FB pixel

Explainer: What is biometric hashing?

Explainer: What is biometric hashing?
 

The quest to make biometric data private and secure has led to the development of biometric hashing.  Hashing is a one-way process in which an algorithm called a cryptographic hash function takes an input of any size and converts it to a fixed-size alphanumeric output, called a hash value or hash – a distinct string of random characters. For example:

9cfa1e69f507d007a516eb3e9f5074e2

Hashing can be used to protect passwords, documents, digital signatures and other sensitive information. In the case of a biometric hash, the source input is biometric data such as a face, fingerprint, iris or palm scan.

Unlike a biometric template, which is an encrypted but decodable representation of biometric features, a biometric hash can’t be reverse-engineered to recover the source data. Reversing a biometric hash is computationally impractical, at least for now. As such, a breach of biometric hashes would be practically useless to a fraudster looking to commit identity theft.

To authenticate with hashed biometrics, a system compares the hash of a provided biometric to the stored hash. There are no stored biometrics involved in the authentication.

A paper published in Science Direct by researchers at the South China University of Technology’s School of Computer Science and Engineering in Guangzhou says that “in order to achieve high recognition accuracy, most hashing methods align the similarities between hash codes in the hash space with the similarities between biometric samples in the original space through matrix mapping or learning-based methods, which we call relation preserving.”

Hash functions are meant to be fast, with low computational costs and high storage efficiency.  Good ones should never produce the same hash from two different inputs – called a “collision.”

There are a variety of cryptographic hashing algorithms. Popular ones include MD5 (a 128-bit hash function); the SHA-2 family including SHA-56 (which produces a 256 bit hash); SHA-3, an update to SHA-2; BLAKE 2, designed to be faster than MD5 and SHA-2; and Whirlpool, which based on the advanced encryption standard (AES) and produces a 512-bit hash.

Related Posts

Article Topics

 |   |   |   | 

Latest Biometrics News

 

Biometrics providers and systems evolve or get left behind

Biometrics are allowing people to prove who they are, speeding journeys through airports, and enabling anonymous online proof of age,…

 

Findynet funding development of six digital wallet solutions

Finnish public-private cooperative Findynet has announced it will award 60,000 euros (US$69,200) to six digital wallet vendors to help translate…

 

Patchwork of age check, online safety legislation grows across US

As the U.S. waits for the Supreme Court’s opinion on the Texas case of Paxton v. Free Speech Coalition, which…

 

AVPA laud findings from age assurance tech trial

The Age Verification Providers Association (AVPA), and several of its members, have welcomed the publication of preliminary findings from the…

 

Sri Lanka to launch govt API policies and guidelines

Sri Lanka’s government, in the wake of its digital economy drive, is gearing up to release application programming interface (API)…

 

Netherlands’ asylum seeker ID cards from Idemia use vertical ICAO format

The Netherlands will introduce new identity documents for asylum seekers Idemia Smart Identity, compliant with the ICAO specification for vertical…

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Biometric Market Analysis

Most Viewed This Week

Featured Company

Biometrics Insight, Opinion

Digital ID In-Depth

Biometrics White Papers

Biometrics Events