Professional Documents
Culture Documents
CONTENTS
1. Biometrics 2. Biometric Authentication System
BIOMETRICS
A biometric is a physiological or behavioral characteristic of a human being that can distinguish one person from another and that theoretically can be used for identification or verification of identity.
AUTHENTICATION
2. Face Recognition
a) One of the most acceptable biometrics
b) Not accurate and dependable
3. Hand Geometry
a) Include length and width of fingers, different aspect ratios of palm and fingers, thickness and width of the palm etc. b) Existing hand geometry systems mostly use images of the hand
4. Iris Recognition
a) Reliable and accurate
b) Believed to be unique in every individual c) Not work for people who are missing both eyes or who have serious eye illnesses that affect the iris.
BEHAVIORAL BIOMETRICS
1. Signature
a) High degree of acceptance b) Signatures lack permanence c) Static signature verification systems & Dynamic signature verification systems
2. Voice
a) Depend on numerous characteristics of a human voice to identify the speaker
server
Network security
PREVIOUS WORK
SALTING
Design a classifier in the encrypted feature space
Specific to a biometric trait Security using a transformation function seeded by a user
specific key
Do not offer well defined security
NON-INVERTIBLE TRANSFORM
Apply non-invertible function on the biometric template
Key must be available at the time of transformation Eg. Robust hashing, Cancelable templates
ENROLLMENT
Enrollment based on a trusted third party(TTP): At the time of registering with a website, the encrypted version of the users biometric template is made available to the website. The one-time classifier training is done on the plain biometrics, and hence requires a trusted server to handle training.
AUTHENTICATION
Blind Authentication Process: Linear kernel computation for encrypted feature vectors. At no point, the identity vectors x, w or the intermediate results xi wi is revealed to anyone.
Server Security
Client Security
Network Security
PRIVACY
information
Server security
Hacker gains access to the template database
Client security
Hacker gains access to the users biometric or private key
Passive attack at the users computer
Network Security
Attacker gains access to the network
PRIVACY
Concern of revealing personal information-Template
is
Model above functions as arithmetic circuits consisting of add and multiplication gates over a finite domain. Consider two encryptions E+ and E*
Client computes
Send to the server
Server computes
Verification time for various key sizes and feature vector lengths
Useful with wide variety of fixed-length biometrictraits. Ideal for applications such as biometric ATMs, login from public terminals.
CONCLUSION
Verification can be done in real-time with the help of available hardware Keep the interaction between the user and the server to a
minimum
Extensions to this work includes secure enrollment protocols and encryption methods to reduce computations
REFERENCES
N. K. Ratha, J. H. Connell, and R. M. Bolle, Enhancing security and privacy in biometrics-based authentication systems Maneesh Upmanyu, Anoop M. Namboodiri, K. Srinathan and C.V. Jawahar,Blind authentication: A secure crypto-biometric verification protocol