Efficient biometric verification in encrypted domain

21Citations
Citations of this article
12Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Biometric authentication over public networks leads to a variety of privacy issues that needs to be addressed before it can become popular. The primary concerns are that the biometrics might reveal more information than the identity itself, as well as provide the ability to track users over an extended period of time. In this paper, we propose an authentication protocol that alleviates these concerns. The protocol takes care of user privacy, template protection and trust issues in biometric authentication systems. The protocol uses asymmetric encryption, and captures the advantages of biometric authentication. The protocol provides non-repudiable identity verification, while not revealing any additional information about the user to the server or vice versa. We show that the protocol is secure under various attacks. Experimental results indicate that the overall method is efficient to be used in practical scenarios. © Springer-Verlag Berlin Heidelberg 2009.

References Powered by Scopus

An Introduction to Biometric Recognition

3763Citations
N/AReaders
Get full text

Fuzzy extractors: How to generate strong keys from biometrics and other noisy data

1527Citations
N/AReaders
Get full text

Enhancing security and privacy in biometrics-based authentication systems

1330Citations
N/AReaders
Get full text

Cited by Powered by Scopus

A survey on biometric cryptosystems and cancelable biometrics

544Citations
N/AReaders
Get full text

Learning a Fixed-Length Fingerprint Representation

98Citations
N/AReaders
Get full text

A privacy-compliant fingerprint recognition system based on homomorphic encryption and fingercode templates

92Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Upmanyu, M., Namboodiri, A. M., Srinathan, K., & Jawahar, C. V. (2009). Efficient biometric verification in encrypted domain. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5558 LNCS, pp. 899–908). https://doi.org/10.1007/978-3-642-01793-3_91

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 3

50%

Researcher 2

33%

Professor / Associate Prof. 1

17%

Readers' Discipline

Tooltip

Computer Science 5

56%

Engineering 2

22%

Design 1

11%

Materials Science 1

11%

Save time finding and organizing research with Mendeley

Sign up for free