32,746 research outputs found

    Privacy-Aware Processing of Biometric Templates by Means of Secure Two-Party Computation

    Get PDF
    The use of biometric data for person identification and access control is gaining more and more popularity. Handling biometric data, however, requires particular care, since biometric data is indissolubly tied to the identity of the owner hence raising important security and privacy issues. This chapter focuses on the latter, presenting an innovative approach that, by relying on tools borrowed from Secure Two Party Computation (STPC) theory, permits to process the biometric data in encrypted form, thus eliminating any risk that private biometric information is leaked during an identification process. The basic concepts behind STPC are reviewed together with the basic cryptographic primitives needed to achieve privacy-aware processing of biometric data in a STPC context. The two main approaches proposed so far, namely homomorphic encryption and garbled circuits, are discussed and the way such techniques can be used to develop a full biometric matching protocol described. Some general guidelines to be used in the design of a privacy-aware biometric system are given, so as to allow the reader to choose the most appropriate tools depending on the application at hand

    Biometric Identity

    Get PDF

    An Efficient Secure Multimodal Biometric Fusion Using Palmprint and Face Image

    Get PDF
    Biometrics based personal identification is regarded as an effective method for automatically recognizing, with a high confidence a person’s identity. A multimodal biometric systems consolidate the evidence presented by multiple biometric sources and typically better recognition performance compare to system based on a single biometric modality. This paper proposes an authentication method for a multimodal biometric system identification using two traits i.e. face and palmprint. The proposed system is designed for application where the training data contains a face and palmprint. Integrating the palmprint and face features increases robustness of the person authentication. The final decision is made by fusion at matching score level architecture in which features vectors are created independently for query measures and are then compared to the enrolment template, which are stored during database preparation. Multimodal biometric system is developed through fusion of face and palmprint recognition

    The Horcrux Protocol: A Method for Decentralized Biometric-based Self-sovereign Identity

    Full text link
    Most user authentication methods and identity proving systems rely on a centralized database. Such information storage presents a single point of compromise from a security perspective. If this system is compromised it poses a direct threat to users' digital identities. This paper proposes a decentralized authentication method, called the Horcrux protocol, in which there is no such single point of compromise. The protocol relies on decentralized identifiers (DIDs) under development by the W3C Verifiable Claims Community Group and the concept of self-sovereign identity. To accomplish this, we propose specification and implementation of a decentralized biometric credential storage option via blockchains using DIDs and DID documents within the IEEE 2410-2017 Biometric Open Protocol Standard (BOPS)

    Combining multiple biometrics to protect privacy

    Get PDF
    As biometrics are gaining popularity, there is increased concern over the loss of privacy and potential misuse of biometric data held in central repositories. The association of fingerprints with criminals raises further concerns. On the other hand, the alternative suggestion of keeping biometric data in smart cards does not solve the problem, since forgers can always claim that their card is broken to avoid biometric verification altogether. We propose a biometric authentication framework which uses two separate biometric features combined to obtain a non-unique identifier of the individual, in order to address privacy concerns. As a particular example, we demonstrate a fingerprint verification system that uses two separate fingerprints of the same individual. A combined biometric ID composed of two fingerprints is stored in the central database and imprints from both fingers are required in the verification process, lowering the risk of misuse and privacy loss. We show that the system is successful in verifying a person’s identity given both fingerprints, while searching the combined fingerprint database using a single fingerprint, is impractical

    Biometric technology in rural credit markets

    Get PDF
    Identity theft is a common crime the world over. In developing countries, the damage caused by identity theft and identity fraud goes far beyond the individual victim, however, and ultimately creates a direct impediment to progress, particularly in credit markets. Recent research reveals that biometric technology can help reduce these problems. A biometric is a measurement of physical or behavioral characteristics used to verify or analyze identity. Common biometrics include a person’s fingerprints; face, iris, or retina patterns; speech; or handwritten signature. These are effective personal identifiers because they are unique and intrinsic to each person, so, unlike conventional identification methods (such as passport numbers or government-issued identification cards), they cannot be forgotten, lost, or stolen. Recent advances in recognition technology coupled with increases in both digital storage capacity and computer processing speeds have made biometric technology (for example, ocular or fingerprint scanners) feasible in many applications, from controlling restricted building access to allowing more effective delivery of targeted government programs with large-scale identification systems, such as those being implemented in India by the Unique Identification Authority of India. Biometric technology can also improve access to credit and insurance markets, especially in countries that do not have a unique identification system, where identity fraud—the use of someone else’s identity or a fictitious one—to gain access to services otherwise unavailable to an individual is rather common. For example, lenders in Malawi describe past borrowers who purposefully defaulted then tried to obtain a fresh loan from the same or another institution under a false identity. And, although less common in developing countries because markets are less developed, the potential for sick individuals without healthcare coverage to use the insurance policy of a friend or relative does exist. The response of lenders and insurance companies has been to restrict the supply of such services to the detriment of the greater population, not just those people committing identity fraud.Biometric technology, Commodities, conditional cash transfers, credit, Insurance, rural areas, Subsidies,

    UBSegNet: Unified Biometric Region of Interest Segmentation Network

    Full text link
    Digital human identity management, can now be seen as a social necessity, as it is essentially required in almost every public sector such as, financial inclusions, security, banking, social networking e.t.c. Hence, in today's rampantly emerging world with so many adversarial entities, relying on a single biometric trait is being too optimistic. In this paper, we have proposed a novel end-to-end, Unified Biometric ROI Segmentation Network (UBSegNet), for extracting region of interest from five different biometric traits viz. face, iris, palm, knuckle and 4-slap fingerprint. The architecture of the proposed UBSegNet consists of two stages: (i) Trait classification and (ii) Trait localization. For these stages, we have used a state of the art region based convolutional neural network (RCNN), comprising of three major parts namely convolutional layers, region proposal network (RPN) along with classification and regression heads. The model has been evaluated over various huge publicly available biometric databases. To the best of our knowledge this is the first unified architecture proposed, segmenting multiple biometric traits. It has been tested over around 5000 * 5 = 25,000 images (5000 images per trait) and produces very good results. Our work on unified biometric segmentation, opens up the vast opportunities in the field of multiple biometric traits based authentication systems.Comment: 4th Asian Conference on Pattern Recognition (ACPR 2017
    • …
    corecore