Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
1 / 18
Outline
2 / 18
Introduction
In today’s digitized World fingerprints, iris, face and other biological
features have been widely used for authentication purposes.
But if a biometric trait is compromised, it is rendered worthless.
Biometrics is permanently associated with an individual and cannot
be replaced even if compromised.
1 2
Figure: Fake finger prints (source )
1
https://www.hindustantimes.com/mumbai-news/
you-will-be-glued-to-this-mumbai-college-s-students-trick-biometric-system
story-W64f1jdMtecxKDml2DakeI.html
2
https://www.jagran.com/uttar-pradesh/
chandauli-fake-thumb-for-biometric-attendance-18516208.html
3 / 18
Biometric verification system
4 / 18
Cont...
5 / 18
Possible solutions for preventing database template attack
6 / 18
Key requirements of template protection scheme
Non-invertibility
Revocability
Diversity
Performance
7 / 18
Encryption systems
8 / 18
Biometric Cryptosystem
The biometric cryptosystem encrypts the biometric data to store it. Then,
during authentication, the stored template is decrypted for comparison.
11 / 18
Literature review
Some of the proposed techniques in literature:
Salting methods3 : biometric template is mixed with a totally
artificial pattern to generate a distorted version of the biometric
template. Two main techniques are:
1 GRAY-SALT
2 BIN-SALT
Random permutations: features obtained from the biometric
template are randomly permutated. Two main techniques are:
1 GRAY-COMBO
2 BIN-COMBO
3
J. Zuo, N. K. Ratha, and J. H. Connell, Cancelable iris biometric, in 19th
International Conference on Pattern Recognition (ICPR 2008)
12 / 18
Literature review
ri ∈ R m |i = 1, − − −, n (1)
r⊥i ∈ R m |i = 1, − − −, n (2)
4
A. T. B. Jin et al. Biohashing: two factor authentication featuring fingerprint data
and tokenised random number, Pattern Recognition, vol. 37,no. 11, pp. 2245-2255,
2004
13 / 18
Literature review
Step 3: To project the n dimensional feature vector fi —fn of any
biometric trait computed using any approach on orthonormal basis
computed in Step 2 by calculating the inner product as:
r11 .......... r1m
....... ......... ......
...... ......... ....... = [B1 ....Bm ]
[f1 ......fn ] (3)
r1n ....... rnm
back
14 / 18
Advantages of cancelable biometrics
15 / 18
Limitations and challenges in cancelable biometrics
16 / 18
Cont..
17 / 18