Biometric Cryptosystems: for User Authentication

Similar documents
Secure and Private Identification through Biometric Systems

IJITKM Volume 7 Number 1 December 2013 pp (ISSN )

Multimodal Biometric Authentication using Face and Fingerprint

An Overview of Biometric Image Processing

Finger Print Enhancement Using Minutiae Based Algorithm

Biometrics Our Past, Present, and Future Identity

Access Control Biometrics User Guide

BIOMETRIC IDENTIFICATION OF PERSONS A SOLUTION FOR TIME & ATTENDANCE PROBLEMS

BIOMETRIC BANKING TECHNOLOGY TO SECURE ONLINE TRANSACTIONS WITH FEASIBLE BIOMETRIC DEVICES

Gurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3

Keystroke Dynamics: Low Impact Biometric Verification

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP ( 1

CIS 4360 Secure Computer Systems Biometrics (Something You Are)

The Design of Fingerprint Biometric Authentication on Smart Card for

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 5, Oct-Nov, 2013 ISSN:

A Review of Emerging Biometric Authentication Technologies

CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018

Multimodal Biometric System in Secure e- Transaction in Smart Phone

POLYBIO Multibiometrics Database: Contents, description and interfacing platform

Biometrics Security Concerns

Smart Card and Biometrics Used for Secured Personal Identification System Development

Biometric Security Roles & Resources

Iris Recognition: The Safest Biometrics

Highly Secure Authentication Scheme: A Review

Performance Analysis of Fingerprint Identification Using Different Levels of DTCWT

BIOMETRIC TECHNOLOGY: A REVIEW

Biometrics: The Password You ll Never Forget

International Journal of Advanced Research in Computer Science and Software Engineering

BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition

Information Security Identification and authentication. Advanced User Authentication II

International Journal of Advanced Research in Computer Science and Software Engineering

Touchless Fingerprint recognition using MATLAB

A Multibiometric Recognition System : Categorization, Retrieval Techniques & Applications

Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint

The US Contact Center Decision-Makers Guide Contact Center Performance. sponsored by

Identification, authentication, authorisation. Identification and authentication. Authentication. Authentication. Three closely related concepts:

Ujma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India. IJRASET: All Rights are Reserved

Online and Offline Fingerprint Template Update Using Minutiae: An Experimental Comparison

Palmprint Recognition Using Transform Domain and Spatial Domain Techniques

A Survey on Security in Palmprint Recognition: A Biometric Trait

Authentication Methods

AUTHENTICATION IN THE AGE OF ELECTRONIC TRANSACTIONS

Computer Security. 10. Biometric authentication. Paul Krzyzanowski. Rutgers University. Spring 2018

Computer Security 4/15/18

Biometric Cryptosystems vs Traditional Cryptosystems

Stuart Hall ICTN /10/17 Advantages and Drawbacks to Using Biometric Authentication

Fingerprint Verification System using Minutiae Extraction Technique

Role of Biometrics in Cybersecurity. Sam Youness

: BIOMETRIC AUTHENTICATION TOOL FOR USER IDENTIFICATION

Biometrics Hybrid System Based Verification

An introduction on several biometric modalities. Yuning Xu

International Journal of Emerging Technology & Research

Defenses against Large Scale Online Password Guessing by Using Persuasive Cued Click Points

BIOMETRIC MECHANISM FOR ONLINE TRANSACTION ON ANDROID SYSTEM ENHANCED SECURITY OF. Anshita Agrawal

A Novel Approach to Improve the Biometric Security using Liveness Detection

FINGERPRINT BIOMETRICS

SECURE ENTRY SYSTEM USING MOVE ON APPS IN MOBILITY

Identification or Verification? Advanced Identification Technology

FINGERPRINT RECOGNITION FOR HIGH SECURITY SYSTEMS AUTHENTICATION

Unit-VI. User Authentication Mechanisms.

CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM

Evaluating Alternatives to Passwords

Implementation and Comparative Analysis of Rotation Invariance Techniques in Fingerprint Recognition

Hybrid Biometric Person Authentication Using Face and Voice Features

DEFORMABLE MATCHING OF HAND SHAPES FOR USER VERIFICATION. Ani1 K. Jain and Nicolae Duta

CHAPTER 2 DIGITAL IMAGE PROCESSING AND BIOMETRICS BASED HUMAN IDENTIFICATION SYSTEMS

An Efficient on-line Signature Verification System Using Histogram Features

PCA AND CENSUS TRANSFORM BASED FINGERPRINT RECOGNITION WITH HIGH ACCEPTANCE RATIO

Peg-Free Hand Geometry Verification System

Exploring Similarity Measures for Biometric Databases

Authentication: Beyond Passwords

Personal Authentication Using Palm Print Features

Fingerprint Authentication for SIS-based Healthcare Systems

USING MATLAB BASED SIMULATION IN ORDER TO IMPLEMENT BIOMETRIC SECRUTIY PALM PRINT RECOGNITION

Tutorial 1. Jun Xu, Teaching Asistant January 26, COMP4134 Biometrics Authentication

In this unit we are continuing our discussion of IT security measures.

International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research)

ALGORITHM FOR BIOMETRIC DETECTION APPLICATION TO IRIS

REINFORCED FINGERPRINT MATCHING METHOD FOR AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM

AN EFFICIENT METHOD FOR FINGERPRINT RECOGNITION FOR NOISY IMAGES

Encryption of Text Using Fingerprints

Fingerprint Image Enhancement Algorithm and Performance Evaluation

An approach for Fingerprint Recognition based on Minutia Points

Implementation of Easy Fingerprint Image Authentication with Traditional Euclidean and Singular Value Decomposition Algorithms

Outline. Incorporating Biometric Quality In Multi-Biometrics FUSION. Results. Motivation. Image Quality: The FVC Experience

Chapter 3: User Authentication

Keywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization.

Minutiae Based Fingerprint Authentication System

SECURE INTERNET VERIFICATION BASED ON IMAGE PROCESSING SEGMENTATION

Authentication Technologies

Biometrics- Fingerprint Recognition

Feature Level Fusion of Multibiometric Cryptosystem in Distributed System

A quick guide to iris recognition. Click on blue squares to navigate

Analysis of a Hand Geometry-Based Verification System

Keywords Palmprint recognition, patterns, features

Biometrics. Overview of Authentication

Reducing FMR of Fingerprint Verification by Using the Partial Band of Similarity

Vision-Based Technologies for Security in Logistics. Alberto Isasi

Biometric Security Technique: A Review

International Journal of Informative & Futuristic Research ISSN:

Transcription:

Biometric Cryptosystems: for User Authentication Shobha. D Assistant Professor, Department of Studies in Computer Science, Pooja Bhagavat Memorial Mahajana Post Graduate Centre, K.R.S. Road, Metagalli, Mysuru, Karnataka, India ABSTRACT: Biometric recognition refers to an automatic recognition of individuals based on a feature vector(s) derived from their physiological and/or behavioral characteristic. There are number of emerging developments that are important to the continued commercial growth of the biometrics industry. Biometrics offers greater security and convenience than traditional methods of personal recognition. Person could be identified based on who she/he is" rather than "what she/he has" (card, token, key) or "what she/he knows" (password, PIN). In this paper, a brief overview of biometric methods will be presented. KEYWORDS: Biometrics, Recognition, Verification, Identification, Security, authentication. I. INTRODUCTION Representations of identity such as passwords and cards no longer suffice. Further, passwords and cards can be shared and thus cannot provide non-repudiation. In information technology, biometrics usually refers to technologies for measuring and analyzing human body characteristics such as fingerprints, eye retinas and irises, voice patterns, facial patterns, and hand measurements, especially for authentication purposes. (Biometrics, which refers to automatic recognition of people based on their distinctive anatomical e.g., face, fingerprint, iris, retina, hand geometry and behavioral e.g., signature, gait, characteristics, could become an essential component of effective person identification solutions because biometric identifiers cannot be shared or misplaced, and they intrinsically represent the individual's bodily identity.) A biometric is a physiological or behavioral characteristic of a human being that can distinguish one person from another and that theoretically can be used for identification or verification of identity. Since the beginning of civilization, identifying fellow human beings has been crucial to the fabric of human society. Consequently, person identification is an integral part of the infrastructure needed for diverse business sectors such as finance, health care, transportation, entertainment, law enforcement, security, access control, border control, government and communication. II. BIOMETRIC SYSTEMS A biometric system is essentially a pattern-recognition system that recognizes a person based on a feature vector derived from a specific physiological or behavioral characteristic that the person possesses [1]. Depending on the application context, a biometric Authentication Process typically operates in one of two modes: verification or identification through Acquisition, Creation of Master characteristics, Storage of Master characteristics, Acquisition(s), Comparison,Decision. That is the hardware captures the salient human characteristic, the software interprets the resulting data and determines acceptability. Copyright to IJIRCCE DOI: 10.15680/ijircce.2015.0305046 4322

In verification mode, the system validates a person s identity by comparing the captured biometric characteristic with the individual s biometric template, which is prestored in the system database. In such a system, an individual who desires to be recognized. In identification mode, the system recognizes an individual by searching the entire template database for a match. The system conducts a one-to-many comparison to establish an individual s identity (or fails if the subject is not enrolled in the system database). The question being answered is, Who is this person? Identification is a critical component of negative recognition applications, in which the system establishes whether the person is who she (implicitly or explicitly) denies being. III. BIOMETRIC AUTHENTICATION CAPABILITY Biometrics cannot be lost or forgotten... They are difficult for attackers to forge and for Users to repudiate. To attack a biometric-based system, however, the hacker must generate (or acquire) a large number of samples of the biometric (for example, fingerprints); this is more difficult than generating a large number of PINs or passwords. Finally, system administrators can arbitrarily reduce a biometric system s false match rate for higher security at the cost of the increased inconvenience to users resulting from a higher false nonmatch rate. A biometric scanning device takes a user's biometric data, such as an iris pattern or fingerprint scan, and converts it into digital information a computer can interpret and verify. Since it is more difficult for a malicious hacker to gain access to a person's biometric data.biometrics can be used for both physical access to corporate buildings and internal access to enterprise computers and systems. IV. COMMONLY USED BIOMETRICS DEVICES Retina scanning Iris scanning Fingerprint scanning Hand scanning Face recognition Voice recognition & DSV Signature recognition Copyright to IJIRCCE DOI: 10.15680/ijircce.2015.0305046 4323

Keystroke recognition Retina Scanning User Looks into a Viewer and Focuses on a Point; Infrared Light Scans Retina. Retinal recognition creates an "eye signature" from the vascular configuration of the retina which is supposed to be a characteristic of each individual and each eye, respectively. Since it is protected in an eye itself, and since it is not easy to change or replicate the retinal vasculature, this is one of the most secure biometric. Image acquisition requires a person to look through a lens at an alignment target; therefore it implies cooperation of the subject. Iris Scanning User looks at a camera (distance from camera increasing rapidly to 2-3 feet), Its complex pattern can contain many distinctive features such as arching ligaments, furrows, ridges, crypts, rings, corona, freckles and a zigzag collarette [4]. Iris is colored and visible from far,no touch required, overcomes retinal scanner issues,contact lenses an issue? Iris and retinal scans are considered to be a more secure form of biometric authentication, since copying a person's retinal pattern is a much more difficult task than copying a fingerprint. Finger Scanning Fingerprint scanners are one of the oldest forms of biometrics and have been largely reliable when it comes to authentication. These systems are easy to use, which makes them favorable among users. It is widely known that the fingerprint is unique, and invariant with aging, which implies that user authentication, can be relied on the comparing two fingerprints [2]. A fingerprint is a pattern of ridges and furrows located on the tip of each finger. Fingerprints were used for personal identification for many centuries and the matching accuracy was very high [3]. In real-time verification systems, images acquired by sensors are used by the feature extraction module to compute the feature values. The feature values typically correspond to the position and orientation of certain critical points known as minutiae points [4]. The matching process involves comparing the two-dimensional minutiae patterns extracted from the user's print with those in the template. Hand Scanning The essence of hand geometry is the comparative dimensions of fingers and the location of joints, shape and size of palm. The technique is very simple, relatively easy to use and inexpensive. Geometry of users hands, more reliable than fingerprinting, Balance in performance and usability, it need Very large scanners. Facial Recognition Face verification involves extracting a feature set from a two-dimensional image of the user's face and matching it with the template stored in a database. The most popular approaches to face recognition are based on either: 1) the location shape of facial attributes such as eyes, eyebrows, nose, lips and chin, and their spatial relationships, or 2) the overall (global) analysis of the face image that represents a face as a weighted combination of a number of canonical faces [2]. Performance of commercially available systems is reasonable there is still significant room for improvement since false reject rate (FRR) is about 10% and false accept rate (FAR) is 1% [5]. Voice Recognition & DSV The features of an individual's voice are based on physical characteristics such as vocal tracts, mouth, nasal cavities and lips that are used in creating a sound. These characteristics of human speech are invariant for an individual, but the behavioral part changes over time due to age, medical conditions and emotional state. User speaks into a microphone or other device, such as a telephone handset. Voice recognition distinguishes an individual by matching particular voice traits against templates stored in a database. Voice systems must be trained to the individual's voice at enrollment time, and more than one enrollment session is often necessary. Signature Recognition User signs name on a device Signature is a simple, concrete expression of the unique variations in human hand geometry. The way a person signs his or her name is known to be characteristic of that individual. Collecting samples for this biometric includes subject cooperation and requires the writing instrument. Copyright to IJIRCCE DOI: 10.15680/ijircce.2015.0305046 4324

Keystroke Recognition User types standard sample on keyboard, Keystroke dynamics is a behavioral biometric; for some individuals, one could expect to observe large variations in typical typing patterns. Advantage of this method is that keystrokes of a person using a system could be monitored unobtrusively as that person is keying information Comparison of several biometric technologies (assessments based on authors perceptions). Comparison of several biometric technologies (assessments based on authors perceptions). Technique Retina Iris Fingerprint Hand/Finger Geometry Face Recognition Voice Recognition Signature Recognition Keystroke Recognition Strengths Highly accurate Highly accurate ; Works with eyeglasses; more acceptable to users than retina scan Mature technology; highly accurate; low cost; small size, becoming widely acceptable. Accurate and flexible; widely acceptable to users Widely acceptable to users; low cost; no direct contact; passive monitoring possible Usable over existing telephone system; good for remote access and monitoring; Widely acceptable to users Widely acceptable to users; low cost; uses existing hardware V.CONCLUSION Any system assuring reliable person recognition must necessarily involve a biometric component. Because of the unique person identification potential provided by biometrics, they have and will continue to provide useful value by deterring crime, identifying criminals, and eliminating fraud. The identification of new uses for biometric devices given the potential for very low cost over the longer term. Biometrics is one of the important and more interesting pattern recognition applications with its associated unique legal, political and business Challenges. An emerging technology such a biometrics is typically confronted with unrealistic performance expectations and not fairly compared with existing alternatives (e.g., passwords) that we have resigned to tolerate. A successful biometric solution does not have to be 100% accurate or secure. A particular application demands a satisfactory performance justifying the additional investments needed for the biometric system; the system designer can exploit the application context to engineer the system to achieve the target performance levels. Copyright to IJIRCCE DOI: 10.15680/ijircce.2015.0305046 4325

In this work, we have explored the fundamental roadblocks for widespread adoption of biometrics as a means of automatic person identification. REFERENCES [1] S. Prabhakar, S. Pankanti, A. K. Jain, "Biometric Recognition: Security and Privacy Concerns", IEEE Security & Privacy, March/April 2003, pp. 33-42 [2] Jain, L.C., Halici, U., Hayashi, I., Lee, S.B., Tsutsui, S.: Intelligent Biometric Techniques in Fingerprint and Face Recognition, CRC Press LLC, (1999) [3] D. Maio, D. Maltoni, R. Cappelli, J. L. Wayman, A. K. Jain, "FVC2002: Fingerprint verification competition" in Proc. Int. Conf. Pattern Recognition (ICPR), Quebec City,QC, Canada, August 2002, pp. 744-747 [4] J. Daugman, "How Iris Recognition Works", IEEE Trans. on Circuits and Systems for Video Technology, Vol. 14, No. 1, pp. 21-30, January 2004 [5] P. J. Philips, P. Grother, R. J. Micheals, D. M. Blackburn, E. Tabassi, J. M. Bone, "FRVT2002: Overview and Summary," available at: http://www.frvt.org/frvt2002/documents.htm. [6] L. O Gorman, "Comparing passwords, tokens, and biometrics for user authentication", Proceedings of the IEEE, Vol. 91, No. 12, Dec. 2003, pp. 2019-40. [7] S. Pankanti, S. Prabhakar, and A. K. Jain, "On the Individuality of Fingerprints", IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 24, No. 8, pp. 1010-1025, August 2002. [8] U. Uludag, S. Pankanti, S. Prabhakar, and A. K. Jain, "Biometric Cryptosystems: Issues and Challenges", Proceedings of the IEEE, Special Issue on Enabling Security Technologies for Digital Rights Management, Vol. 92, No. 6, June 2004. Copyright to IJIRCCE DOI: 10.15680/ijircce.2015.0305046 4326