scholarly journals Seeded Ising Model and Distributed Biometric Template Storage and Matching

Entropy ◽  
2021 ◽  
Vol 23 (7) ◽  
pp. 849
Author(s):  
Hyeong In Choi ◽  
Sungjin Lee ◽  
Hwan Pyo Moon ◽  
Nam-Sook Wee ◽  
Daehoon Kim ◽  
...  

It is known that a variant of Ising model, called Seeded Ising Model, can be used to recover the information content of a biometric template from a fraction of information therein. The method consists in reconstructing the whole template, which is called the intruder template in this paper, using only a small portion of the given template, a partial template. This reconstruction method may pose a security threat to the integrity of a biometric identity management system. In this paper, based on the Seeded Ising Model, we present a systematic analysis of the possible security breach and its probability of accepting the intruder templates as genuine. Detailed statistical experiments on the intruder match rate are also conducted under various scenarios. In particular, we study (1) how best a template is divided into several small pieces called partial templates, each of which is to be stored in a separate silo; (2) how to do the matching by comparing partial templates in the locked-up silos, and letting only the results of these intra-silo comparisons be sent to the central tallying server for final scoring without requiring the whole templates in one location at any time.

Author(s):  
Arpita Sarkar ◽  
Binod K. Singh

: Biometrics is a universally used automatic identification of persons, depending on their behavioural and biological quality. Biometric authentication plays a crucial role in the identity management system. Safety of biometric authentication systems needs to be addressed as there are still some points related to the integrity and public receiving of biometric systems. Feature extraction module of biometric authentication systems, during the season of enrolment scanned biometric information to extract the set of salient features. This set of unique feature is known as biometric template. This biometric template is helpful in distinguishing between different users. These templates are generally stored during the time of enrolment in a database indexed by the user's identity information. The biometric template protection is an important issue because the compromised template cannot be cancelled and reissued like a password or token. Template protection is a challenging task because of intra user variability present in the acquired biometric traits. This paper surveys about different existing approaches for designing a protection scheme for biometric templates with their strength and boundaries existing in the literature. Some prospect information in designing template protection schemes are also addressed in this paper.


TEM Journal ◽  
2020 ◽  
pp. 1338-1347
Author(s):  
Belkacem Athamena ◽  
Zina Houhamdi

This paper describes the identity management system (IdMS) by defining system and user requirements. Additionally, it introduces the IdMS concept that approaches the things identity management. Moreover, the paper deeply describes the IdMS features using unified modelling language (UML) diagrams such as class, system, and sequence diagrams to show the main system functionalities. Ultimately, the suggested system is evaluated by comparing it with the existing systems and discussing the fulfilment of user and system requirements.


2019 ◽  
Vol 2019 ◽  
Author(s):  
Job Mwaura

In the past few years, Kenya’s digital landscape has transformed and this has been made possible by proliferation of the usage of digital technologies, particularly - mobile phones. Due to increased access to digital technologies, faster internet speeds, increased securitization among other issues, data on individuals in online spaces has also increased. Recently, the government rolled out a National Integrated Identity Management System (NIIMS) which is meant to capture biometric data but this has generated a huge debate online in Kenya under the hashtag #ResistHudumaNamba. This paper will therefore examine the following issues: What has contributed to the decline of trust between the government and its citizens when it comes to internet technologies? What are the actual sentiments given for and against in the introduction of Huduma Number? What are the underlying reasons for continued registration of individuals in Kenya? This research will be a qualitative research study. Data will be generated from social media sites (Twitter and Facebook), as well as blog posts and newspaper articles. A discourse analysis of the events around #ResistsHudumaNamba in these sources will be done so as to answer the research questions. This research has the potential to contribute to literature on trust in sub-Saharan Africa as well as establish trust issues between government and citizens when digital technologies are involved.


Author(s):  
A. Shobanadevi ◽  
Sumegh Tharewal ◽  
Mukesh Soni ◽  
D. Dinesh Kumar ◽  
Ihtiram Raza Khan ◽  
...  

Author(s):  
Kenneth J. Giuliani ◽  
V. Kumar Murty

The purpose of this chapter is to examine the strengths and weaknesses of the most commonly used model for digital identities. It is compared to other models which have preceded it, thus giving a background on its development. The models are measured against a set of criteria which it is desirable for an identity management system to have. The underlying hope is that understanding this model will help improve it or even lead to a different model.


Sign in / Sign up

Export Citation Format

Share Document