
Technical Report TR 2005-58, CERIAS, Purdue University (2005)īlanton, M., Aliasgari, M.: Secure computation of biometric matching. EURASIP Journal on Advances in Signal Processing, 1–13 (2009)īlanton, M.: Empirical evaluation of secure two-party computation models. 231–240 (2010)īarzegar, N., Moin, M.: A new user dependent iris recognition system based on an area preserving pointwise level set segmentation approach.

In: ACM Workshop on Multimedia and Security (MM&Sec), pp. Springer, Heidelberg (2008)īarni, M., Bianchi, T., Catalano, D., Di Raimondo, M., Labati, R., Failla, P., Fiore, D., Lazzeretti, R., Piuri, V., Scotti, F., Piva, A.: Privacy-preserving fingercode authentication. 103–114 (2004)īarbosa, M., Brouard, T., Cauchie, S., de Sousa, S.M.: Secure biometric authentication with improved accuracy. In: ACM Workshop on Privacy in the Electronic Society (WPES), pp. This process is experimental and the keywords may be updated as the learning algorithm improves.Ītallah, M., Bykova, M., Li, J., Frikken, K., Topkara, M.: Private collaborative forecasting and benchmarking.

These keywords were added by machine and not by the authors. We show that new techniques and optimizations employed in this work allow us to achieve particularly efficient protocols suitable for large data sets and obtain notable performance gain compared to the state-of-the-art prior work. We also design and implement a secure protocol for fingerprint identification based on FingerCodes with a substantial improvement in the performance compared to existing solutions. To address the problem, in this work we develop and implement the first privacy-preserving identification protocol for iris codes. This gives rise to the need to develop secure computation techniques over biometric data where no information is revealed to the parties except the outcome of the comparison or search.

Due to privacy and liability considerations, neither party is willing to share its data. Biometric matching is often performed by two mutually distrustful parties, one of which holds one biometric image while the other owns a possibly large biometric collection. Recent advances in biometric recognition and the increasing use of biometric data prompt significant privacy challenges associated with the possible misuse, loss, or theft of biometric data.
