26 research outputs found
Evaluating biometrics fingerprint template protection for an emergency situation
Biometric template protection approaches have been developed to secure the biometric templates against image reconstruction on the stored templates. Two cancellable fingerprint template protection approaches namely minutiae-based bit-string cancellable fingerprint template and modified minutiae-based bit-string cancellable fingerprint template, are selected to be evaluated. Both approaches include the geometric information of the fingerprint into the extracted minutiae. Six modified fingerprint data sets are derived from the original fingerprint images in FVC2002DB1_B and FVC2002DB2_B by conducting the rotation and changing the quality of original fingerprint images according to the environment conditions during an emergency situation such as wet or dry fingers and disoriented angle of fingerprint images. The experimental results show that the modified minutiae-based bit-string cancellable fingerprint template performs well on all conditions during an emergency situation by achieving the matching accuracy between 83% and 100% on FVC2002DB1_B data set and between 99% and 100% on FVC2002DB2_B data set
Cancellable face template algorithm based on speeded-up robust features and winner-takes-all
Features such as face, fingerprint, and iris imprints have been used for authentication in
biometric system. The toughest feature amongst these is the face. Extracting a region with
the most potential face features from an image for biometric identification followed by illumination enhancement is a commonly used method. However, the region of interest extraction followed by illumination enhancement is sensitive to image face feature displacement, skewed image, and bad illumination. This research presents a cancell able face image algorithm built upon the speeded-up robust features method to extract and select features. A speeded-up robust feature approach is utilised for the image’s features extraction, while Winner-Takes-All hashing is utilised for match-seeking. Finally, the features vectors are projected by utilising a random form of binary orthogonal matrice. Experiments were conducted on Yale and ORL datasets which provide gray scale images of sizes 168 × 192 and 112 × 92 pixels, respectively. The execution of the proposed
algorithm was measured against several algorithms using equal error rate metric. It is found that the proposed algorithm produced an acceptable performance which indicates that this algorithm can be used in biometric security applications
Developing an Algorithm for Securing the Biometric Data Template in the Database
This research article published by the International Journal of Advanced Computer Science and Applications, Vol. 10, No. 10, 2019In the current technology advancement, biometric
template provides a dependable solution to the problem of user
verification in an identity control system. The template is saved
in the database during the enrollment and compared with query
information in the verification stage. Serious security and
privacy concerns can arise, if raw, unprotected data template is
saved in the database. An attacker can hack the template
information in the database to gain illicit access. A novel
approach of encryption-decryption algorithm utilizing a design
pattern of Model View Template (MVT) is developed to secure
the biometric data template. The model manages information
logically, the view shows the visualization of the data, and the
template addresses the data migration into pattern object. The
established algorithm is based on the cryptographic module of
the Fernet key instance. The Fernet keys are combined to
generate a multiFernet key to produce two encrypted files (byte
and text file). These files are incorporated with Twilio message
and securely preserved in the database. In the event where an
attacker tries to access the biometric data template in the
database, the system alerts the user and stops the attacker from
unauthorized access, and cross-verify the impersonator based on
the validation of the ownership. Thus, helps inform the users and
the authority of, how secure the individual biometric data
template is, and provided a high level of the security pertaining
the individual data privac
On the Security Risk of Cancelable Biometrics
Over the years, a number of biometric template protection schemes, primarily
based on the notion of "cancelable biometrics" (CB) have been proposed. An
ideal cancelable biometric algorithm possesses four criteria, i.e.,
irreversibility, revocability, unlinkability, and performance preservation.
Cancelable biometrics employed an irreversible but distance preserving
transform to convert the original biometric templates to the protected
templates. Matching in the transformed domain can be accomplished due to the
property of distance preservation. However, the distance preservation property
invites security issues, which are often neglected. In this paper, we analyzed
the property of distance preservation in cancelable biometrics, and
subsequently, a pre-image attack is launched to break the security of
cancelable biometrics under the Kerckhoffs's assumption, where the cancelable
biometrics algorithm and parameters are known to the attackers. Furthermore, we
proposed a framework based on mutual information to measure the information
leakage incurred by the distance preserving transform, and demonstrated that
information leakage is theoretically inevitable. The results examined on face,
iris, and fingerprint revealed that the risks origin from the matching score
computed from the distance/similarity of two cancelable templates jeopardize
the security of cancelable biometrics schemes greatly. At the end, we discussed
the security and accuracy trade-off and made recommendations against pre-image
attacks in order to design a secure biometric system.Comment: Submit to P
A Secure Online Fingerprint Authentication System for Industrial IoT Devices over 5G Networks
The development of 5G networks has rapidly increased the use of Industrial Internet of Things (IIoT) devices for control, monitoring, and processing purposes. Biometric-based user authentication can prevent unauthorized access to IIoT devices, thereby safeguarding data security during production. However, most biometric authentication systems in the IIoT have no template protection, thus risking raw biometric data stored as templates in central databases or IIoT devices. Moreover, traditional biometric authentication faces slow, limited database holding capacity and data transmission problems. To address these issues, in this paper we propose a secure online fingerprint authentication system for IIoT devices over 5G networks. The core of the proposed system is the design of a cancelable fingerprint template, which protects original minutia features and provides privacy and security guarantee for both entity users and the message content transmitted between IIoT devices and the cloud server via 5G networks. Compared with state-of-the-art methods, the proposed authentication system shows competitive performance on six public fingerprint databases, while saving computational costs and achieving fast online matching
Privacy-Preserving Biometric Authentication
Biometric-based authentication provides a highly accurate means of authentication without requiring the user to memorize or possess anything. However, there are three disadvantages to the use of biometrics in authentication; any compromise is permanent as it is impossible to revoke biometrics; there are significant privacy concerns with the loss of biometric data; and humans possess only a limited number of biometrics, which limits how many services can use or reuse the same form of authentication.
As such, enhancing biometric template security is of significant research interest. One of the methodologies is called cancellable biometric template which applies an irreversible transformation on the features of the biometric sample and performs the matching in the transformed domain. Yet, this is itself susceptible to specific classes of attacks, including hill-climb, pre-image, and attacks via records multiplicity.
This work has several outcomes and contributions to the knowledge of privacy-preserving biometric authentication. The first of these is a taxonomy structuring the current state-of-the-art and provisions for future research. The next of these is a multi-filter framework for developing a robust and secure cancellable biometric template, designed specifically for fingerprint biometrics. This framework is comprised of two modules, each of which is a separate cancellable fingerprint template that has its own matching and measures. The matching for this is based on multiple thresholds. Importantly, these methods show strong resistance to the above-mentioned attacks. Another of these outcomes is a method that achieves a stable performance and can be used to be embedded into a Zero-Knowledge-Proof protocol. In this novel method, a new strategy was proposed to improve the recognition error rates which is privacy-preserving in the untrusted environment. The results show promising performance when evaluated on current datasets
Composite Fixed-Length Ordered Features for Palmprint Template Protection with Diminished Performance Loss
Palmprint recognition has become more and more popular due to its advantages
over other biometric modalities such as fingerprint, in that it is larger in
area, richer in information and able to work at a distance. However, the issue
of palmprint privacy and security (especially palmprint template protection)
remains under-studied. Among the very few research works, most of them only use
the directional and orientation features of the palmprint with transformation
processing, yielding unsatisfactory protection and identification performance.
Thus, this paper proposes a palmprint template protection-oriented operator
that has a fixed length and is ordered in nature, by fusing point features and
orientation features. Firstly, double orientations are extracted with more
accuracy based on MFRAT. Then key points of SURF are extracted and converted to
be fixed-length and ordered features. Finally, composite features that fuse up
the double orientations and SURF points are transformed using the irreversible
transformation of IOM to generate the revocable palmprint template. Experiments
show that the EER after irreversible transformation on the PolyU and CASIA
databases are 0.17% and 0.19% respectively, and the absolute precision loss is
0.08% and 0.07%, respectively, which proves the advantage of our method