Open Access Open Access  Restricted Access Subscription or Fee Access

Analysis of Blind Secure Biometric Verification Protocol

V. Sandhiya, C. Sathiya Kumar

Abstract


A wide variety of systems requires reliable personal
recognition schemes to either confirm or determine the identity of an individual requesting their services. Biometric authentication systems are primarily centered around template security, revocability, and
privacy. A provably secure and blind biometric authentication
protocol, which addresses the concerns of user’s privacy, template protection, and trust issues. The protocol is blind in the sense that it reveals only the identity, and no additional information about the user
or the biometric to the authenticating server or vice-versa. As the protocol is based on asymmetric encryption of the biometric data, it captures the advantages of biometric authentication as well as the security of public key cryptography. The encryption also provides
template protection, the ability to revoke enrolled templates, a and alleviates the concerns on privacy in widespread use of biometrics. The proposed approach makes no restrictive assumptions on the biometric data and is hence applicable to multiple biometric. Such a protocol has significant advantages over existing biometric cryptosystems which use a biometric to secure a secret key, which in turn is used for authentication.


Keywords


Biometrics, Cryptosystems, Privacy, Public Key Cryptography, Security.

Full Text:

PDF

References


K. Jain, A. Ross, and S. Prabhakar, “An introduction to biometric recognition,” IEEE Trans. Circuits Syst. Video Technol., vol. 14, no. 1, pp. 4– 20, Jan. 2004.

N. K. Ratha, J. H. Connell, and R. M. Bolle, “Enhancing security and privacy in biometrics based authentication systems,” IBM Syst. J., vol.40, no. 3, pp. 614–634, Mar. 2001.

F. Farooq, R. M. Bolle, T.-Y. Jea, and N. Ratha, “Anonymous and revocable fingerprint recognition,” in CVPR Biometrics Worshop, Jun 2007, pp. 1–7.

A. Teoh, D. Ngo, and A. Goh, “Biohashing: Two factor authentication featuring fingerprint data and tokenised random number,” Pattern Recognition., vol. 37, no. 11, pp. 2245–2255, Nov.2004.

A. K. Jain, K. Nandakumar, and A. Nagar, “Biometric template security,” EURASIP, vol. 8, no. 2, pp. 1–17, 2008.

M. Upmanyu, A. M. Namboodiri, K. Srinathan, and C. V. Jawahar, “Efficient biometric verification in the encrypted domain,” in 3rd Int. Conf. Biometrics, Jun. 2009, pp. 906–915.

N. Ratha, S. Chikkerur, J. Connell, and R. Bolle, “Generating cancelable fingerprint templates,” IEEE Trans. Pattern Anal.Mach. Intell.,vol. 29, Apr. 2007.

T. Connie, A. Teoh, M. Goh, and D. Ngo, “PalmHashing: A novel approach for cancelable biometrics,” Inf. Process. Lett., vol. 93, no. 1, pp.1–5, Jan. 2005.

A. Juels and M. Sudan, “A fuzzy vault scheme,” Designs, Codes and Cryptography, vol. 38, no. 2, pp. 237–257, 2006.

Y. Dodis, L. Reyzin, and A. Smith, “Fuzzy extractors: How to generate strong keys from biometrics and other noisy data,” Eurocrypt, pp.523–540, 2004.

C. Bishop, Neural Networks for Pattern Recognition. London, U.K.: Oxford Univ. Press, 1995.

T. Mitchell, Machine Learning. New York: McGraw-Hill, 1997.

Yale Face Database [Online]. Available:

http://cvc.yale.edu/projects/yalefaces/yalefaces.html.

A. K. Jain, A. Ross, and S. Pankanti, “A prototype hand geometry based verification system,” in 2nd Int. Conf. Audio- and Video-based Biometric Person Authentication (AVBPA), 1999, pp. 166–171.

Casia Finger Print Dataset [Online]. Available:

http://www.cbsr.ia.ac.cn/english /Databases.asp.

Fvc2004 Dataset [Online]. Available:

http://bias.csr.unibo.it/fvc2004/databases.asp.

T. Fawcett, “An introduction to roc analysis,” Pattern Recogn. Lett.,vol. 27, no. 8, pp. 861–874, 2006.

C. Fontaine and F. Galand, “A survey of homomorphic encryption for nonspecialists,” EURASIP, vol. 1, pp. 1–15, 2007.

A. Teoh, B. Jin, T. Connie, D. Ngo, and C. Ling, “Remarks on BioHash and its mathematical foundation,” Inf. Process. Lett., vol. 100, no. 4, pp. 145–150, Nov. 2006.

M. Savvides and B. V. Kumar, “Cancellable biometric filters for face recognition,” in Int. Conf. Pattern Recognition (ICPR), 2004, vol. 3, pp. 922–925.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.