Identification, Secrecy, Template, and Privacy-Leakage of Biometric Identification System under Noisy Enrollment

02/05/2019
by   Vamoua Yachongka, et al.
0

In this study, we investigate fundamental trade-off among identification, secrecy, template, and privacy-leakage rates in biometric identification system. Ignatenko and Willems (2010) studied this system assuming that the channel in the enrollment process of the system is noiseless. In the enrollment process, however, it is highly considerable that noise occurs when bio-data is scanned. In this paper, we impose a noisy channel in the enrollment process and characterize the capacity region of the rate tuples. The obtained result shows that this result reduces to the one given by Ignatenko and Willems (2010) and Günlü and Kramer (2018) as special cases where the enrollment channel is noiseless and there is only one user, respectively.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/08/2019

Fundamental Limits of Identification System With Secret Binding Under Noisy Enrollment

We investigate fundamental limits among identification, secrecy, templat...
research
02/12/2020

Fundamental Limits of Biometric Identification Systems with Strong Secrecy

The fundamental limits of biometric identification systems under a stron...
research
10/21/2020

Biometric Identification Systems With Noisy Enrollment for Gaussian Source

In the present paper, we investigate the fundamental trade-off of identi...
research
07/15/2019

Single-Component Privacy Guarantees in Helper Data Systems and Sparse Coding

We investigate the privacy of two approaches to (biometric) template pro...
research
07/01/2019

Private Authentication with Physical Identifiers Through Broadcast Channel Measurements

A basic model for key agreement with biometric or physical identifiers i...
research
01/11/2022

Function Computation Under Privacy, Secrecy, Distortion, and Communication Constraints

The problem of reliable function computation is extended by imposing pri...
research
07/27/2019

ActShare: Sensitive Data Sharing with Reliable Leaker Identification

Data sharing among multiple parties becomes increasingly common today, s...

Please sign up or login with your details

Forgot password? Click here to reset