Toward Ubiquitous Acceptance of Biometric Authentication: Template Protection Techniques

Author(s):  
Madalina Baltatu ◽  
Rosalia D’Alessandro ◽  
Roberta D’Amico
Author(s):  
Pim Tuyls ◽  
Anton H. M. Akkermans ◽  
Tom A. M. Kevenaar ◽  
Geert-Jan Schrijen ◽  
Asker M. Bazen ◽  
...  

2008 ◽  
Vol 5 (8) ◽  
pp. 278-284 ◽  
Author(s):  
T. S. Ong ◽  
Andrew B. J. Teoh ◽  
S. E. Khor ◽  
T. Connie

2019 ◽  
Vol 16 (11) ◽  
pp. 4883-4888
Author(s):  
P. Kumaran ◽  
R. Ashoka Rajan ◽  
T. Veeramani ◽  
R. Thilagavathy

To develop a complete biometric authentication system, security is highly needed. Even though there are several methods for storing fingerprint templates, they are compromised by the attacker leaving it as an unprotected system. In this paper, a novel method is proposed for protecting biometrics through an user defined graph named Web Modulo Graph. Feature vectors are extracted from the Left Fingerprint, Right Fingerprint and Palm Print during the enrollment process. The captured information from the biometrics are combined and stored in Web Modulo Graph where the insertion and traversal of feature vectors are unknown to the attacker. So even if the database or the graph structure is stolen by the attacker the correct sequence cannot be obtained. In this case, guessing the correct sequence is not almost possible as user defined graph is used and the system can achieve this with an Equal Error Rate (EER) of 4.8%. After various analyses, the proposed system is found to have high computational hardness.


Author(s):  
Sheetal Chaudhary ◽  
Rajender Nath ◽  
Chander Kant ◽  
Surya Kant

Background and Objective: The most important issue concerning the security of biometric authentication systems is protection of biometric templates. This is because once the biometric template being attacked, it cannot be canceled and reissued. Thus, the intruder could avail the facilities that are meant only for the genuine user just bypassing the enrollment phase. Methods: To protect the biometric templates from attacks, it is advantageous to modify them before storing in the databases through some cancelable and non-invertible transformations. Hence, an approach based on cancelable biometrics is proposed in this paper for providing security and privacy to biometric templates. It uses left iris and right iris as input biometric traits. Different experiments are carried out to authenticate the proposed approach. Results and Conclusion: It satisfies all template protection requirements and expected to show good recognition performance without degrading it.


Author(s):  
Arpita Sarkar ◽  
Binod K. Singh

: Biometrics is a universally used automatic identification of persons, depending on their behavioural and biological quality. Biometric authentication plays a crucial role in the identity management system. Safety of biometric authentication systems needs to be addressed as there are still some points related to the integrity and public receiving of biometric systems. Feature extraction module of biometric authentication systems, during the season of enrolment scanned biometric information to extract the set of salient features. This set of unique feature is known as biometric template. This biometric template is helpful in distinguishing between different users. These templates are generally stored during the time of enrolment in a database indexed by the user's identity information. The biometric template protection is an important issue because the compromised template cannot be cancelled and reissued like a password or token. Template protection is a challenging task because of intra user variability present in the acquired biometric traits. This paper surveys about different existing approaches for designing a protection scheme for biometric templates with their strength and boundaries existing in the literature. Some prospect information in designing template protection schemes are also addressed in this paper.


Cloud is that the rising and thirst area of analysis and advantageous in all the fields. However security is the main disquiet for not espouse cloud for each application. Mainly of the security crisis are connected by authentication with data protection by the respect to cloud security alliance (CSA). The projected New (Biometric encoding and Biometric authentication) protocol can conquer every safety crisis in cloud adjacent. In NEW protocol biometric encryption has been provided for the cloud consumer’s valuable information and identity verification has been utilized in a unique way to scale back the problems associated with authentication and authorization. In NEW protocol Identity verification in cloud environment has been joint by pattern security in coincidence with four entirely dissimilar and influential encryption algorithms for accumulated safety. This protocol improves biometric template protection by the combination of RSA and AES encryption algorithms in proper locations and 3DES, Blowfish has been utilized in information security and solution safety supervision. By implementing such technique can vanish out the un trustiness of adopting cloud, specifically public and hybrid clouds. Since all the users information are hold on in off premise. Adopting this protocol has given nice results when examining with existing work and all the vulnerable places has been considered for improved security.


2020 ◽  
Vol 2020 (8) ◽  
pp. 47-52
Author(s):  
Nataliya Kuznetsova ◽  
Tatyana Karlova ◽  
Aleksandr Bekmeshov

The work purpose consists in the efficiency increase of automated system operation for industrial enterprise resource protection at the expense of the optimization of authentication method application, in particular, biometric one. To achieve the purpose it is necessary to solve the problem of efficient joint use of modern authentication methods, particularly, a static and dynamic biometric authentication. But biometric methods are most expensive from the point of view of their realization. In this connection, within the limits of the paper there is carried out the analysis of modern methods of biological authentication from the point of view of a special order of introduction and joint use. In the paper there is shown a classification of static and dynamic methods for biometric authentication, an example of method combination in the authentication module is presented, there are considered and analyzed the latest methods, in particular, those based on DNA investigations, thermograms of a face and hands (static), gestures (dynamic). The work novelty consists in the presented diagram of authentication module operation. As a conclusion it should be noted that modern authentication systems offer the application of a complex approach: use both biometric methods and other ones for authentication in modules, in particular, based on secret knowledge and material carrier possession. The approach mentioned will allow minimizing the errors of the first and the second kinds, increasing a general level of safety.


Sign in / Sign up

Export Citation Format

Share Document