Privacy-security tradeoffs in reusable biometric security systems

Lifeng Lai, Siu Wai Ho, H. Vincent Poor

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Scopus citations

Abstract

The performance of reusable biometric security systems in which the same biometric information is reused in several different locations is analyzed in this paper. The scenario in which the subsystems used at different locations are jointly designed is first considered. A fundamental limit of the privacy-security tradeoff is derived. Next, an incremental design approach is studied, in which the biometric measurements are reused while keeping the existing system intact. An achievable privacy-security tradeoff region for this design approach is derived. It is shown that under certain conditions, the incremental design approach can achieve the performance of the joint design approach. Finally, examples are given to illustrate the results.

Original languageEnglish (US)
Title of host publication2010 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2010 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1722-1725
Number of pages4
ISBN (Print)9781424442966
DOIs
StatePublished - 2010
Event2010 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2010 - Dallas, TX, United States
Duration: Mar 14 2010Mar 19 2010

Publication series

NameICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings
ISSN (Print)1520-6149

Other

Other2010 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2010
Country/TerritoryUnited States
CityDallas, TX
Period3/14/103/19/10

All Science Journal Classification (ASJC) codes

  • Software
  • Signal Processing
  • Electrical and Electronic Engineering

Keywords

  • Biometric
  • Privacy
  • Reusable
  • Security

Fingerprint

Dive into the research topics of 'Privacy-security tradeoffs in reusable biometric security systems'. Together they form a unique fingerprint.

Cite this