Privacy–Security Trade-Offs in Biometric Security Systems—Part II: Multiple Use Case

Lifeng Lai, Siu Wai Ho, H. Vincent Poor

Research output: Contribution to journalArticlepeer-review

38 Scopus citations

Abstract

This is the second part of a two-part paper on the information theoretic study of biometric security systems. In this paper, the performance of reusable biometric security systems, in which the same biometric information is reused in multiple locations, is analyzed. The scenario in which the subsystems are jointly designed is first considered. An outer bound on the achievable trade-off between the privacy leakage of the biometric measurements and rates of keys generated at the subsystems is derived. A scheme that achieves the derived outer bound is then presented. Next, an incremental design approach is studied, in which the biometric measurements are reused while keeping the existing system intact. An achievable privacysecurity trade-off region for this design approach is derived. It is shown that under certain conditions, the incremental design approach can achieve the performance of the joint design approach. Finally, examples are given to illustrate the results derived.

Original languageEnglish (US)
Article number5664788
Pages (from-to)140-151
Number of pages12
JournalIEEE Transactions on Information Forensics and Security
Volume6
Issue number1
DOIs
StatePublished - Mar 1 2011

All Science Journal Classification (ASJC) codes

  • Safety, Risk, Reliability and Quality
  • Computer Networks and Communications

Keywords

  • Biometric security
  • incremental design
  • joint design
  • privacysecurity trade-off
  • reusable biometrics

Fingerprint

Dive into the research topics of 'Privacy–Security Trade-Offs in Biometric Security Systems—Part II: Multiple Use Case'. Together they form a unique fingerprint.

Cite this