Block Coding Schemes Designed for Biometric Authentication
نویسندگان
چکیده
We address the biometric authentication setup where the outcomes of biometric observations received at the verification stage are compared with the sample data formed at the enrollment stage. The result of comparison is either the acceptance or the rejection of the identity claim. The acceptance decision corresponds to the case when the analyzed values belong to the same person. A possible solution to the problem, called the direct authentication, is implemented when the outcomes of biometric observations at the enrollment stage are stored in the database, and they are available to the verifier. The possible incorrect verifier’s decisions are caused by the fact that these observations are noisy. The probabilities of errors are called the false rejection and the false acceptance rates. The features of the direct authentication are as follows: 1) data compression is not included at the enrollment stage; 2) the scheme does not require an additional external randomness; 3) if the stored data become available to an attacker, then he knows the outcomes of biometric observations of the person and can pass through the verification stage with the acceptance decision by presenting these data to the verifier. The considered below coding approaches to the problem require an external randomness and relax the constraint that the database has to be protected against reading. These approaches include the additive and the permutation coding schemes. Both the direct authentication and an additive coding scheme are illustrated using a proposed mathematical model for the DNA measurements. We present the model and describe a data compression method that can be used to approach a uniform probability distribution over the obtained data for their further use in the additive scheme and other purposes. The processing of the DNA data also serves as an example of possible processing data generated by an arbitrary memoryless source. The additive block coding scheme can be viewed as a variant of stream ciphering scheme where the data, to be hidden, are added to a key. The subtraction of the noisy version of the data creates a corrupted version of the key. If the key is a codeword of a code having certain error–correcting property, then the fact, whether the key can be reconstructed or not, 15
منابع مشابه
Biometric cryptosystems: authentication, encryption and signature for biometric identities
Zusammenfassung) Biometrics have been used for secure identification and authentication for more than two decades since biometric data is unique, non-transferable, unforgettable, and always with us. Recently, biometrics has pervaded other aspects of security applications that can be listed under the topic of “Biometric Cryptosystems”. Although the security of some of these systems is questionab...
متن کاملPerformance Assessment of Color Spaces in Multimodal Biometric Identification with Iris and Palmprint using Thepade‟s Sorted Ternary Block Truncation Coding
Biometrics refers to the automatic identification of an individual based on his/her physiological and behavioral traits. Multimodal person authentication system is more effective and more challenging. The fusion of multiple biometric traits helps to minimize the system error rate. Here Iris and Palmprint fusion at Matching Score level is performed. The feature extraction in spatial domain using...
متن کاملBiometric Authentication of Fingerprint for Banking Users, Using Stream Cipher Algorithm
Providing banking services, especially online banking and electronic payment systems, has always been associated with high concerns about security risks. In this paper, customer authentication for their transactions in electronic banking has been discussed, and a more appropriate way of using biometric fingerprint data, as well as encrypting those data in a different way, has been suggest...
متن کاملBehavioCog: An Observation Resistant Authentication Scheme
We propose that by integrating behavioural biometric gestures—such as drawing figures on a touch screen— with challenge-response based cognitive authentication schemes, we can benefit from the properties of both. On the one hand, we can improve the usability of existing cognitive schemes by significantly reducing the number of challenge-response rounds by (partially) relying on the hardness of ...
متن کاملA Biometric Approach for Continuous User Authentication by Fusing Hard and Soft Traits
Most existing computer and network systems authenticate a user only at the initial login session. This could be a critical security weakness, especially for high-security systems because it enables an impostor to access the system resources with the initial access permission. To address this security flaw, Continuous authentication of the user is necessary, to continuously monitors and authenti...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012