Professional Documents
Culture Documents
A Secure Crypto-Biometric Verification Protocol
A Secure Crypto-Biometric Verification Protocol
CRYPTO-BIOMETRIC VERIFICATION
PROTOCOL
By Maneesh Upmanyu ,C. V. Jawahar , Anoop M Namboodiri, Kannan Srinathan
CONTENTS
1. Biometrics
2. Biometric Authentication System
3. Comparison of Biometric systems
4. Privacy concerns in Biometric systems
5. What is Blind Authentication?
6. Previous work
7. Features of Blind Authentication
8. Enrollment
9. Authentication
10. Security, Privacy and Trust
11. Extensions to Kernels and Neural networks
12. Blind Secure Product Protocol
13. Implementation and analysis
14. Advantages
15. Conclusion
BIOMETRICS
PHYSIOLOGICAL BIOMETRICS
1. Fingerprint recognition
a) No two persons share the same fingerprints
b) Can go for thermal sensing, optical sensing, capacitance sensing,
ultrasound sensing etc.
c) Wet, dry, or dirty skin may create problems
2. Face Recognition
a) One of the most acceptable biometrics
b) Not accurate and dependable
3. Hand Geometry
4. Iris Recognition
a) Reliable and accurate
b) Believed to be unique in every individual
c) Not work for people who are missing both eyes or who have
serious eye illnesses that affect the iris.
BEHAVIORAL BIOMETRICS
1. Signature
2. Voice
a) Depend on numerous characteristics of a human voice to identify
the speaker
b) Does not require expensive input devices
c) Issues- may skillfully imitate others' voices, record and replay
attacks
Primary Concerns in a Biometric
System
Template Protection
User's privacy
Network security
What is Blind Authentication?
NON-INVERTIBLE TRANSFORM
Apply non-invertible function on the biometric template
Key must be available at the time of transformation
Eg. Robust hashing, Cancelable templates
Non-repudiable authentication
Revocability
ENROLLMENT
PRIVACY
Concern of revealing personal
information
Server security
Hacker gains access to the template database
Hacker is in the database server during the authentication
Impostor trying blind attacks from a remote machine
Client security
Hacker gains access to the user’s biometric or private key
Passive attack at the user’s computer
Network Security
Attacker gains access to the network
PRIVACY
Concern of revealing personal information-Template is
never revealed to the server
Concern of being tracked-Use different keys for different
applications
EXTENSIONS TO KERNELS AND
NEURAL NETWORKS
Kernel based classifier uses a discriminating function
like
Server computes
and send it to the client.Client decrypts it.
Client computes
Server computes
IMPLEMENTATION AND ANALYSIS
Experiments designed to evaluate the efficiency and
accuracy of proposed approach.
For evaluation, an SVM based verifier based on client-
server architecture was implemented.
verification protocol”