On the security of XOR-method in biometric authentication systems

T. Ignatenko, F.M.J. Willems

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

130 Downloads (Pure)


A biometric authentication system can be partitioned into a layer that extracts common randomness out of a pair of related biometric sequences [Maurer, 1993] and a layer that masks a key sequence with this common randomness. We will analyze the performance of such a layered system first, and will show that an alternative method, the XOR- echnique, is not always secure.
Original languageEnglish
Title of host publicationProc. of the Twenty-seventh symposium on Information Theory in the Benelux, June 8-9, 2006, Noordwijk, The Netherlands
EditorsR.L. Lagendijk, Jos. Weber, H., A. Berg, van den, F.
Place of PublicationEefde
PublisherWerkgemeenschap voor Informatie- en Communicatietheorie (WIC)
ISBN (Print)90-71048-22-5
Publication statusPublished - 2006


Dive into the research topics of 'On the security of XOR-method in biometric authentication systems'. Together they form a unique fingerprint.

Cite this