Inverse biometrics and privacy

Inverse biometrics and privacy

For access to this article, please select a purchase option:

Buy chapter PDF
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
User-Centric Privacy and Security in Biometrics — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

In addition to an overall improvement of their performance, the widespread deployment of biometric recognition systems has also led to the disclosure of privacy and security concerns related to the use of these sensitive data. In particular, the early common belief that biometric templates are irreversible has been proven wrong. Over the last decade numerous works have studied the challenging problem of how to reconstruct synthetic samples from the stored templates, which match the original biometric samples. Such a process, known as inverse biometrics, poses a severe threat to the privacy offered by biometric systems: not only personal data can be derived from compromised and unprotected templates, but those synthetic samples can be as well used to launch other attacks (e.g., presentation attacks). Due to these serious implications, three different aspects of inverse biometrics have been analysed in the recent past: i. how to generate synthetic samples, ii. how to reconstruct a particular sample from its template, and iii. how to evaluate and counterfeit the aforementioned reconstruction techniques. This chapter summarises the works dealing with these three aspects in the biometric field.

Chapter Contents:

  • 6.1 Introduction
  • 6.2 Synthetic biometric samples generation
  • 6.3 Inverse biometrics methods
  • 6.3.1 Template format
  • 6.3.2 Similarity scores
  • 6.3.3 Similarity score and distance function
  • 6.3.4 Feature extraction
  • 6.3.5 Summary
  • 6.4 Evaluation of inverse biometrics methods
  • 6.5 Privacy-related issues and countermeasures
  • 6.6 Conclusions
  • References

Inspec keywords: data privacy; biometrics (access control)

Other keywords: security concerns; sensitive data; inverse biometrics; privacy; presentation attacks; biometric templates; biometric recognition systems

Subjects: Data security

Preview this chapter:
Zoom in

Inverse biometrics and privacy, Page 1 of 2

| /docserver/preview/fulltext/books/sc/pbse004e/PBSE004E_ch6-1.gif /docserver/preview/fulltext/books/sc/pbse004e/PBSE004E_ch6-2.gif

Related content

This is a required field
Please enter a valid email address