Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
2Activity
0 of .
Results for:
No results containing your search query
P. 1
Preventing Attacks on Fingerprint Identification System by Using Level-3 Features

Preventing Attacks on Fingerprint Identification System by Using Level-3 Features

Ratings: (0)|Views: 140 |Likes:
Published by ijcsis
Biometrics is the science of establishing the identity of an individual based on their physical, behavioral and chemicall characteristics of the person. Fingerprints are the most widely used biometric feature for person identification and verification in the field of biometric identification. A finger print is the representation of the epidermis of a finger. It consists of a pattern of interleaved ridges and valleys. Now a days Fingerprints are widely used technique among other biometric like Iris, Gait, Hand Geometry, Dental Radiographs etc. Fingerprint Ridges, Minutae and sweat pores do not change throughout the life of an human being except due to accidents such as bruises and cuts on the fingertips. This property makes fingerprints a very attractive biometric identifier. In this paper we proposed a biometrics system which Prevents from Attacks from Gummy fingerprints. We proposed Fingerprint Identification System which is immune to attacks by Using Level-3 Features
Biometrics is the science of establishing the identity of an individual based on their physical, behavioral and chemicall characteristics of the person. Fingerprints are the most widely used biometric feature for person identification and verification in the field of biometric identification. A finger print is the representation of the epidermis of a finger. It consists of a pattern of interleaved ridges and valleys. Now a days Fingerprints are widely used technique among other biometric like Iris, Gait, Hand Geometry, Dental Radiographs etc. Fingerprint Ridges, Minutae and sweat pores do not change throughout the life of an human being except due to accidents such as bruises and cuts on the fingertips. This property makes fingerprints a very attractive biometric identifier. In this paper we proposed a biometrics system which Prevents from Attacks from Gummy fingerprints. We proposed Fingerprint Identification System which is immune to attacks by Using Level-3 Features

More info:

Published by: ijcsis on Nov 02, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

06/15/2012

pdf

text

original

 
 
Preventing Attacks on Fingerprint IdentificationSystem by Using Level-3 Features
Dr.R.Seshadri ,B.Tech,M.E,Ph.DDirector, S.V.U.Computer CenterS.V.University, TirupatiE-mail : ravalaseshadri@gmail.comYaswanth Kumar.Avulapati,M.C.A,M.Tech,(Ph.D)Research Scholar, Dept of Computer ScienceS.V.University, TirupatiE-mail:yaswanthkumar_1817@yahoo.co.in
Abstract
Biometrics is the science of establishing the identity of an individualbased on their physical, behavioral andchemicall characteristics of the person.Fingerprints are the most widely usedbiometric feature for person identificationand verification in the field of biometricidentification .A finger print is the representation of the epidermis of a finger. It consists of apattern of interleaved ridges and valleys.Now a days Fingerprints are widelyused technique among other biometric likeIris,Gait,Hand Geometry, DentalRadiographs etc. Fingerprint Ridges, Minutaeand sweat pores do not change throughoutthe life of an human being except due toaccidents such as bruises and cuts on thefingertips.This property makes fingerprints avery attractive biometric identifier. In thispaper we proposed a biometrics system whichPrevents from Attacks from Gummyfingerprints. We proposed FingerprintIdentification System which is immune toattacks by Using Level-3 Features
Keywords
-Biometrics, Immune, Sweat pores, Level-3features
Introduction
A fingerprint is a pattern of ridges andvalleys located on the tip of each finger.Fingerprints were used for personalidentification for many centuries and thematching accuracy was very high.Now adays the possiblethreats caused bysomething like real fingers, which are calledfake or artificial fingers, should be critical forauthentication based on fingerprint system Conventional fingerprint systems cannotcategorize between an impostor who falselyobtains the access privileges from a ATMsystem or any other source (e.g., secrete key,
(IJCSIS) International Journal of Computer Science and Information Security,Vol. 8, No. 7, October 2010133http://sites.google.com/site/ijcsis/ISSN 1947-5500
 
 
passwords) of a genuine user and the genuineuser . Moreover biometric systems (Ex.Fingerprint identification system)can be moresuitable for the users since there is no secretekeys ,password to be forgotten and afingerprint identification system (biometricsystem) can be used to access severalapplications without any trouble of remembering passwords.There are many advantages by usingthe biometric systems. These systems are indanger to attacks which can decrease theirsecurity. According to Ratha et al. analyzedthese attacks, and grouped them into eightclasses.These attacks along with thecomponents of a typical biometric systemthat can be compromised. Type 1 attack involves presenting a fake biometric (e.g.,synthetic fingerprint, face, iris) to the sensor.Submitting a previously interceptedbiometric data constitutesThe second type of attack (replay). Inthe third type of attack, the feature extractormodule is compromised to produce featurevalues selected by the attacker. Genuinefeature values are replaced with the onesselected by the attacker in the fourth type of attack. Matcher can be modified to output anartificially high matching score in the fifthtype of attack. The attack on the templatedatabase (e.g., adding a new template,modifying an existing template, removingtemplates, etc.) constitutes the sixth type of attack.The transmission medium between thetemplate database and matcher is attacked inthe seventh type of attack, resulting in thealteration of the transmitted templates.Finally, the matcher result (accept or reject)can be overridden by the attacker.According to Matsumoto et al. he attacked 11different fingerprint verification systems withartificially created gummy (gelatin) fingers.For a cooperative owner, her finger is pressedto a plastic mold, and gelatin leaf is used tocreate the gummy finger. The operation issaid to take lass than an hour. It was foundthat the gummy fingers could be enrolled inall of the 11 systems, and they were acceptedwith a probability of 68-100%. When theowner does not cooperate, a residualfingerprint from a glass plate is enhancedwith a cyanoacrylate adhesive.After capturing an image of the print,PCB based processing similar to theoperation described above is used to createthe gummy fingers. All of the 11 systemsenrolled the gummy fingers and theyaccepted the gummy fingers with more than67% probability.
Threat investigation for FingerprintIdentification system Systems
Fingerprint identification systems capturethe fingerprints and extract fingerprintfeatures from the images encrypt the featurestransmit them on communication media andthen store them as templates into database.Some systems encrypt templates with asecure cryptographic scheme and manage notwhole original images but compressedimages. Therefore, it is said to be difficult toreproduce valid fingerprints by using thetemplates. Some systems are secured againsta so-called replay attack in which an attackercopies a data stream from a fingerprintscanner to a server and later replays it withan one time protocol or a random challengeresponse device.When a valid user has registered his/her livefinger with a fingerprint identification systemthere would be several ways to mislead thesystem. In order to mislead the fingerprint
(IJCSIS) International Journal of Computer Science and Information Security,Vol. 8, No. 7, October 2010134http://sites.google.com/site/ijcsis/ISSN 1947-5500
 
 
identification system an attacker may presentthe following things to its fingerprint scanner1) The registered finger2)An unregistered finger (Imposter's finger )3) A genetic clone of the registered finger5) An artificial clone of the registered finger
Making a Artificial Fingerprint from a livefingerprint
Materials needed for making Gummyfingerprint as shown in fig1.a)Free Molding plastic “Free plastic”b)Solid Gelatine sheet fromFree plastic and Gelatin sheetFig .1.Materials used for Fake Fingerprints
How they are making a mold
Here we present how an attackermaking a gummy fingerprint as shown in thefig.2.The following steps for making thegummy fingerprint. It takes up to 10 min.1) Put the plastic in hot water to soften it2) Press a live finger against it3) The moldPut the plastic in hot water to soften itPress a live finger against itThe moldFig.2. Steps for Making the FakeFingerprints
(IJCSIS) International Journal of Computer Science and Information Security,Vol. 8, No. 7, October 2010135http://sites.google.com/site/ijcsis/ISSN 1947-5500

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->