Leveraging Reliable Bits: ECC Design Consideration For Practical Secure Biometric Systems

نویسندگان

  • Yige Wang
  • Shantanu Rane
  • Anthony Vetro
چکیده

It is well-known that a biometric fuzzy vault can be constructed by applying an error correcting code (ECC) to a biometric signal. This is attractive because authentication only requires the check bits of the ECC to be stored on the access control device, whereas the personal biometric traits need not be stored. For a given coding rate, the ECC attempts to correct the errors between an enrollment biometric and the provided probe, and authenticates if it is successful in doing so. Unfortunately, most implementations of biometric fuzzy vaults have very poor robustness to the inherent noisiness of biometric measurements. In this paper, we provide ECC design considerations for secure biometric systems, which provide both better robustness and greater security. In particular, for any feature extraction algorithm, we propose to reorder the feature bits according to their reliability, and associate the reliable bits with high-degree variable nodes in the graph of the ECC. Further, the reliability of a bit is measured at enrollment and used to initialize the ECC decoding. Experiments on an extensive database show considerable reduction in the false reject rate, while restricting the successful attack rate to a very low value. IEEE Workshop on Information Forensics and Security This work may not be copied or reproduced in whole or in part for any commercial purpose. Permission to copy in whole or in part without payment of fee is granted for nonprofit educational and research purposes provided that all such whole or partial copies include the following: a notice that such copying is by permission of Mitsubishi Electric Research Laboratories, Inc.; an acknowledgment of the authors and individual contributions to the work; and all applicable portions of the copyright notice. Copying, reproduction, or republishing for any other purpose shall require a license with payment of fee to Mitsubishi Electric Research Laboratories, Inc. All rights reserved. Copyright c ©Mitsubishi Electric Research Laboratories, Inc., 2009 201 Broadway, Cambridge, Massachusetts 02139

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Reliable, Secure, Efficient Physical Unclonable Functions

A Physical Unclonable Function (PUF) is a die specific random function that can be used in a number of secure IC applications including die identification/authentication and key generation. At the core of a silicon PUF is a circuit (the PUF core) that generates random bits. These bits are like a silicon biometric, unique across dies, but can be reliably reproduced multiple times on a die across...

متن کامل

Face Recognition and Template Protection with Shielding Function

Biometric authentication is the use of unique human features to provide a secure, reliable and convenient access to an environment or a computer system. However, there are numerous security and privacy concerns associated with the use of biometrics as a means of authentication. Unprotected biometric data can be used by an impostor to impersonate legitimate uses, to violate their privacy and ste...

متن کامل

Smart Cards: Remote Authentication using Biometrics

This paper presents an architecture for a secure and reliable remote authentication system, based on local biometric signature validation. Biometric systems are a more secure and reliable authentication mechanism than those that use PIN and passwords. This authentication is based on something that is unique to each person and cannot be lost or borrowed, ensuring the presence of the specific per...

متن کامل

Biometric Quantization through Detection Rate Optimized Bit Allocation

Extracting binary strings from real-valued biometric templates is a fundamental step in many biometric template protection systems, such as fuzzy commitment, fuzzy extractor, secure sketch, and helper data systems. Previous work has been focusing on the design of optimal quantization and coding for each single feature component, yet the binary string—concatenation of all coded feature component...

متن کامل

Biometric Cryptosystem based Energy Attack Analysis

Biometric cryptosystem provides a seamless connection between the biometrics and traditional password, and it represents a new development in the next generation cryptography. Even if the biometric cryptosystem is secure in algorithmic design, it may still be vulnerable to side-channel attack due to the physical leakage. To assess the possible side-channel attack on biometric cryptosystem, a se...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009