Biometric Template Protection - NIST Visual Image Processing Group
Biometric Template Protection - NIST Visual Image Processing Group Biometric Template Protection - NIST Visual Image Processing Group
Assessment of Different Protected Systems§ Unlinkability in the advanced model:§ Cross matching is a serious problem§ It should be avoided to use any personal identifiable information in the systems§ Additionally, the privacy leakage is unavoidable in these system due to error tolerance,but it should be minimizedSystem Cross matching Leakage Amplification3D Face Fuzzy CommitmentEER=5%no feasible attack yetIris Fuzzy CommitmentEER =16.34%Fingerprint Fuzzy Vault*no assessment in the paperno assessment in the paper* “Fingerprint-Based Fuzzy Vault: Implementation and Performance”, Nandakumar, Jain and Pankanti, IEEE Trans. on Info. Forensics and Security, 2007A Privacy and Security Evaluation Framework for TP| Xuebing Zhou |Gaithersburg, March 09, 201215
Conclusions§ The framework is useful to detect vulnerabilities of the existingalgorithms§ The framework enables rigorous assessment, which is important andnecessary for the development of template protection§ All the protection goals need to be taken into account§ Threat models are the important prerequisites. Security and privacyprotection ability of a system can be overestimated, if unrealisticassumption is made§ Unique and measurable metrics such as the metrics used in thesecurity and privacy definitions, are necessary for ranking of differentalgorithmsA Privacy and Security Evaluation Framework for TP| Xuebing Zhou |Gaithersburg, March 09, 201216
- Page 1 and 2: A Generalized Framework forPrivacy
- Page 3 and 4: Biometric Systems§ Privacy and sec
- Page 5 and 6: Biometric Template ProtectionA Priv
- Page 7 and 8: Biometric Template ProtectionPT1PT2
- Page 9 and 10: Biometric Template ProtectionPT1PT2
- Page 11 and 12: Biometric Template ProtectionPT1PT2
- Page 13 and 14: State of the Art of Template Protec
- Page 15 and 16: How to Assess Template Protection§
- Page 17 and 18: How to Assess Template ProtectionEv
- Page 19 and 20: How to Assess Template Protection§
- Page 21 and 22: Assessment of Different Protected S
- Page 23: Assessment of Different Protected S
- Page 27 and 28: References§ Zhou, Xuebing: “Priv
Conclusions§ The framework is useful to detect vulnerabilities of the existingalgorithms§ The framework enables rigorous assessment, which is important andnecessary for the development of template protection§ All the protection goals need to be taken into account§ Threat models are the important prerequisites. Security and privacyprotection ability of a system can be overestimated, if unrealisticassumption is made§ Unique and measurable metrics such as the metrics used in thesecurity and privacy definitions, are necessary for ranking of differentalgorithmsA Privacy and Security Evaluation Framework for TP| Xuebing Zhou |Gaithersburg, March 09, 201216