Ontology type: schema:Chapter
2009
AUTHORSXuebing Zhou , Stephen D. Wolthusen , Christoph Busch , Arjan Kuijper
ABSTRACTBiometric features provide considerable usability benefits. At the same time, the inability to revoke templates and likelihood of adversaries being able to capture features raise security concerns. Recently, several template protection mechanisms have been proposed, which provide a one-way mapping of templates onto multiple pseudo-identities. While these proposed schemes make assumptions common for cryptographic algorithms, the entropy of the template data to be protected is considerably lower per bit of key material used than assumed owing to correlations arising from the biometric features. We review several template protection schemes and existing attacks followed by a correlation analysis for a selected biometric feature set and demonstrate that these correlations leave the stream cipher mechanism employed vulnerable to, among others, known plaintext-type attacks. More... »
PAGES429-438
Image Analysis and Recognition
ISBN
978-3-642-02610-2
978-3-642-02611-9
http://scigraph.springernature.com/pub.10.1007/978-3-642-02611-9_43
DOIhttp://dx.doi.org/10.1007/978-3-642-02611-9_43
DIMENSIONShttps://app.dimensions.ai/details/publication/pub.1028391692
JSON-LD is the canonical representation for SciGraph data.
TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT
[
{
"@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json",
"about": [
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0801",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Artificial Intelligence and Image Processing",
"type": "DefinedTerm"
},
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Information and Computing Sciences",
"type": "DefinedTerm"
}
],
"author": [
{
"affiliation": {
"name": [
"Fraunhofer Institute for Computer Graphic Research IGD, Fraunhoferstr. 5, 64283, Darmstadt, Germany"
],
"type": "Organization"
},
"familyName": "Zhou",
"givenName": "Xuebing",
"id": "sg:person.010665102115.35",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010665102115.35"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "Royal Holloway University of London",
"id": "https://www.grid.ac/institutes/grid.4970.a",
"name": [
"Norwegian Information Security Laboratory, Gj\u00f8vik University College, P.O. Box 191, N-2802, Gj\u00f8vik, Norway",
"Information Security Group, Department of Mathematics, Royal Holloway, University of London, Egham Hill, TW20 0EX, Egham, UK"
],
"type": "Organization"
},
"familyName": "Wolthusen",
"givenName": "Stephen D.",
"id": "sg:person.014146415751.52",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014146415751.52"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "Norwegian University of Science and Technology",
"id": "https://www.grid.ac/institutes/grid.5947.f",
"name": [
"Norwegian Information Security Laboratory, Gj\u00f8vik University College, P.O. Box 191, N-2802, Gj\u00f8vik, Norway"
],
"type": "Organization"
},
"familyName": "Busch",
"givenName": "Christoph",
"id": "sg:person.011143356603.69",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011143356603.69"
],
"type": "Person"
},
{
"affiliation": {
"name": [
"Fraunhofer Institute for Computer Graphic Research IGD, Fraunhoferstr. 5, 64283, Darmstadt, Germany"
],
"type": "Organization"
},
"familyName": "Kuijper",
"givenName": "Arjan",
"id": "sg:person.015632044271.26",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015632044271.26"
],
"type": "Person"
}
],
"citation": [
{
"id": "https://doi.org/10.1016/j.patcog.2004.04.011",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1003858561"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/s11623-009-0089-0",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1007266807",
"https://doi.org/10.1007/s11623-009-0089-0"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/s102070100006",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1008722744",
"https://doi.org/10.1007/s102070100006"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1016/s0031-3203(02)00030-4",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1020841916"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1145/319709.319714",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1024621046"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/11527923_114",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1028863910",
"https://doi.org/10.1007/11527923_114"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/11527923_114",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1028863910",
"https://doi.org/10.1007/11527923_114"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-3-540-25976-3_15",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1035408784",
"https://doi.org/10.1007/978-3-540-25976-3_15"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-3-540-25976-3_15",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1035408784",
"https://doi.org/10.1007/978-3-540-25976-3_15"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-3-540-24676-3_31",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1040263189",
"https://doi.org/10.1007/978-3-540-24676-3_31"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-3-540-24676-3_31",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1040263189",
"https://doi.org/10.1007/978-3-540-24676-3_31"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/0-387-23483-7_108",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1052523866",
"https://doi.org/10.1007/0-387-23483-7_108"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/tpami.2007.1004",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1061743143"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/iih-msp.2009.237",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1093812138"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/bcc.2007.4430534",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1093860991"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/itw.1998.706492",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1095200302"
],
"type": "CreativeWork"
}
],
"datePublished": "2009",
"datePublishedReg": "2009-01-01",
"description": "Biometric features provide considerable usability benefits. At the same time, the inability to revoke templates and likelihood of adversaries being able to capture features raise security concerns. Recently, several template protection mechanisms have been proposed, which provide a one-way mapping of templates onto multiple pseudo-identities. While these proposed schemes make assumptions common for cryptographic algorithms, the entropy of the template data to be protected is considerably lower per bit of key material used than assumed owing to correlations arising from the biometric features. We review several template protection schemes and existing attacks followed by a correlation analysis for a selected biometric feature set and demonstrate that these correlations leave the stream cipher mechanism employed vulnerable to, among others, known plaintext-type attacks.",
"editor": [
{
"familyName": "Kamel",
"givenName": "Mohamed",
"type": "Person"
},
{
"familyName": "Campilho",
"givenName": "Aur\u00e9lio",
"type": "Person"
}
],
"genre": "chapter",
"id": "sg:pub.10.1007/978-3-642-02611-9_43",
"inLanguage": [
"en"
],
"isAccessibleForFree": false,
"isPartOf": {
"isbn": [
"978-3-642-02610-2",
"978-3-642-02611-9"
],
"name": "Image Analysis and Recognition",
"type": "Book"
},
"name": "A Security Analysis of Biometric Template Protection Schemes",
"pagination": "429-438",
"productId": [
{
"name": "dimensions_id",
"type": "PropertyValue",
"value": [
"pub.1028391692"
]
},
{
"name": "doi",
"type": "PropertyValue",
"value": [
"10.1007/978-3-642-02611-9_43"
]
},
{
"name": "readcube_id",
"type": "PropertyValue",
"value": [
"8740a73699f656bd244454631864c63ddb8017af70ee977e10f9bd469ac0b636"
]
}
],
"publisher": {
"location": "Berlin, Heidelberg",
"name": "Springer Berlin Heidelberg",
"type": "Organisation"
},
"sameAs": [
"https://doi.org/10.1007/978-3-642-02611-9_43",
"https://app.dimensions.ai/details/publication/pub.1028391692"
],
"sdDataset": "chapters",
"sdDatePublished": "2019-04-16T07:13",
"sdLicense": "https://scigraph.springernature.com/explorer/license/",
"sdPublisher": {
"name": "Springer Nature - SN SciGraph project",
"type": "Organization"
},
"sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000353_0000000353/records_45357_00000000.jsonl",
"type": "Chapter",
"url": "https://link.springer.com/10.1007%2F978-3-642-02611-9_43"
}
]
Download the RDF metadata as: json-ld nt turtle xml License info
JSON-LD is a popular format for linked data which is fully compatible with JSON.
curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-02611-9_43'
N-Triples is a line-based linked data format ideal for batch operations.
curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-02611-9_43'
Turtle is a human-readable linked data format.
curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-02611-9_43'
RDF/XML is a standard XML format for linked data.
curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-02611-9_43'
This table displays all metadata directly associated to this object as RDF triples.
144 TRIPLES
23 PREDICATES
40 URIs
20 LITERALS
8 BLANK NODES