Systems employing biometric traits for people authentication and identification are witnessing growing popularity due to the unique and indissoluble link between any individual and his/her biometric characters. For this reason, biometric templates are increasingly used for border monitoring, access control, membership verification, and so on. When employed to replace passwords, biometrics have the added advantage that they do not need to be memorized and are relatively hard to steal. Nonetheless, unlike conventional security mechanisms such as passwords, biometric data are inherent parts of a person?s body and cannot be replaced if they are compromised. Even worse, compromised biometric data can be used to have access to sensitive information and to impersonate the victim for malicious purposes. For the same reason, biometric leakage in a given system can seriously jeopardize the security of other systems based on the same biometrics. A further problem associated with the use of biometric traits is that, due to their uniqueness, the privacy of their owner is put at risk. Geographical position, movements, habits, and even personal beliefs can be tracked by observing when and where the biometric traits of an individual are used to identify him/her.

Privacy Protection in Biometric-Based Recognition Systems: A marriage between cryptography and signal processing / Barni, M; Droandi, G; Lazzeretti, Riccardo. - In: IEEE SIGNAL PROCESSING MAGAZINE. - ISSN 1053-5888. - 32:5(2015), pp. 66-76. [10.1109/MSP.2015.2438131]

Privacy Protection in Biometric-Based Recognition Systems: A marriage between cryptography and signal processing

LAZZERETTI, RICCARDO
2015

Abstract

Systems employing biometric traits for people authentication and identification are witnessing growing popularity due to the unique and indissoluble link between any individual and his/her biometric characters. For this reason, biometric templates are increasingly used for border monitoring, access control, membership verification, and so on. When employed to replace passwords, biometrics have the added advantage that they do not need to be memorized and are relatively hard to steal. Nonetheless, unlike conventional security mechanisms such as passwords, biometric data are inherent parts of a person?s body and cannot be replaced if they are compromised. Even worse, compromised biometric data can be used to have access to sensitive information and to impersonate the victim for malicious purposes. For the same reason, biometric leakage in a given system can seriously jeopardize the security of other systems based on the same biometrics. A further problem associated with the use of biometric traits is that, due to their uniqueness, the privacy of their owner is put at risk. Geographical position, movements, habits, and even personal beliefs can be tracked by observing when and where the biometric traits of an individual are used to identify him/her.
2015
Signal Processing in the encrypted domain; homomorphic encryption; garbled circuits; biometric protection
01 Pubblicazione su rivista::01a Articolo in rivista
Privacy Protection in Biometric-Based Recognition Systems: A marriage between cryptography and signal processing / Barni, M; Droandi, G; Lazzeretti, Riccardo. - In: IEEE SIGNAL PROCESSING MAGAZINE. - ISSN 1053-5888. - 32:5(2015), pp. 66-76. [10.1109/MSP.2015.2438131]
File allegati a questo prodotto
File Dimensione Formato  
Barni_Privacy-Protection-in-biometric_2015.pdf

solo gestori archivio

Tipologia: Versione editoriale (versione pubblicata con il layout dell'editore)
Licenza: Tutti i diritti riservati (All rights reserved)
Dimensione 2.46 MB
Formato Adobe PDF
2.46 MB Adobe PDF   Contatta l'autore
Barni_preprint_Privacy-Protection-in-biometric_2015.pdf

accesso aperto

Note: https://ieeexplore.ieee.org/document/7192837
Tipologia: Documento in Pre-print (manoscritto inviato all'editore, precedente alla peer review)
Licenza: Tutti i diritti riservati (All rights reserved)
Dimensione 7.28 MB
Formato Adobe PDF
7.28 MB Adobe PDF

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/967181
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 70
  • ???jsp.display-item.citation.isi??? 54
social impact