitted in bits.
• biometric characteristics contain enough random-
ness which can be extracted to guarantee the sys-
tem performance in terms of accuracy and se-
crecy.
• variation in the biometric readings e is indepen-
dent of the master biometric template b.
Throughout this paper, between two binary se-
quences, the bitwise addition is carried out modulo
2. Besides, when the dimension of a sequence is clear
from the context or to be defined, we denote the se-
quences in boldface letters for simplicity. A simi-
lar convention applies to random variables, which are
denoted by upper-case letters. For the readers’ con-
venience, we also provide a list of notations in Ap-
pendix.
The rest of the paper is organized as follows: in
Section 2, we briefly review the Juels-Wattenberg
scheme. In Section 3, we look into the biomet-
ric authentication scheme from the perspective of an
extension of Shannon’s secrecy system. In Section
4, we reformulate the Juels-Wattenberg scheme with
a smart encoder to a specific wiretap channel with
side information. We demonstrate how the knowl-
edge of the enrolled biometrics can be employed
to improve the performance of the Juels-Wattenberg
scheme through both theoretical results and numeri-
cal examples. Finally we conclude in Section 5.
2 JUELS-WATTENBERG
SCHEME
The Juels-Wattenberg scheme (Juels and Wattenberg,
1999) is described as follows:
At enrollment,
• choose a random vector s and accordingly con-
struct a codeword c by a prespecified error cor-
recting code.
A FRESH LOOK INTO THE BIOMETRIC AUTHENTICATION - Perspective from Shannon's Secrecy System and a
Special Wiretap Channel
169