15 research outputs found

    The Horcrux Protocol: A Method for Decentralized Biometric-based Self-sovereign Identity

    Full text link
    Most user authentication methods and identity proving systems rely on a centralized database. Such information storage presents a single point of compromise from a security perspective. If this system is compromised it poses a direct threat to users' digital identities. This paper proposes a decentralized authentication method, called the Horcrux protocol, in which there is no such single point of compromise. The protocol relies on decentralized identifiers (DIDs) under development by the W3C Verifiable Claims Community Group and the concept of self-sovereign identity. To accomplish this, we propose specification and implementation of a decentralized biometric credential storage option via blockchains using DIDs and DID documents within the IEEE 2410-2017 Biometric Open Protocol Standard (BOPS)

    Mixing Biometric Data For Generating Joint Identities and Preserving Privacy

    Get PDF
    Biometrics is the science of automatically recognizing individuals by utilizing biological traits such as fingerprints, face, iris and voice. A classical biometric system digitizes the human body and uses this digitized identity for human recognition. In this work, we introduce the concept of mixing biometrics. Mixing biometrics refers to the process of generating a new biometric image by fusing images of different fingers, different faces, or different irises. The resultant mixed image can be used directly in the feature extraction and matching stages of an existing biometric system. In this regard, we design and systematically evaluate novel methods for generating mixed images for the fingerprint, iris and face modalities. Further, we extend the concept of mixing to accommodate two distinct modalities of an individual, viz., fingerprint and iris. The utility of mixing biometrics is demonstrated in two different applications. The first application deals with the issue of generating a joint digital identity. A joint identity inherits its uniqueness from two or more individuals and can be used in scenarios such as joint bank accounts or two-man rule systems. The second application deals with the issue of biometric privacy, where the concept of mixing is used for de-identifying or obscuring biometric images and for generating cancelable biometrics. Extensive experimental analysis suggests that the concept of biometric mixing has several benefits and can be easily incorporated into existing biometric systems

    The use of the Bayesian approach in the formation of the student's competence in the ICT direction

    Get PDF
    The theory of Bayesian networks has recently become very popular in solving various applied problems in various areas of science and production. To effectively use the Bayesian approach, a high-quality software product is needed that implements the mathematical ideas of Bayesian networks in practice. Such software products currently developed quite a large number. This paper presents the most common ones. The paper gives a small introduction about the competence of students and explores the possibility of using Bayesian networks in the formation of the competence of an IT trainer. Developed an integrated algorithm for the formation of the competence of training in the direction of IT

    Visual Cryptography for Biometric Privacy

    Full text link

    RCS analysis on different targets and bistatic angles using LTE frequency

    Get PDF
    Moving target detection and location are a function of dependent bistatic Radar Cross Section (RCS) and radar design parameters which in our experimental study used long-term evolution (LTE) signal as a source for passive bistatic radar (PBR). Moving target also can be classified in positions of different bistatic radar angles using conventional processing approaches which we performed a simulation using Computer Simulation Technology (CST) Microwave studio. The target bistatic radar cross-section, sb will give a realistic calculation on PBR performance with the requirement of complete treatment. The targets used are Toyota Rush (SUV) and Proton Exora (compact MPV) as a moving target had been designed based on the actual size to observe the performance of RCS due to the changing of bistatic angle between transmitter and receiver. The frequency transmit signal from LTE based station is 2.6 GHz, far-field conditions and the material used for the moving target is perfect electrical conductor. Simulation used different bistatic angles which are 59° and 90° of plane wave propagation. The simulation results show that largest area of moving target had better outcome that reliable with Babinet's principle, which declares a target of physical cross-sectional area is proportionate to RCS. The variation of RCS also depends on the shape of moving target, size of moving target and angles of plane wave. This might improve the sensitivity elevation targets with an adjustment of receiver angle to the target and transmitter for a better RCS performance
    corecore