TR2007-006

Secure Storage of Fingerprint Biometrics Using Slepian-Wolf Codes


    •  Draper, S.C., Khisti, A., Martinian, E., Vetro, A., Yedidia, J.S., "Secure Storage of Fingerprint Biometrics Using Slepian-Wolf Codes", IEEE Information Theory and Applications Workshop (ITA), January 2007.
      BibTeX TR2007-006 PDF
      • @inproceedings{Draper2007jan,
      • author = {Draper, S.C. and Khisti, A. and Martinian, E. and Vetro, A. and Yedidia, J.S.},
      • title = {Secure Storage of Fingerprint Biometrics Using Slepian-Wolf Codes},
      • booktitle = {IEEE Information Theory and Applications Workshop (ITA)},
      • year = 2007,
      • month = jan,
      • url = {https://www.merl.com/publications/TR2007-006}
      • }
  • MERL Contact:
  • Research Area:

    Information Security

Abstract:

We describe a method to encode fingerprint biometrics securely for use, e.g., in encryption or access control. The system is secure because the stored data suffices to validate a probe fingerprint but not to recreate the original fingerprint biometric. Therefore, a breach in database security does not lead to the loss of biometric data. We present a model for a secure biometric system for which we can make strong encryption-like security guarantees. We derive a fundamental trade off between system security and the robustness of authentication. The trade off is quantified for simple statistical models. We outline an implementation and report the effectiveness of our method as tested on a data base consisting of 579 datasets, each containing roughly 15 measurements of a single finger.

 

  • Related News & Events

    •  NEWS    ITA 2007: publication by Anthony Vetro and others
      Date: January 29, 2007
      Where: IEEE Information Theory and Applications Workshop (ITA)
      MERL Contact: Anthony Vetro
      Research Area: Information Security
      Brief
      • The paper "Secure Storage of Fingerprint Biometrics Using Slepian-Wolf Codes" by Draper, S.C., Khisti, A., Martinian, E., Vetro, A. and Yedidia, J.S. was presented at the IEEE Information Theory and Applications Workshop (ITA).
    •