scholarly journals A fuzzy vault development based on iris images

Author(s):  
Mohammed A. Taha ◽  
Hanaa M. Ahmed

Biometric systems gather information from the person's biometric attributes, used extensively to authorize the individuals. Due to the obvious convenience of using specific individual traits such as face, fingerprints, palm veins, and irises, biometric authentication is becoming more common. In particular, Iris systems are in high demand for high-assurance applications, because they contain a broad feature set and remain stable. Authentication methods based on iris biometrics are now commonly used in a variety of fields. This is due to the fact that iris biometric authentication is both safer and more comfortable than conventional passwords. Template Security is a major concern in biometric systems. The template security mechanism ensures reusable, permanent, and un-linkable models. The Fuzzy Vault strategy is one of the most popular security schemes for Template protection. Fuzzy vault has demonstrated to be an effective protection method but lacks revocability and security attacks. This article introduced an improved fuzzy vault system. The improved fuzzy vault system was introduced, which uses more than one key to protect biometric data. Different keys make the search space more detailed. The additional key was used to encrypt vault data, which stopped the intruder from accessing the information on the person's biometry. The system was tested using CASIA.v1 and IITD.v1 datasets, and findings showed that the system ensures the protection and authentication of the iris templates without compromising performance. The proposed modification gave a 0.0 % False Accepted Rate (FAR) for both the dataset and False Rejected Rate (FRR), 0.14 % for CASIA v1 and 0.12 % for ITTD v1 False Rejected rate

2016 ◽  
Vol 13 (2) ◽  
pp. 313-334
Author(s):  
Bojan Jovanovic ◽  
Ivan Milenkovic ◽  
Marija Bogicevic-Sretenovic ◽  
Dejan Simic

Techniques for authentication that are used in today's identity management systems are vulnerable when they are used over the network. In order to prevent fraud and unauthorized data access, it is important to ensure the identity of the person who submitted authentication credentials. The authentication process can be additionally secured by using biometric data for user verification. Moreover, precision of biometric authentication can be improved by the use of multimodal biometrics. This paper presents a system which has been designed for identity management based on FreeIPA solution for digital identity management and MMBio framework for multimodal biometrics. Proposed system provides multifactor authentication, where MMBio framework is used for handling user biometric data. Developed prototype confirms possible integration of identity management and multimodal biometric systems.


2020 ◽  
Vol 17 (6) ◽  
pp. 926-934
Author(s):  
Reza Mehmood ◽  
Arvind Selwal

In recent years the security breaches and fraud transactions are increasing day by day. So there is a necessity for highly secure authentication technologies. The security of an authentication system can be strengthened by using Biometric system rather than the traditional method of authentication like Identity Cards (ID) and password which can be stolen easily. A biometric system works on biometric traits and fingerprint has the maximum share in market for providing biometric authentication as it is reliable, consistent and easy to capture. Although the biometric system is used to provide security to many applications but it is susceptible to different types of assaults too. Among all the modules of the biometric system which needs security, biometric template protection has received great consideration in the past years from the research community due to sensitivity of the biometric data stored in the form of template. A number of methods have been devised for providing template protection. Fuzzy vault is one of the cryptosystem based method of template security. The aim of fuzzy vault technique is to protect the precarious data with the biometric template in a way that only certified user can access the secret by providing valid biometric. In this paper, a modified version of fuzzy vault is presented to increase the level of security to the template and the secret key. The polynomial whose coefficients represent the key is transformed using an integral operator to hide the key where the key can no longer be derived if the polynomial is known to the attacker. The proposed fuzzy vault scheme also prevents the system from stolen key inversion attack. The results are achieved in terms of False Accept Rate (FAR), False Reject Rate (FRR), Genuine Acceptance Rate (GAR) by varying the degree of polynomial and number of biometric samples. It was calculated that for 40 users GAR was found to be 92%, 90%, 85% for degree of polynomial to be 3, 4 and 5 respectively. It was observed that increasing the degree of polynomial decreased the FAR rate, thus increasing the security


2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Xiaoling Zhu ◽  
Chenglong Cao

E-learning has been carried out all over the world and then online examinations have become an important means to check learning effect during the outbreak of COVID-19. Participant authenticity, data integrity, and access control are the assurance to online examination. The existing online examination schemes cannot provide the protection of biometric features and fine-grained access control. Particularly, they did not discuss how to resolve some disputes among students, teachers, and a platform in a fair and reasonable way. We propose a novel biometric authentication and blockchain-based online examination scheme. The examination data are encrypted to store in a distributed system, which can be obtained only if the user satisfies decryption policy. And the pieces of evidence are recorded in a blockchain network which is jointly established by some credible institutions. Unlike other examination authentication systems, face templates in our scheme are protected using a fuzzy vault and a cryptographic method. Furthermore, educational administrative department can determine who the real initiator of malicious behavior is when a dispute arises using a dispute determination protocol. Analysis shows that no central authority is required in our scheme; the collusion of multiple users cannot obtain more data; even if the authorities compromise, biometric features of each user will not be leaked. Therefore, in terms of privacy-preserving biometric templates, fine-grained access, and dispute resolution, it is superior to the existing schemes.


Author(s):  
Emanuele Maiorana ◽  
Patrizio Campisi ◽  
Alessandro Neri

With the widespread diffusion of biometrics-based recognition systems, there is an increasing awareness of the risks associated with the use of biometric data. Significant efforts are therefore being dedicated to the design of algorithms and architectures able to secure the biometric characteristics, and to guarantee the necessary privacy to their owners. In this work we discuss a protected on-line signature-based biometric recognition system, where the considered biometrics are secured by applying a set of non-invertible transformations, thus generating modified templates from which retrieving the original information is computationally as hard as random guessing it. The advantages of using a protection method based on non-invertible transforms are exploited by presenting three different strategies for the matching of the transformed templates, and by proposing a multi-biometrics approach based on score-level fusion to improve the performances of the considered system. The reported experimental results, evaluated on the public MCYT signature database, show that the achievable recognition rates are only slightly affected by the proposed protection scheme, which is able to guarantee the desired security and renewability for the considered biometrics.


Author(s):  
Michael Fairhurst

‘Enhancing biometric processing’ explores how the field of biometrics is developing, and the main ideas promoting the improvement of the accuracy, reliability, and effectiveness of biometric systems. It is unlikely that any individual biometric modality operating alone will completely meet all the desirable criteria for a given task, especially when the variety of issues that are needed are considered in any practical situation. To improve system performance different systems can be used such as adding extra power using a multiclassifier configuration, increasing flexibility using multimodal systems, and using soft biometrics as additional identity evidence. Resistance to ‘spoofing’ attacks, biometric data integrity, and extending the application domains for biometrics-based processing are also considered.


Author(s):  
David Zhang ◽  
Fengxi Song ◽  
Yong Xu ◽  
Zhizhen Liang

A biometric system can be regarded as a pattern recognition system. In this chapter, we discuss two advanced pattern recognition technologies for biometric recognition, biometric data discrimination and multi-biometrics, to enhance the recognition performance of biometric systems. In Section 1.1, we discuss the necessity, importance, and applications of biometric recognition technology. A brief introduction of main biometric recognition technologies are presented in Section 1.2. In Section 1.3, we describe two advanced biometric recognition technologies, biometric data discrimination and multi-biometric technologies. Section 1.4 outlines the history of related work and highlights the content of each chapter of this book.


Sensors ◽  
2019 ◽  
Vol 19 (13) ◽  
pp. 2985 ◽  
Author(s):  
Wencheng Yang ◽  
Song Wang ◽  
Jiankun Hu ◽  
Ahmed Ibrahim ◽  
Guanglou Zheng ◽  
...  

Remote user authentication for Internet of Things (IoT) devices is critical to IoT security, as it helps prevent unauthorized access to IoT networks. Biometrics is an appealing authentication technique due to its advantages over traditional password-based authentication. However, the protection of biometric data itself is also important, as original biometric data cannot be replaced or reissued if compromised. In this paper, we propose a cancelable iris- and steganography-based user authentication system to provide user authentication and secure the original iris data. Most of the existing cancelable iris biometric systems need a user-specific key to guide feature transformation, e.g., permutation or random projection, which is also known as key-dependent transformation. One issue associated with key-dependent transformations is that if the user-specific key is compromised, some useful information can be leaked and exploited by adversaries to restore the original iris feature data. To mitigate this risk, the proposed scheme enhances system security by integrating an effective information-hiding technique—steganography. By concealing the user-specific key, the threat of key exposure-related attacks, e.g., attacks via record multiplicity, can be defused, thus heightening the overall system security and complementing the protection offered by cancelable biometric techniques.


2018 ◽  
Vol 7 (4.15) ◽  
pp. 491
Author(s):  
Nur Syabila Zabidi ◽  
Noris Mohd Norowi ◽  
Rahmita Wirza O.K. Rahmat

The search for improving users’ security needs, awareness and concerns in the context of mobile phones still has been conducting in today’s society. Biometric systems identify a person or verify the identity of a person using purportedly unique physical traits or behaviour of that individual. In order to understand user requirements for biometric authentication, it is important to focus on several key issues, including the importance of smartphones in implementing biometric authentication, users’ general knowledge and perception towards biometric authentication, and users’ trust and practice when using different biometric technology for securing their smartphone’s data. A preliminary study in the form of an online survey was conducted. The idea of this study was to conduct a survey on users about their general knowledge and perceptions towards different biometric authentication on smartphones. The results of the study indicate that smartphone is an important tool in implementing biometric authentication. Moreover, users knew what biometric technology is and they are not reluctant to use them. Furthermore, users knew how to protect their smartphone’s data and practice the related preventions. The results are expected to give an insight of deploying biometric technology into mobile devices and further researching onto others biometric authentication.  


Sign in / Sign up

Export Citation Format

Share Document