TY - GEN
T1 - Ensemble Performance of Biometric Authentication Systems Based on Secret Key Generation
AU - Merhav, Neri
N1 - Publisher Copyright: © 2018 IEEE.
PY - 2018/8/15
Y1 - 2018/8/15
N2 - We study the ensemble performance of biometric authentication systems, based on secret key generation, which work as follows. In the enrollment stage, an individual provides a biometric signal that is mapped into a secret key and a helper message, the former being prepared to become available to the system at a later time (for authentication), and the latter is stored in a public database. When an authorized user requests authentication, claiming his/her identity as one of the subscribers, s/he has to provide a biometric signal again, and then the system, which retrieves also the helper message of the claimed subscriber, produces an estimate of the secret key, that is finally compared to the secret key of the claimed user. In case of a match, the authentication request is approved, otherwise, it is rejected. Referring to an ensemble of systems based on Slepian-Wolf binning, we provide a detailed analysis of the false-reject and false-accept probabilities, for a wide class of stochastic decoders. We also comment on the security for the typical code in the ensemble. All derivations appear in the fill paper: https://arxiv.org/pdf/1707.09108.pdf.
AB - We study the ensemble performance of biometric authentication systems, based on secret key generation, which work as follows. In the enrollment stage, an individual provides a biometric signal that is mapped into a secret key and a helper message, the former being prepared to become available to the system at a later time (for authentication), and the latter is stored in a public database. When an authorized user requests authentication, claiming his/her identity as one of the subscribers, s/he has to provide a biometric signal again, and then the system, which retrieves also the helper message of the claimed subscriber, produces an estimate of the secret key, that is finally compared to the secret key of the claimed user. In case of a match, the authentication request is approved, otherwise, it is rejected. Referring to an ensemble of systems based on Slepian-Wolf binning, we provide a detailed analysis of the false-reject and false-accept probabilities, for a wide class of stochastic decoders. We also comment on the security for the typical code in the ensemble. All derivations appear in the fill paper: https://arxiv.org/pdf/1707.09108.pdf.
UR - http://www.scopus.com/inward/record.url?scp=85052441097&partnerID=8YFLogxK
U2 - 10.1109/ISIT.2018.8437768
DO - 10.1109/ISIT.2018.8437768
M3 - منشور من مؤتمر
SN - 9781538647806
T3 - IEEE International Symposium on Information Theory - Proceedings
SP - 1455
EP - 1459
BT - 2018 IEEE International Symposium on Information Theory, ISIT 2018
T2 - 2018 IEEE International Symposium on Information Theory, ISIT 2018
Y2 - 17 June 2018 through 22 June 2018
ER -