Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

Venenbilderkennung

Privatsphärenschutz unerlässlich

  • Schwerpunkt
  • Biometrie
  • Published:
Datenschutz und Datensicherheit - DuD Aims and scope Submit manuscript

    We’re sorry, something doesn't seem to be working properly.

    Please try refreshing the page. If that doesn't work, please contact support so we can address the problem.

Zusammenfassung

„Also, mit ein paar Minuten Arbeit und ein wenig Aufwand bekomme ich meine zweite Identität.“, so schließt der Mitarbeiter des Chaos Computer Clubs die Reportage über das Nachbilden von Fingerabdrücken [2]. Da die Authentifizierung mittels biometrischer Merkmale in Zukunft an Gewicht gewinnen wird, sollte die Problematik von leicht zugänglichen, latenten biometrischen Informationen nicht unterschätzt werden. Die neue Technik der Venenbilderkennung kann Abhilfe schaffen, die kritischen Informationen befinden sich dabei im Körper. Allerdings treten mit Benutzung dieser Technik auch neue Probleme bezüglich der Privatsphäre der Nutzer auf — an Lösungen wird derzeit intensiv geforscht. Dieser Artikel beschreibt, wie Venenmuster in biometrischen Systemen verwendet werden können und warum Mechanismen zum Schutz der Privatsphäre eingesetzt werden sollten.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Literatur

  1. Breebaart, J., Busch, C., Grave, J., Kindt, E. (2008). A reference architecture for biometric template protection based on pseudo identities. In: Gesellschaft für Informatik (GI): BIOSIG 2008. Proceedings of the Special Interest Group on Biometrics and Electronic Signatures. Editor: Brömme, A. Bonn: Gesellschaft für Informatik, 2008, pp 25–37.

    Google Scholar 

  2. Chaos Computer Club. Wie können Fingerabdrücke nachgebildet werden?, Oktober 2004 http://www.ccc.de/biometrie/fingerabdruck_kopieren?language=de

  3. Hartung, D., Busch, C. (2009). Why vein recognition needs privacy protection (to be published in IEEE Conference IIH-MSP 2009)

  4. Hitachi VeinID FAQ 2006, http://www.hitachieu.com/veinid/F.A.Q%27s/Frequently%20Asked%20Questions.pdf, checked March 2009

  5. InternatInternational Organization for Standardization (ISO), ISO/IEC JTC1 SC37 Biometrics. ISO/IEC 19794-9:2007 Information Technology — Biometric Data International Organization for Standardization (ISO), ISO/IEC JTC1 SC37 Biometrics. ISO/IEC 19794-9:2007 Information Technology — Biometric Data Interchange Formats — Part 9: Vascular image data., 2007.

  6. International Biometrics Group (IBG). Comparative Biometric Testing Round 6 Public Report, Sep 2006.

  7. International Organization for Standardization (ISO), ISO/IEC NP 24745 Biometric template protection (status: under development).

  8. J. Hashimoto. Finger vein authentication technology and its future. VLSI Circuits, 2006. Digest of Technical Papers. 2006 Symposium on, pages 5–8, 2006.

  9. Japan Post, Becoming a Reliable Company, http://www.jp-bank.japanpost.jp/en/aboutus/pdf/en2008_05.pdf, Anual Report (english) 2008.

  10. L. Wang, G. Leedham, and D. Cho. Infrared imaging of hand vein patterns for biometric purposes. Computer Vision IET, 1(3–4):113–122, December 2007. [12] World Health Organization. The world health report 2004 — changing history., 2004.

    Article  MathSciNet  MATH  Google Scholar 

  11. La Berge et. al. Interventional Ra-diology Essentials. Lippincott Wil-liams and Wilkins, 2000.

  12. M. Himaga, K. Kou. Advances in Biometrics. Finger Vein Authentication Technology and Financial Applications. Page 89–105 in Advances in Biometrics, Springer London 2008.

  13. M. Meints, H. Biermann, M. Bromba, C. Busch, G. Hornung and G. Quiring-Kock. Biometric systems and data protection legislation in Germany. In IIH-MSP’ 08: Proceedings of the 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pages 1088–1093, Harbin, China, 2008. IEEE Computer Society.

    Chapter  Google Scholar 

  14. N. Miura, A. Nagasaka, and T. Miyatake. Extraction of Finger-Vein Patterns Using Maximum Curvature Points in Image Profiles. IEICE Trans Inf Syst, E90-D(8):1185–1194, 2007.

    Article  Google Scholar 

  15. N. Miura, A. Nagasaka, and T. Miyatake. Feature extraction of finger-vein patterns based on repeated line tracking and its application to personal identification. Mach. Vision Appl., 15(4):194–203, 2004.

    Article  Google Scholar 

  16. N. Ratha, J. Connell, and R. Bolle. Enhancing security and privacy of biometric-based authentication systems. IBM Systems Journal, 40, 2001.

  17. Nanyang Technological University. http://www.ntu.edu.sg, March 2009.

  18. P. Tuyls, A. M. Akkermans, T. Ke-venaar, G.J. Schrijen, A.M. Bazen, and R.N.J. Veldhuis. Practical biometric authentication with template protection. In Audio- and Video-Based Biometric Person Authentication, volume 3546 of Lecture Notes in Computer Science, pages 436–446. Springer Belin / Heidelberg, June 2005.

  19. T. Yanagawa, S. Aoki, and T. e. a. Ohyama. Human finger vein images are diverse and its patterns are useful for personal identification. 2007.

  20. Wikipedia. Arteriovenous Malformation. http://en.wikipedia.org/wiki/Arteriovenous_malformation, checked March 2009

  21. World Health Organization. The world health report 2004 — changing history. 2004

  22. Z. Zhang, S. Ma, X. Han. Multiscale feature extraction of finger-vein patterns based on curvelets and local interconnection structure neural network. In ICPR’ 06: Procee-dings of the 18th International Conference on Pattern Recognition, pages 145–148, Washington, DC, USA, 2006. IEEE Computer Society.

    Chapter  Google Scholar 

Download references

Authors

Additional information

Daniel Hartung Diplom-Informatiker, forscht seit 2008 als Doktorand im NISlab, dem Norwegischen Labor für Informationssicherheit (www.nislab.no), an Venenmustererkennung und Datenschutzsystemen in biometrischen Anwendungen.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Hartung, D. Venenbilderkennung. DuD 33, 275–279 (2009). https://doi.org/10.1007/s11623-009-0084-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11623-009-0084-5

Navigation