15 research outputs found

    Modified shielding function for multi-biometric authentication and template protection / Abayomi Jegede... [et al.]

    Get PDF
    Biometrics provides a secure means of authentication because it is difficult to copy, forge, or steal biometric modalities. However, unprotected biometric data can be used to violate the security of the authentication system and the privacy of legitimate users. This paper proposes and implements a modified shielding function which provides multi-biometric authentication, template security and user privacy simultaneously. Experimental results based on face and iris datasets obtained from CASIA Near Infra-Red face database and CASIA Iris database version 2 respectively show that the approach has good recognition accuracy (false rejection rate of 0.65% and false acceptance rate of 0.035%). Security analysis shows that the method provides better security (key length of 120 bits) and user privacy compared to previous approaches based on the generic shielding function

    Revocable and non-invertible multibiometric template protection based on matrix transformation

    Get PDF
    Biometric authentication refers to the use of measurable characteristics (or features) of the human body to provide secure, reliable and convenient access to a computer system or physical environment. These features (physiological or behavioural) are unique to individual subjects because they are usually obtained directly from their owner's body. Multibiometric authentication systems use a combination of two or more biometric modalities to provide improved performance accuracy without offering adequate protection against security and privacy attacks. This paper proposes a multibiometric matrix transformation based technique, which protects users of multibiometric systems from security and privacy attacks. The results of security and privacy analyses show that the approach provides high-level template security and user privacy compared to previous one-way transformation techniques

    State of the Art in Biometric Key Binding and Key Generation Schemes

    Get PDF
    Direct storage of biometric templates in databases exposes the authentication system and legitimate users to numerous security and privacy challenges. Biometric cryptosystems or template protection schemes are used to overcome the security and privacy challenges associated with the use of biometrics as a means of authentication. This paper presents a review of previous works in biometric key binding and key generation schemes. The review focuses on key binding techniques such as biometric encryption, fuzzy commitment scheme, fuzzy vault and shielding function. Two categories of key generation schemes considered are private template and quantization schemes. The paper also discusses the modes of operations, strengths and weaknesses of various kinds of key-based template protection schemes. The goal is to provide the reader with a clear understanding of the current and emerging trends in key-based biometric cryptosystems

    Cancelable and hybrid biometric cryptosystems: current directions and open research issues

    Get PDF
    Cancelable and hybrid biometric cryptosystems are two techniques used to offer protection against the security and privacy challenges faced by users of biometric authentication systems. The main objective of this paper is to present a critical review of current and emerging trends as well as open research issues in cancellable and hybrid biometric systems. The study examines cancelable biometrics under two main categories, namely non-invertible transformation and biometric salting. It also explores hybrid cryptosystems as means of providing improved template security and user privacy. The review focusses on the modes of operation, performance accuracy, security and privacy of various types of cancellable and hybrid biometric cryptosystems. It also provides a more comprehensive survey of latest research works in cancellable and hybrid biometric cryptosystems than existing review papers in these fields. The paper will provide readers with up-to-date information on current directions and open research issues in cancelable and hybrid biometric cryptosystems

    State of the art in biometric key binding and key generation schemes

    Get PDF
    Direct storage of biometric templates in databases exposes the authentication system and legitimate users to numerous security and privacy challenges. Biometric cryptosystems or template protection schemes are used to overcome the security and privacy challenges associated with the use of biometrics as a means of authentication. This paper presents a review of previous works in biometric key binding and key generation schemes. The review focuses on key binding techniques such as biometric encryption, fuzzy commitment scheme, fuzzy vault and shielding function. Two categories of key generation schemes considered are private template and quantization schemes. The paper also discusses the modes of operations, strengths and weaknesses of various kinds of key-based template protection schemes. The goal is to provide the reader with a clear understanding of the current and emerging trends in key-based biometric cryptosystems

    Modified shielding function for multi-biometric authentication and template protection

    Get PDF
    Biometrics provides a secure means of authentication because it is difficult to copy, forge, or steal biometric modalities. However, unprotected biometric data can be used to violate the security of the authentication system and the privacy of legitimate users. This paper proposes and implements a modified shielding function which provides multi-biometric authentication, template security and user privacy simultaneously. Experimental results based on face and iris datasets obtained from CASIA Near Infra-Red face database and CASIA Iris database version 2 respectively show that the approach has good recognition accuracy (false rejection rate of 0.65% and false acceptance rate of 0.035%). Security analysis shows that the method provides better security (key length of 120 bits) and user privacy compared to previous approaches based on the generic shielding function

    The evolving SARS-CoV-2 epidemic in Africa: Insights from rapidly expanding genomic surveillance

    Get PDF
    INTRODUCTION Investment in Africa over the past year with regard to severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) sequencing has led to a massive increase in the number of sequences, which, to date, exceeds 100,000 sequences generated to track the pandemic on the continent. These sequences have profoundly affected how public health officials in Africa have navigated the COVID-19 pandemic. RATIONALE We demonstrate how the first 100,000 SARS-CoV-2 sequences from Africa have helped monitor the epidemic on the continent, how genomic surveillance expanded over the course of the pandemic, and how we adapted our sequencing methods to deal with an evolving virus. Finally, we also examine how viral lineages have spread across the continent in a phylogeographic framework to gain insights into the underlying temporal and spatial transmission dynamics for several variants of concern (VOCs). RESULTS Our results indicate that the number of countries in Africa that can sequence the virus within their own borders is growing and that this is coupled with a shorter turnaround time from the time of sampling to sequence submission. Ongoing evolution necessitated the continual updating of primer sets, and, as a result, eight primer sets were designed in tandem with viral evolution and used to ensure effective sequencing of the virus. The pandemic unfolded through multiple waves of infection that were each driven by distinct genetic lineages, with B.1-like ancestral strains associated with the first pandemic wave of infections in 2020. Successive waves on the continent were fueled by different VOCs, with Alpha and Beta cocirculating in distinct spatial patterns during the second wave and Delta and Omicron affecting the whole continent during the third and fourth waves, respectively. Phylogeographic reconstruction points toward distinct differences in viral importation and exportation patterns associated with the Alpha, Beta, Delta, and Omicron variants and subvariants, when considering both Africa versus the rest of the world and viral dissemination within the continent. Our epidemiological and phylogenetic inferences therefore underscore the heterogeneous nature of the pandemic on the continent and highlight key insights and challenges, for instance, recognizing the limitations of low testing proportions. We also highlight the early warning capacity that genomic surveillance in Africa has had for the rest of the world with the detection of new lineages and variants, the most recent being the characterization of various Omicron subvariants. CONCLUSION Sustained investment for diagnostics and genomic surveillance in Africa is needed as the virus continues to evolve. This is important not only to help combat SARS-CoV-2 on the continent but also because it can be used as a platform to help address the many emerging and reemerging infectious disease threats in Africa. In particular, capacity building for local sequencing within countries or within the continent should be prioritized because this is generally associated with shorter turnaround times, providing the most benefit to local public health authorities tasked with pandemic response and mitigation and allowing for the fastest reaction to localized outbreaks. These investments are crucial for pandemic preparedness and response and will serve the health of the continent well into the 21st century

    MOBILE PRIVACY AWARENESS OF HIGHER EDUCATION STUDENTS IN PLATEAU STATE NIGERIA

    No full text
    The ubiquitous nature of mobile devices and wide array of applications (and services) they offer make them useful in virtually all areas of human endeavours. Owners of mobile devices store large amounts of vital and sensitive personal information on their devices. Unauthorized access to such information by third parties can violate the privacy of users and expose individuals and businesses to huge financial loses and damage to reputation. This makes it imperative for owners of technology service providers and owners of mobile devices to take proactive steps that prevent privacy violation. One of such critical steps is privacy awareness, which is the knowledge and consciousness of the need for privacy, an understanding of actions that promote or compromise privacy and the consequences of irresponsible online behaviour. The aim of this study is to assess the level of awareness of tertiary institution students with respect to privacy issues associated with the use of mobile communication devices. The research uses questionnaires to obtain data on the privacy awareness of users of mobile devices in some tertiary institutions in Plateau State. The paper investigates the current status of mobile privacy issues and awareness of users in these tertiary institutions. It also attempts to expose the gaps in privacy awareness of mobile device users, the factors responsible for limited privacy awareness and strategies for addressing the low level of privacy awareness of mobile device users. The results from this study show that high level of literacy does not necessarily imply high-level privacy awareness. Many respondents who are privacy aware do not possess the necessary skills or knowledge to ensure data and user privacy on their mobile devices. Others who possess this knowledge are will to engage in practices that compromise privacy in exchange for financial gain. Overall, the study exposes the actual level of privacy awareness and defeat the assumption that high level of education automatically results in high-level privacy awareness. It also contradicts the assumption that being privacy-aware guarantees responsible online behaviour and adherence to practices that promote online privacy

    MOBILE PRIVACY AWARENESS OF HIGHER EDUCATION STUDENTS IN PLATEAU STATE NIGERIA

    No full text
    The ubiquitous nature of mobile devices and wide array of applications (and services) they offer make them useful in virtually all areas of human endeavours. Owners of mobile devices store large amounts of vital and sensitive personal information on their devices. Unauthorized access to such information by third parties can violate the privacy of users and expose individuals and businesses to huge financial loses and damage to reputation. This makes it imperative for owners of technology service providers and owners of mobile devices to take proactive steps that prevent privacy violation. One of such critical steps is privacy awareness, which is the knowledge and consciousness of the need for privacy, an understanding of actions that promote or compromise privacy and the consequences of irresponsible online behaviour. The aim of this study is to assess the level of awareness of tertiary institution students with respect to privacy issues associated with the use of mobile communication devices. The research uses questionnaires to obtain data on the privacy awareness of users of mobile devices in some tertiary institutions in Plateau State. The paper investigates the current status of mobile privacy issues and awareness of users in these tertiary institutions. It also attempts to expose the gaps in privacy awareness of mobile device users, the factors responsible for limited privacy awareness and strategies for addressing the low level of privacy awareness of mobile device users. The results from this study show that high level of literacy does not necessarily imply high-level privacy awareness. Many respondents who are privacy aware do not possess the necessary skills or knowledge to ensure data and user privacy on their mobile devices. Others who possess this knowledge are will to engage in practices that compromise privacy in exchange for financial gain. Overall, the study exposes the actual level of privacy awareness and defeat the assumption that high level of education automatically results in high-level privacy awareness. It also contradicts the assumption that being privacy-aware guarantees responsible online behaviour and adherence to practices that promote online privacy

    Temporal trends in overweight and obesity and chronic disease risks among adolescents and young adults: A ten-year review at a tertiary institution in Nigeria.

    No full text
    There is an increasing prevalence of obesity among college/university students in low- and middle-income countries, similar to the trend observed in high-income countries. This study aimed to describe the trend and burden of overweight/obesity and emerging associated chronic disease risks among students at the University of Ibadan (UI), Nigeria. This is a ten-year retrospective review of medical records of students (undergraduate and post-graduate) admitted between 2009 and 2018 at UI. Records of 60,168 participants were analysed. The Body Mass Index (BMI) categories were determined according to WHO standard definitions, and blood pressure was classified according to the Seventh Report of the Joint National Committee on Prevention, Detection, Evaluation and Treatment of High Blood Pressure (JNC7). The mean age of the participants was 24.8, SD 8.4 years. The majority were ≤ 40 years (95.1%). There was a slight male preponderance (51.5%) with a male-to-female ratio of 1.1:1; undergraduate students constituted 51.9%. The prevalence of underweight, overweight, and obesity were 10.5%, 18.7% and 7.2%, respectively. We found a significant association between overweight/obesity and older age, being female and undergoing postgraduate study (p = 0.001). Furthermore, females had a higher burden of coexisting abnormal BMI characterised by underweight (11.7%), overweight (20.2%) and obese (10.4%). Hypertension was the most prevalent obesity-associated non-communicable disease in the study population, with a prevalence of 8.1%. Also, a third of the study population (35.1%) had prehypertension. Hypertension was significantly associated with older age, male sex, overweight/obesity and family history of hypertension (p = 0.001). This study identified a higher prevalence of overweight and obesity than underweight among the participants, a double burden of malnutrition and the emergence of non-communicable disease risks with potential lifelong implications on their health and the healthcare system. To address these issues, cost-effective interventions are urgently needed at secondary and tertiary-level educational institutions
    corecore