Abstract
Various biometric measurements can be used to establish the identity of individuals. Common to many of them is the fact that a significant amount of information is collected and transmitted; this information is then used to compare the captured biometric data with the previously recorded information identifying a particular individual. If the two pieces of information are similar, it is assumed that the identification is carried out correctly.
An important problem in this process is the safeguarding of the transmission of the captured information. In many cases, it cannot be assumed that the channel over which this information is transmitted is secure. Therefore it is crucial that the process be viable even if the channel is insecure. We outline an approach that ensures the security and integrity of this process. We demonstrate that this approach is highly effective in that it requires only minimal additional storage capacity and virtually no additional processing capacity to be functional.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Bibliography
C. T. Clelland, V. Risca, and C. Bancroft. Hiding Messages in DNA Microdots. Nature 399:533–534, 1999.
A. Conklin, G. Dietrich, and D. Walz: Password-Based Authentication: A System Perspective, Proc. 37th Hawaii Int’l Conf. System Sciences, 2004.
S. Garfinkel: Web Security, Privacy, and Commerce, Second Edition, O’Reilly and Associates, Sebastopol, CA, 2002.
Ingersoll-Rand Corp., IR Recognition Systems, last web site access 10 Aug. 2005, http://www.recogsys.com/company/index.htm.
E. L. Leiss: Principles of Data Security, Plenum, New York, NY, 1982.
D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar: Handbook of Fingerprint Recognition, Springer, New York, NY, 2003.
Microsoft informit.com, Access Control Systems, last web site access 10 Aug. 2005, http://www.informit.com/guides/content.asp?g=security&seqNum=149&rl=1.
Z. Riha and V. Matyas: Biometric Authentication Systems, Tech. Report FIMU-RS-2000-08, Faculty of Informatics, Masaryk Univ., Hungary, Nov. 2000.
T. D. Russ, M. W. Koch, and C. Q. Little: 3D Facial Recognition: A Quantitative Analysis, 38th Ann. IEEE Int’l Carnahan Conf. Security Technology, Albuquerque, NM, 2004.
B. Schneier: Applied Cryptography, Second Edition, John Wiley and Sons, New York, NY, 1996.
J. Woodward: Biometrics and Strong Authentication, Osborne/McGraw-Hill, Emeryville, CA, 2003.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 International Federation for Information Processing
About this paper
Cite this paper
Leiss, E.L. (2006). Safeguarding the Transmission of Biometric Measurements Used for Authenticating Individuals. In: Gaïti, D. (eds) Network Control and Engineering for Qos, Security and Mobility, V. NetCon 2006. IFIP International Federation for Information Processing, vol 213. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-34827-8_2
Download citation
DOI: https://doi.org/10.1007/978-0-387-34827-8_2
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-34825-4
Online ISBN: 978-0-387-34827-8
eBook Packages: Computer ScienceComputer Science (R0)