Technical Report: Multibiometric Cryptosystems
نویسندگان
چکیده
Multibiometric systems are being increasingly deployed in many large scale biometric applications (e.g., FBIIAFIS, UIDAI system in India) because they have several advantages such as lower error rates and larger population coverage compared to unibiometric systems. However, multibiometric systems require storage of multiple biometric templates (e.g., fingerprint, iris, and face) for each user, which results in increased risk to user privacy and system security. One method to protect individual templates is to store only the secure sketch generated from the corresponding template using a biometric cryptosystem. This requires storage of multiple sketches. In this paper, we propose a feature level fusion framework to simultaneously protect multiple templates of a user as a single secure sketch. To make this framework practical, we propose algorithms for (i) embedding different biometric feature representations (e.g. set of points, binary strings, or real-valued vectors) into a common representation, (ii) encoding and decoding multibiometric secure sketches using two well-known biometric cryptosystems, namely, fuzzy vault and fuzzy commitment, and (iii) introducing constraints, such as minimum matching performance requirement for a specific biometric trait. We also analyze the trade-off between matching accuracy and security of the proposed multibiometric cryptosystems through the GARSecurity (G-S) curves, which plot the genuine accept rate of the system against the minimum computational complexity involved in decoding a secure sketch without the genuine user’s biometric data. The proposed framework has been evaluated on two different databases, one real and one virtual multimodal database, each containing the three most popular biometric modalities, namely, fingerprint, iris, and face. Experimental results show that both the multibiometric cryptosystems proposed here have higher security and matching performance compared to their unibiometric counterparts.
منابع مشابه
Level Fusion of Multibiometric Cryptosystem in Distributed System
Multibiometrics is the combination of one or more biometrics (e.g., Fingerprint, Iris, and Face). Researchers are focusing on how to provide security to the system, the template which was generated from the biometric need to be protected. The problems of unimodal biometrics are solved by multibiometrics. The main objective is to provide a security to the biometric template by generating a secur...
متن کاملEfficient elliptic curve cryptosystems
Elliptic curve cryptosystems (ECC) are new generations of public key cryptosystems that have a smaller key size for the same level of security. The exponentiation on elliptic curve is the most important operation in ECC, so when the ECC is put into practice, the major problem is how to enhance the speed of the exponentiation. It is thus of great interest to develop algorithms for exponentiation...
متن کاملOptimal sequential fusion for multibiometric cryptosystems
Biometric cryptosystems have been widely studied in the literature to protect biometric templates. To ensure sufficient security of the biometric cryptosystem against the offline brute-force attack (also called the FAR attack), it is critical to reduce FAR of the system. One of the most effective approaches to improve the accuracy is multibiometric fusion, which can be divided into three catego...
متن کاملAttacks and Countermeasures in Fingerprint Based Biometric Cryptosystems
We investigate implementations of biometric cryptosystems protecting fingerprint templates (which are mostly based on the fuzzy vault scheme by Juels and Sudan in 2002) with respect to the security they provide. We show that attacks taking advantage of the system’s false acceptance rate, i.e. false-accept attacks, pose a very serious risk — even if brute-force attacks are impractical to perform...
متن کاملA Review of Multibiometric System with Fusion Strategies and Weighting Factor
Biometric is a technology for verification or identification of individuals by employing a person’s physiological and behavioural traits. Although these systems are more secured compared the traditional methods such as key, smart card or password, they also undergo with many limitations such as noise in sensed data, intra-class variations and spoof attacks. One of the solutions to these problem...
متن کامل