Zusammenfassung
Die Genauigkeit und Erkennungsleistung biometrischer Systeme ermöglicht heutzutage ein vielfältiges Anwendungsspektrum (von forensischen Identifications-Systemen hin zu biometrischer Verifikation an Smartphones für Onlinebanking). Ein Einsatz in nicht-hoheitlichem Bereich erfordert jedoch die Entwicklung sicherer und datenschutzfreundlicher biometrischer Verfahren. Dabei spielt auch die Interoperabilität zwischen Systemen eine wichtige Rolle. ISO/IEC Standards unterstützen die Entwicklung sicherer und datenschutzfreundlicher biometrischer Verfahren, bekannt als Biometric Template Protection (BTP) Systeme, als auch eine geeignete Leistungsbewertung dieser Systeme.
Literatur
A. Jain, “Biometric recognition”, in Nature, vol. 449, no. 7158, pp. 38–40, September 2007.
A. Hadid, N. Evans, S. Marcel and J. Fierrez, “Biometrics systems under spoofing attack: an evaluation methodology and lessons learned”, IEEE Signal Processing Magazine, Special Issue on Biometric Security and Privacy, Vol. 32, n. 5, pp. 20–30, September 2015.
J. Galbally, R. Cappelli, A. Lumini, G. Gonzalez de Rivera, D. Malton, J. Fierrez, J. Ortega-Garcia, D. Maio, “An evaluation of direct and indirect attacks using fake fingers generated from ISO templates”, in Pattern Recognition Letters, vol. 31, no. 8, pp. 725–232, June 2010.
R. Cappelli, D. Maio, A. Lumini, D. Maltoni, “Fingerprint image reconstruction from standard templates”, in IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 29, no. 9, pp. 1489–1503, August 2007.
J. Galbally, A. Ross, M. Gomez-Barrero, J. Fierrez and J. Ortega-Garcia, “Iris image reconstruction from binary templates: An efficient probabilistic approach based on genetic algorithms”, in Computer Vision and Image Understanding, Vol. 117, n. 10, pp. 1512-1525, October 2013
M. Gomez-Barrero, J. Galbally, A. Morales, M. A. Ferrer, J. Fierrez and J. Ortega-Garcia, “A novel hand reconstruction approach and its application to vulnerability assessment”, in Information Sciences, vol. 268, no. 0, pp. 103–121, June 2014.
E. Kelkboom, J. Breebaart, T. Kevenaar, I. Buhan, I., R. Veldhuis, “Preventing the decodability attack based cross-matching in a fuzzy commitment scheme”, in IEEE Trans. on Information Forensics and Security, vol. 6, no. 1, pp. 107–121, November 2010.
M. Gomez-Barrero, C. Rathgeb, J. Galbally, C. Busch and J. Fierrez, “Unlinkable and irreversible biometric template protection based on Bloom filters”, in Information Sciences, Vol. 370-371, pp. 18–32, November 2016.
P. Tulys, B. Skoric, T. Kevenaar, “Security with noisy data: on private biometrics, secure key storage and anti-counterfeiting”, Springer, 2007.
P. Campisi, “Security and privacy in biometrics”, Springer, 2013.
ISO/IEC JTC1 SC27 Security Techniques, ISO/IEC 24745:2011. Information Technology–Security Techniques–Biometric Information Protection, 2011.
C. Rathgeb, A. Uhl, “A survey on biometric cryptosystems and cancelable biometrics”, in EURASIP Journal on Information Security, vol. 3, no. 1, pp. 1–25, 2011.
V. Patel, N. Ratha, R. Chellappa, “Cancelable biometrics: A review”, in IEEE Signal Processing Magazine, vol. 32, no. 5, pp. 54–65, 2015.
M. Barni, G. Droandi, R. Lazzeretti, “Privacy protection in biometric-based recognition systems: A marriage between cryptography and signal processing”, in IEEE Signal Processing Magazine, vol. 32, no. 5, pp. 66–76, 2015.
ISO/IEC JTC1 SC37 Biometrics, ISO/IEC 19795-1:2006. Information Technology–Biometric Performance Testing and Reporting–Part 1: Principles and Framework, 2006.
ISO/IEC JTC1 SC37 Biometrics, ISO/IEC DIS 30136. Information Technology–Performance Testing of Template Protection Schemes, 2017.
K. Simoens, P. Tuyls, and B. Preneel, “Privacy weaknesses in biometric sketches,” in Proc. IEEE Symp. on Security and Privacy (SP), pp. 188–203, 2009.
I. Buhan, J. Breebaart, J. Guajardo, K. De Groot, E. Kelkboom, and T. Akkermans, “A quantitative analysis of indistinguishability for a continuous domain biometric cryptosystem”, in Proc. Int. Workshop on Data Privacy Management (DPM), pp. 78–92, 2009.
I. Buhan, J. Merchan, and E. Kelkboom, “Efficient strategies for playing the indistinguishability game for fuzzy sketches”, in Proc. IEEE Workshop on Information Forensics and Security (WIFS), 2010.
E. J. Kelkboom, J. Breebaart, T. A. Kevenaar, I. Buhan, and R. N. Veldhuis, “Preventing the decodability attack based cross-matching in a fuzzy commitment scheme”, in IEEE Trans. on Information Forensics and Security, vol. 6, no. 1, pp. 107–121, 2011.
A. Nagar, K. Nandakumar, and A. K. Jain, “Biometric template transformation: a security analysis,” in Proc. SPIE 7541, Media Forensics and Security II. Int. Society for Optics and Photonics, p. 75410O, 2010.
M. Ferrara, D. Maltoni, and R. Cappelli, “A two-factor protection scheme for MCC fingerprint templates”, in Proc. BIOSIG, 2014.
M. Gomez-Barrero, J. Galbally, A. Morales and J. Fierrez, “Privacy-Preserving Comparison of Variable-Length Data with Application to Biometric Template Protection”, in IEEE Access, 2017.
Author information
Authors and Affiliations
Corresponding author
Additional information
Marta Gomez-Barrero arbeitet als Postdoc in der da/sec Biometrics and Internet Security Forschungsgruppe am Center for Research in Security and Privacy, Darmstadt
Christian Rathgeb arbeitet als Postdoc in der da/sec Biometrics and Internet Security Forschungsgruppe am Center for Research in Security and Privacy, Darmstadt
Christoph Busch arbeitet als Principal Investigator in der da/sec Biometrics and Internet Security Forschungsgruppe am Center for Research in Security and Privacy, Darmstadt
Rights and permissions
About this article
Cite this article
Gomez-Barrero, M., Rathgeb, C. & Busch, C. Standardisierung von Biometric Template Protection. Datenschutz Datensich 41, 422–426 (2017). https://doi.org/10.1007/s11623-017-0805-0
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11623-017-0805-0