Fundamental Limits of Identification System With Secret Binding Under Noisy Enrollment

05/08/2019
by   Vamoua Yachongka, et al.
0

We investigate fundamental limits among identification, secrecy, template, and privacy-leakage rates in biometric identification system with secret binding from an information theoretic perspective. Ignatenko and Willems (2015) studied the system with estimation of individuals and clarified the fundamental limit among identification, secrecy, and privacy-leakage rates provided that the enrollment channel of the system is noiseless. In the enrollment process, however, it is highly considerable that noise occurs when bio-data is scanned. Recently, Günlü and Kramer (2018) analyzed the system assuming that the channel is noisy when there is only one individual. In this paper, we analyze the model considering the estimation of individuals under noisy enrollment and characterize the capacity region of identification, secrecy, template, and privacy-leakage rates in the biometric identification system with secret binding. The obtained result shows that it reduces to the one given by Ignatenko and Willems (2015) as a special case where the enrollment channel is noiseless.

READ FULL TEXT
research
02/05/2019

Identification, Secrecy, Template, and Privacy-Leakage of Biometric Identification System under Noisy Enrollment

In this study, we investigate fundamental trade-off among identification...
research
06/29/2022

Biometric Identification Systems With Both Chosen and Generated Secret Keys by Allowing Correlation

We propose a biometric identification system where the chosen- and gener...
research
10/21/2020

Biometric Identification Systems With Noisy Enrollment for Gaussian Source

In the present paper, we investigate the fundamental trade-off of identi...
research
02/12/2020

Fundamental Limits of Biometric Identification Systems with Strong Secrecy

The fundamental limits of biometric identification systems under a stron...
research
02/21/2022

Secret Key-based Authentication With Passive Eavesdropper for Scalar Gaussian Sources

We analyze the fundamental trade-off of secret key-based authentication ...
research
08/11/2020

Channel Leakage, Information-Theoretic Limitations of Obfuscation, and Optimal Privacy Mask Design for Streaming Data

In this paper, we first introduce the notion of channel leakage as the m...
research
07/15/2019

Single-Component Privacy Guarantees in Helper Data Systems and Sparse Coding

We investigate the privacy of two approaches to (biometric) template pro...

Please sign up or login with your details

Forgot password? Click here to reset