### Samenvatting

In this review, biometric systems are studied from an information theoretical point of view. In the first part biometric authentication systems are studied. The objective of these systems is, observing correlated enrollment and authentication biometric sequences, to generate or convey as large as possible secret keys by interchanging a public message, while minimizing privacy leakage. Here privacy leakage is defined as the amount of information that this public message contains about the biometric enrollment sequence. In this setting also the secrecy leakage, that is, the amount of information the public message leaks about the secret key, should be negligible. Next identification biometric systems are investigated. These systems should be able to identify as many individuals as possible while being able to assign as large as possible secret keys to each individual and again minimize the privacy leakage. To realize these systems public reference data are stored in the database. Leakage is defined with respect to these reference data. For all these biometric systems fundamental limits are determined in the current work. Finally, a popular practical construction for biometric systems, fuzzy commitment, is analyzed with respect to both its theoretical performance and performance related to the code choice.

Originele taal-2 | Engels |
---|---|

Uitgeverij | Now Publishers Inc |

ISBN van geprinte versie | 9781601985224 |

DOI's | |

Status | Gepubliceerd - 2012 |

### Publicatie series

Naam | Foundations and Trends in Communications and Information Theory |
---|---|

Uitgeverij | Now Publishers Inc |

Nr. | 2-3 |

Volume | 7 |

ISSN van geprinte versie | 1567-2190 |

### Bibliografische nota

ISBN 978-1-60198-522-4## Vingerafdruk Duik in de onderzoeksthema's van 'Biometric security from an information-theoretical perspective'. Samen vormen ze een unieke vingerafdruk.

## Citeer dit

Ignatenko, T., & Willems, F. M. J. (2012).

*Biometric security from an information-theoretical perspective*. (Foundations and Trends in Communications and Information Theory; Vol. 7, Nr. 2-3). Now Publishers Inc. https://doi.org/10.1561/0100000051