Secure Biometrics Via Syndromes
نویسندگان
چکیده
We consider the secure biometric storage problem and develop a solution using syndrome codes. Specifically, biometrics such as fingerprints, irises, and faces are often used for authentication, access control, and encryption instead of passwords. While it is well known that passwords should never be stored in the clear, current systems often store biometrics in the clear and are easily compromised. We describe the secure biometric storage problem by discussing the insecurities in current systems, the reasons why password hashing/encryption algorithms are unsuitable for biometrics, and propose a secure biometric storage framework based on syndrome codes and the Slepian-Wolf theorem. 43rd Annual Allerton Conference on Communications, Control, and Computing This work may not be copied or reproduced in whole or in part for any commercial purpose. Permission to copy in whole or in part without payment of fee is granted for nonprofit educational and research purposes provided that all such whole or partial copies include the following: a notice that such copying is by permission of Mitsubishi Electric Research Laboratories, Inc.; an acknowledgment of the authors and individual contributions to the work; and all applicable portions of the copyright notice. Copying, reproduction, or republishing for any other purpose shall require a license with payment of fee to Mitsubishi Electric Research Laboratories, Inc. All rights reserved. Copyright c ©Mitsubishi Electric Research Laboratories, Inc., 2005 201 Broadway, Cambridge, Massachusetts 02139
منابع مشابه
Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...
متن کاملTwo-Factor Web Authentication Via Voice
The increasing pressure for network accessible information and business applications demands secure, interoperable, cost efficient and user self-service authentication procedures. This paper describes the authors' work on 2-factor authentication for Web applications encompassing speech biometrics, and its relevance to security and cost effectiveness.
متن کاملFeeling Is Believing: A Secure Template Exchange Protocol
We use grip pattern based biometrics as a secure side channel to achieve pre-authentication in a protocol that sets up a secure channel between two hand held devices. The protocol efficiently calculates a shared secret key from biometric data. The protocol is used in an application where grip pattern based biometrics is used to control access to police hand guns.
متن کاملSmart Cards: Remote Authentication using Biometrics
This paper presents an architecture for a secure and reliable remote authentication system, based on local biometric signature validation. Biometric systems are a more secure and reliable authentication mechanism than those that use PIN and passwords. This authentication is based on something that is unique to each person and cannot be lost or borrowed, ensuring the presence of the specific per...
متن کاملOn Enabling Secure Applications Through Off-Line Biometric Identification
In developing secure applications and systems, the designers often must incorpomte secure user identifi cation in the design specification. In this paper, we study secure off-line authenticated user identification schemes based on a biometric system that can measure a user's biometric accumtely (up to some Hamming distance). The schemes presented here enhance iden tification and authorization...
متن کامل