False-Accept/False-Reject Trade-offs in Biometric Authentication Systems

05/31/2018
by   Neri Merhav, et al.
0

Biometric authentication systems, based on secret key generation, work as follows. In the enrollment stage, an individual provides a biometric signal that is mapped into a secret key and a helper message, the former being prepared to become available to the system at a later time (for authentication), and the latter is stored in a public database. When an authorized user requests authentication, claiming his/her identity as one of the subscribers, he/she has to provide a biometric signal again, and then the system, which retrieves also the helper message of the claimed subscriber, produces an estimate of the secret key, that is finally compared to the secret key of the claimed user. In case of a match, the authentication request is approved, otherwise, it is rejected. Evidently, there is an inherent tension between two desired, but conflicting, properties of the helper message encoder: on the one hand, the encoding should be informative enough concerning the identity of the real subscriber, in order to approve him/her in the authentication stage, but on the other hand, it should not be too informative, as otherwise, unauthorized imposters could easily fool the system and gain access. A good encoder should then trade off the two kinds of errors: the false reject (FR) error and the false accept (FA) error. In this work, we investigate trade-offs between the random coding FR error exponent and the best achievable FA error exponent. We compare two types of ensembles of codes: fixed-rate codes and variable-rate codes, and we show that the latter class of codes offers considerable improvement compared to the former. In doing this, we characterize the optimal rate functions for both types of codes. We also examine the effect of privacy leakage constraints on these trade-offs, for both fixed-rate codes and variable-rate codes.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/17/2020

Trade-offs Between Error Exponents and Excess-Rate Exponents of Typical Slepian-Wolf Codes

Typical random codes (TRC) in a communication scenario of source coding ...
research
04/04/2018

Controllable Identifier Measurements for Private Authentication with Secret Keys

The problem of secret-key based authentication under a privacy constrain...
research
01/06/2020

Secret key authentication capacity region, Part II: typical authentication rate

This paper investigates the secret key authentication capacity region. S...
research
01/06/2020

Secret key authentication capacity region, Part I: average authentication rate

This paper investigates the secret key authentication capacity region. S...
research
12/16/2020

Secret Key Agreement with Physical Unclonable Functions: An Optimality Summary

We address security and privacy problems for digital devices and biometr...
research
02/13/2018

Trade-offs Between Weak-Noise Estimation Performance and Outage Exponents in Nonlinear Modulation

We focus on the problem of modulating a parameter onto a power-limited s...
research
07/30/2021

Fast direct access to variable length codes

We consider the issue of direct access to any letter of a sequence encod...

Please sign up or login with your details

Forgot password? Click here to reset