skip to main content
10.1145/1854229.1854242acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article

Negative databases for biometric data

Published: 09 September 2010 Publication History

Abstract

Negative databases -- negative representations of a set of data -- have been introduced in 2004 to protect the data they contain. Up to this day, there was no known solution to constitute biometric negative databases. This is surprising as biometric applications are very needy of such protection for privacy reasons. The main difficulty comes from the fact that biometric captures of the same trait give different results and comparisons of the stored reference with the fresh captured biometric data has to take into account this variability. In this paper, we give a first answer to this problem by exhibiting a way to create and exploit biometric negative databases.

References

[1]
J. Bringer and H. Chabanne. An authentication protocol with encrypted biometric data. In S. Vaudenay, editor, AFRICACRYPT, volume 5023 of Lecture Notes in Computer Science, pages 109--124. Springer, 2008.
[2]
J. Bringer, H. Chabanne, G. D. Cohen, B. Kindarji, and G. Zémor. Theoretical and practical boundaries of binary secure sketches. IEEE Transactions on Information Forensics and Security, 3(4):673--683, 2008.
[3]
J. Bringer, H. Chabanne, and B. Kindarji. The best of both worlds: Applying secure sketches to cancelable biometrics. Sci. Comput. Program., 74(1--2):43--51, 2008.
[4]
J. Bringer, H. Chabanne, and B. Kindarji. Identification with encrypted biometric data. Security Comm. Networks, 2010. To appear.
[5]
J. Bringer, H. Chabanne, D. Pointcheval, and Q. Tang. Extended private information retrieval and its application in biometrics authentications. In F. Bao, S. Ling, T. Okamoto, H. Wang, and C. Xing, editors, CANS, volume 4856 of Lecture Notes in Computer Science, pages 175--193. Springer, 2007.
[6]
C. Chen and R. N. J. Veldhuis. Binary biometric representation through pairwise polar quantization. In M. Tistarelli and M. S. Nixon, editors, ICB, volume 5558 of Lecture Notes in Computer Science, pages 72--81. Springer, 2009.
[7]
G. Danezis, C. Díaz, S. Faust, E. Käsper, C. Troncoso, and B. Preneel. Efficient negative databases from cryptographic hash functions. In J. A. Garay, A. K. Lenstra, M. Mambo, and R. Peralta, editors, ISC, volume 4779 of Lecture Notes in Computer Science, pages 423--436. Springer, 2007.
[8]
J. Daugman. High confidence visual recognition of persons by a test of statistical independence. IEEE Trans. Pattern Anal. Mach. Intell., 15(11):1148--1161, 1993.
[9]
M. de Mare and R. N. Wright. Secure set membership using 3sat. In P. Ning, S. Qing, and N. Li, editors, ICICS, volume 4307 of Lecture Notes in Computer Science, pages 452--468. Springer, 2006.
[10]
Y. Dodis, L. Reyzin, and A. Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In C. Cachin and J. Camenisch, editors, EUROCRYPT, volume 3027 of Lecture Notes in Computer Science, pages 523--540. Springer, 2004.
[11]
F. Esponda. Everything that's not important. IEEE Computational Intelligence, 3(2):60--63, 2008.
[12]
F. Esponda, E. S. Ackley, S. Forrest, and P. Helman. Online negative databases. In G. Nicosia, V. Cutello, P. J. Bentley, and J. Timmis, editors, ICARIS, volume 3239 of Lecture Notes in Computer Science, pages 175--188. Springer, 2004.
[13]
F. Esponda, E. S. Ackley, P. Helman, H. Jia, and S. Forrest. Protecting data privacy through hard-to-reverse negative databases. Int. J. Inf. Sec., 6(6):403--415, 2007.
[14]
F. Esponda, S. Forrest, and P. Helman. Enhancing privacy through negative representations of data. UNM Computer Science Technical Report TR-CS-2004--18, 2004.
[15]
F. Esponda, E. Trias, E. Ackley, and S. Forrest. A relational algebra for negative databases. UNM Computer Science Technical Report TR-CS-2007--18, 2007.
[16]
F. Hao, J. Daugman, and P. Zielinski. A fast search algorithm for a large fuzzy database. Information Forensics and Security, IEEE Transactions on, 3(2):203--212, June 2008.
[17]
P. Indyk and R. Motwani. Approximate nearest neighbors: Towards removing the curse of dimensionality. In STOC, pages 604--613, 1998.
[18]
A. K. Jain, S. Prabhakar, L. Hong, and S. Pankanti. Fingercode: A filterbank for fingerprint representation and matching. In CVPR, pages 2187--. IEEE Computer Society, 1999.
[19]
A. Juels and M. Wattenberg. A fuzzy commitment scheme. In ACM Conference on Computer and Communications Security, pages 28--36, 1999.
[20]
K. Simoens, P. Tuyls, and B. Preneel. Privacy weaknesses in biometric sketches. In IEEE Symposium on Security and Privacy, pages 188--203. IEEE Computer Society, 2009.
[21]
Q. Tang, J. Bringer, H. Chabanne, and D. Pointcheval. A formal study of the privacy concerns in biometric-based remote authentication schemes. In L. Chen, Y. Mu, and W. Susilo, editors, ISPEC, volume 4991 of Lecture Notes in Computer Science, pages 56--70. Springer, 2008.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
MM&Sec '10: Proceedings of the 12th ACM workshop on Multimedia and security
September 2010
264 pages
ISBN:9781450302869
DOI:10.1145/1854229
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 09 September 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. biometric data
  2. negative database
  3. privacy

Qualifiers

  • Research-article

Conference

MM&Sec '10
Sponsor:
MM&Sec '10: Multimedia and Security Workshop
September 9 - 10, 2010
Roma, Italy

Acceptance Rates

Overall Acceptance Rate 128 of 318 submissions, 40%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 06 Nov 2024

Other Metrics

Citations

Cited By

View all

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media