1
play

1 Biometric Encryption Aims www.ipc.on.ca Aims Protect the - PDF document

Content Motivation Biometric Encryption in 3D Face Biometric encryption in 3D Face Outlook Michiel van der Veen 3D Face end-user meeting March 22, Darmstadt, Germany 2 3D Face end-user meeting (March 22, 2007,


  1. Content • Motivation Biometric Encryption in “3D Face” • Biometric encryption in “3D Face” • Outlook Michiel van der Veen “3D Face” end-user meeting March 22, Darmstadt, Germany 2 3D Face end-user meeting (March 22, 2007, Darmstadt) Biometric systems are being rolled-out in many Verifying identity becomes an integral part of many applications processes In 2002, in US there were 3.3 Million cases of Identity Theft • Large-scale criminal and civil AFIS • Registered traveler programs • Current models for information sharing are largely based on thrust • Border crossing (3D Face) – Trading of information could be lucrative • Attendance recording – Internet and networked systems • Access control – More people have access to personal data – remote access • Payment systems • Ticketing • Threats • ..... – Identity theft Identity Management & – Harassment Privacy Enhancing Tools – Errors in databases – ... What about your (biometric) Identity? What about your (biometric) Identity? 3 4 3D Face end-user meeting (March 22, 2007, Darmstadt) 3D Face end-user meeting (March 22, 2007, Darmstadt) 1

  2. Biometric Encryption Aims www.ipc.on.ca • Aims – Protect the biometric data and associated privacy – Introduce the revocability – the citizens right to revoke – Multi-identity for different applications – Greater public confidence and compliance with privacy laws – Suitable for large-scale ‘anonymous’ databases • Modalities – Fingerprint – Face / 3D Face – Iris 5 6 3D Face end-user meeting (March 22, 2007, Darmstadt) 3D Face end-user meeting (March 22, 2007, Darmstadt) Biometric identity information is spread around the Biometric encryption enables secure storage and allows applications leading to privacy threats for diversification Feature Biometric Extraction Encryption Feature Extraction diversity • JPEG • Proprietary Templates • Standardized Templates • Small and secure binary hash templates • Small and secure binary hash templates • Renewable and revocable templates • Renewable and revocable templates 7 8 3D Face end-user meeting (March 22, 2007, Darmstadt) 3D Face end-user meeting (March 22, 2007, Darmstadt) 2

  3. Existing work on Biometric Encryption Content • In the academic world, biometric attention starts to receive full attention • Motivation (fuzzy cryptography, fuzzy vault, fuzzy commitment) – Sometimes very complicated • Biometric encryption in “3D Face” – Not all methods are practical (yet) • Industry is working towards practical systems • Outlook – IBM - canceable biometrics – Philips - priv ID technology – .... 9 10 3D Face end-user meeting (March 22, 2007, Darmstadt) 3D Face end-user meeting (March 22, 2007, Darmstadt) Template Protection in “3D Face” Basic System – Architecture Overview Binarization plays an important role and determines the recognition performance Classification Security Noise Reduction Error Hash/ Diversify & Correction Encrypt Quantization Reduced Template Size Exact Matching Multiple Templates Privacy Protection & Key Extraction 11 12 3D Face end-user meeting (March 22, 2007, Darmstadt) 3D Face end-user meeting (March 22, 2007, Darmstadt) 3

  4. 3D Face Recognition Systems Verification Results – Real Feature Vectors For evaluation we use 2 different 3D face recognition algorithms (Philips, Fraunhofer) FRGC dataset EER = 2.60% EER = 2.37% Philips 13 14 3D Face end-user meeting (March 22, 2007, Darmstadt) 3D Face end-user meeting (March 22, 2007, Darmstadt) “Biometric encryption” on both 3D face algorithms gives Content similar classification results • Motivation • Biometric encryption in “3D Face” • Outlook Feature Type IGD IGD Philips Philips Real Vectors 2.60 2.37 Binary 1.75 1.43 15 16 3D Face end-user meeting (March 22, 2007, Darmstadt) 3D Face end-user meeting (March 22, 2007, Darmstadt) 4

  5. Take away • Biometric encryption works! – In 3D Face, we show that classification performance of protected biometrics is comparable • Biometric encryption is required to tackle privacy issues in biometric systems. Wide scale role out requires: – Technological developments (classification, fusion, security) for various modalities (face, fingerprint, iris, etc) – Integration in Identity Management systems – Standardization (e.g. ISO 24745) 17 3D Face end-user meeting (March 22, 2007, Darmstadt) 5

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend