68 research outputs found
A New Biometric Template Protection using Random Orthonormal Projection and Fuzzy Commitment
Biometric template protection is one of most essential parts in putting a
biometric-based authentication system into practice. There have been many
researches proposing different solutions to secure biometric templates of
users. They can be categorized into two approaches: feature transformation and
biometric cryptosystem. However, no one single template protection approach can
satisfy all the requirements of a secure biometric-based authentication system.
In this work, we will propose a novel hybrid biometric template protection
which takes benefits of both approaches while preventing their limitations. The
experiments demonstrate that the performance of the system can be maintained
with the support of a new random orthonormal project technique, which reduces
the computational complexity while preserving the accuracy. Meanwhile, the
security of biometric templates is guaranteed by employing fuzzy commitment
protocol.Comment: 11 pages, 6 figures, accepted for IMCOM 201
Biometric privacy protection : guidelines and technologies
Compared with traditional techniques used to establish the identity of a person, biometric systems offer a greater confidence level that the authenticated individual is not impersonated by someone else. However, it is necessary to consider different privacy and security aspects in order to prevent possible thefts and misuses of biometric data. The effective protection of the privacy must encompass different aspects, such as the perceived and real risks pertaining to the users, the specificity of the application, the adoption of correct policies, and data protection methods as well. This chapter focuses on the most important privacy issues related to the use of biometrics, it presents actual guidelines for the implementation of privacy-protective biometric systems, and proposes a discussion of the methods for the protection of biometric data
Obfuscated Fuzzy Hamming Distance and Conjunctions from Subset Product Problems
We consider the problem of obfuscating programs for fuzzy matching (in other words, testing whether the Hamming distance between an -bit input and a fixed -bit target vector is smaller than some predetermined threshold). This problem arises in biometric matching and other contexts. We present a virtual-black-box (VBB) secure and input-hiding obfuscator for fuzzy matching for Hamming distance, based on certain natural number-theoretic computational assumptions. In contrast to schemes based on coding theory, our obfuscator is based on computational hardness rather than information-theoretic hardness, and can be implemented for a much wider range of parameters. The Hamming distance obfuscator can also be applied to obfuscation of matching under the norm on .
We also consider obfuscating conjunctions. Conjunctions are equivalent to pattern matching with wildcards, which can be reduced in some cases to fuzzy matching. Our approach does not cover as general a range of parameters as other solutions, but it is much more compact. We study the relation between our obfuscation schemes and other obfuscators and give some advantages of our solution
The Removal of Sulfur from Dursunbey and Iskilip Lignites in Turkey, Using Natural Trona: 1. The Effect of the Thermal Method
WOS: 000311801900009This article is concerned with removing the pyritic and total sulfur contents from Dursunbey and. Iskilip lignites by means of trona, which is a natural mineral. The experiments were performed at 20, 50, and 90 degrees C for periods ranging from 15 to 180 minutes using trona solutions with concentrations in the 2.50-15.00% range, and the optimal conditions for sulfur removal were determined. The effect of variable temperature (20, 50, and 90 degrees C), concentrations of distilled water (0%) and trona solution concentration (1.25-15.00%), and experimental duration (15-180 minutes) on sulfur removal was investigated under the optimal conditions determined. It has been established that trona affects sulfur removal in thermal atmosphere and it reduces the pyritic sulfur contents of Dursunbey and. Iskilip lignites by 41 and 31% and the total sulfur contents by 41 and 38%, respectively.Bulent Ecevit University Scientific Research FundBulent Ecevit University [2004-13-02-04]The writers should like to express their gratitude to the Bulent Ecevit University Scientific Research Fund (Project No: 2004-13-02-04) for their financial assistance at the project level
The Removal of Sulfur from Dursunbey and Iskilip Lignites in Turkey, Using Natural Trona: 2. The Effect of the Microwave Radiation Method
WOS: 000313640100004This article describes the removal of pyritic and total sulfur contents of Dursunbey and Iskilip lignites in microwave radiation atmosphere using trona, which is a natural mineral. Preliminary experiments were carried out aimed at determining optimum conditions using trona solutions with concentrations in the 2.5015.00% range at microwave radiation powers of 90, 180, and 360 W for microwave radiation durations ranging from 30 to 480 sec. The effect of variables, such as distilled water (0%), trona solution concentration (1.2515.00%), and microwave radiation power (90, 180, and 360 W), on sulfur removal was determined under optimal conditions. As a result of experiments conducted in microwave radiation atmosphere, the pyritic sulfur contents of Dursunbey and Iskilip lignites were reduced by 48 and 38% and the total sulfur contents by 38 and 32%, respectively.Bulent Ecevit University Scientific Research FundBulent Ecevit University [2004-13-02-04]The authors would like to express their gratitude to the Bulent Ecevit University Scientific Research Fund (Project No: 2004-13-02-04) for their financial assistance at the project level
Tamper Detection Based on Regularity of Wavelet Transform Coefficients
Powerful digital media editing tools make producing good quality forgeries very easy for almost anyone. Therefore, proving the authenticity and integrity of digital media becomes increasingly important. In this work, we propose a simple method to detect image tampering operations that involve sharpness/bluriness adjustment. Our approach is based on the assumption that if a digital image undergoes a copypaste type of forgery, average sharpness/blurriness value of the forged region is expected to be different as compared to the non-tampered parts of the image. The method of estimating sharpness/bluriness value of an image is based on the regularity properties of wavelet transform coefficients which involves measuring the decay of wavelet transform coefficients across scales. Our preliminary results show that the estimated sharpness/bluriness scores can be used to identify tampered areas of the image
Managing private credentials by privacy-preserving biometrics
We investigate in this paper the need to managing a user’s private credentials using privacy-preserving biometrics, define several private credential management work models under different trust models between a user and an external party. A general pipeline using privacy preserving biometrics for private credential management is proposed to achieve the purpose of biometric template protection, biometric-secret binding, and biometric recognition accuracy performance improvement. The proposed scheme was implemented and tested in the European CIP project PIDaaS, and demonstrated advantages in privacy preservation and accuracy performance preservation
EVALUATION OF LYMPHOTOXIN-ALPHA C804A GENE POLYMORPHISMS IN PATIENTS WITH ISOLE CORONARY ARTERY ECTASIA
WOS: 000317946500308
- …