A bio-cryptographic system based on offline signature images

نویسندگان

  • George S. Eskander
  • Robert Sabourin
  • Eric Granger
چکیده

In bio-cryptography, biometric traits are replacing traditional passwords for secure exchange of cryptographic keys. The Fuzzy Vault (FV) scheme has been successfully employed to design bio-cryptographic systems as it can absorb a wide range of variation in biometric traits. Despite the intensity of research on FV based on physiological traits like fingerprints, iris, and face, there is no conclusive research on behavioral traits such as off-line handwritten signature images, that have high inter-personal similarity and intra-personal variability. In this paper, a FV system based on the offline signature images is proposed. A two-step boosting feature selection (BFS) technique is proposed for selecting a compact and discriminant user-specific feature representation from a large number of feature extractions. The first step seeks dimensionality reduction through learning a population based representation, that discriminates between different users in the population. The second step filters this representation to produce a compact user-based representation that discriminates the specific user from the population. This last representation is used to generate the FV locking/unlocking points. Representation variability is modeled by employing the BFS in a dissimilarity representation space, and it is considered for matching the unlocking and locking points during FV decoding. Proof of concept simulations involving 72,000 signature matchings (corresponding to both genuine and forged query signatures from the Brazilian Signature Database) have shown FV recognition accuracy of about 97% and system entropy of about 45-bits. The concept of bio-cryptography for enhanced security exploits the benefits of biometrics and cryptography in a single construction, while alleviating their vulnerabilities. Biometric systems authenticate users based on their physiological traits like fingerprints, iris, and face, or behavioral traits like voice, gait, and handwritings [17]. Although they guarantee user authenticity, biometric systems are vulnerable to a wide range of attacks such as: vulnerability of biometrics databases, irrevocability of compromised traits and overriding the classifier decision [40]. On the other hand, cryptographic schemes like encryption and digital signature facilitate confidentiality and integrity of information, but they do not guarantee user authenticity. Known as the key management problem, cryptography keys are vulnerable to theft when secured by weak passwords or when stored as plain tokens [24]. Bio-cryptography has been mainly introduced to alleviate the key management problem in cryptography by using bio-metric traits to secure the private keys [39]. However, it can also be considered as a counter measure against aforementioned attacks on biometric systems. Bio-cryptographic systems provide template protection as no explicit …

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Use of the Shearlet Transform and Transfer Learning in Offline Handwritten Signature Verification and Recognition

Despite the growing growth of technology, handwritten signature has been selected as the first option between biometrics by users. In this paper, a new methodology for offline handwritten signature verification and recognition based on the Shearlet transform and transfer learning is proposed. Since, a large percentage of handwritten signatures are composed of curves and the performance of a sig...

متن کامل

Offline Signature-Based Fuzzy Vault (OSFV: Review and New Results

An offline signature-based fuzzy vault (OSFV) is a bio-cryptographic implementation that uses handwritten signature images as biometrics instead of traditional passwords to secure private cryptographic keys. Having a reliable OSFV implementation is the first step towards automating financial and legal authentication processes, as it provides greater security of confidential documents by means o...

متن کامل

A Dissimilarity-Based Approach for Biometric Fuzzy Vaults-Application to Handwritten Signature Images

Bio-Cryptographic systems enforce authenticity of cryptographic applications like data encryption and digital signatures. Instead of simple user passwords, biometrics, such as, fingerprint and handwritten signatures, are employed to access the cryptographic secret keys. The Fuzzy Vault scheme (FV) is massively employed to produce bio-cryptographic systems, as it absorbs variability in biometric...

متن کامل

On the Dissimilarity Representation and Prototype Selection for Signature-Based Bio-cryptographic Systems

Robust bio-cryptographic schemes employ encoding methods where a short message is extracted from biometric samples to encode cryptographic keys. This approach implies design limitations: 1) the encoding message should be concise and discriminative, and 2) a dissimilarity threshold must provide a good compromise between false rejection and acceptance rates. In this paper, the dissimilarity repre...

متن کامل

Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines

Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Inf. Sci.

دوره 259  شماره 

صفحات  -

تاریخ انتشار 2014