Biometric Template Protection - NIST Visual Image Processing Group

Biometric Template Protection - NIST Visual Image Processing Group Biometric Template Protection - NIST Visual Image Processing Group

biometrics.nist.gov
from biometrics.nist.gov More from this publisher
13.07.2015 Views

Biometric Template ProtectionISO Architecture*! !v§ Pseudonymous Identifier Encoder (PIE): [PI, AD] = PIE(M), M is observed biometric data inenrolment§ Pseudonymous Identifier Recorder (PIR): [PI’] = PIR(M’, AD), M’ is probe biometric data§ Pseudonymous Identifier Comparator (PIC): v = PIC (PI , PI’), v is comparison result§ Stored protected template [PI, AD], where PI is pseudonymous identifier andAD is auxiliary data* ISO/IEC 24745 (2011) Information technology - Security techniques - Biometric Information protectionA Privacy and Security Evaluation Framework for TP| Xuebing Zhou |Gaithersburg, March 09, 20126

How to Assess Template Protection§ Protection goals - Evaluation criteria§ Security of PI: Hardness to find an M* (“pre-image” of PI), which can passPI- verification process§ Privacy protection ability:§ Irreversibility: Hardness to find an M*, which is very close to the original M§ Privacy leakage: Information about M contained in protected templates§ Unlinkability:§Cross matching: Personal identifiable information contained inprotected templates§Leakage amplification: Additional information about M or pre-image of PI gainedwhen combining protected templates of the same subjectA Privacy and Security Evaluation Framework for TP| Xuebing Zhou |Gaithersburg, March 09, 20127

<strong>Biometric</strong> <strong>Template</strong> <strong>Protection</strong>ISO Architecture*! !v§ Pseudonymous Identifier Encoder (PIE): [PI, AD] = PIE(M), M is observed biometric data inenrolment§ Pseudonymous Identifier Recorder (PIR): [PI’] = PIR(M’, AD), M’ is probe biometric data§ Pseudonymous Identifier Comparator (PIC): v = PIC (PI , PI’), v is comparison result§ Stored protected template [PI, AD], where PI is pseudonymous identifier andAD is auxiliary data* ISO/IEC 24745 (2011) Information technology - Security techniques - <strong>Biometric</strong> Information protectionA Privacy and Security Evaluation Framework for TP| Xuebing Zhou |Gaithersburg, March 09, 20126

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!