Biometric Keys for the Encryption of Multimodal Signatures
نویسندگان
چکیده
Biometrics have long been used as means to recognize people, mainly in terms of their physiological characteristics, for various commercial applications ranging from surveillance and access control against potential impostors to smart interfaces (Qazi (2004)) (Xiao (2005)). These systems require reliable personal recognition schemes to either confirm or determine the identity of an individual requesting their services. The biometric methods, that are usually incorporated in such systems, can be categorized to physiological and behavioral (Jain et al. (2004)), depending on the type of used features. The most popular physiological biometric traits are the fingerprint (Maltoni et al. (2009)) that is widely used in law enforcement for identifying criminals, the face (Chang et al. (2005)) and the iris (Sun & Tan (2009)). However, despite their high recognition performance, static biometrics have been recently overwhelmed by the new generation of biometrics, which tend to cast light on more natural ways for recognizing people by analyzing behavioural traits. Specifically, behavioural biometrics are related to specific actions and the way that each person executes them. In other words, they aim at recognizing livingness, as it is expressed by dynamic traits. The most indicative cases of behavioural biometric recognition is gait (Goffredo et al. (2009b)), facial expressions (Liu & Chen (2003)) or other activity related, habitual traits (Drosou, Ioannidis, Moustakas & Tzovaras (2010)). As a result behavioural biometrics have become much more attractive to researchers due to their significant recognition potential and their unobtrusive nature. They can potentially allow the continuous (on-the-move) authentication or even identification unobtrusively to the subject and become part of an Ambient Intelligence (AmI) environment. The inferior performance of behavioural biometrics, when compared to the classic physiological ones, can be compensated when they are combined in a multimodal biometric system. In general, multimodal systems are considered to provide an excellent solution to a series of recognition problems. Unimodal systems are more vulnerable to theft attempts, since an attacker can easily gain access by stealing or bypassing a single biometric feature. In the same concept, they have to contend with a variety of problems, such as noisy data, intraclass variations, restricted degrees of freedom, non-universality, spoof attacks, and unacceptable error rates, i.e., it is estimated that approximately 3% of the population does not have legible 8
منابع مشابه
A Biometric Identity Based Signature Scheme
We describe an identity based signature scheme that uses biometric information to construct the public key. Such a scheme would be beneficial in a legal dispute over whether a contract had been signed or not by a user. A biometric reading provided by the alleged signer would be enough to verify the signature. We make use of Fuzzy extractors [7] to generate a key string from a biometric measurem...
متن کاملGenerate an Encryption Key by using Biometric Cryptosystems to secure transferring of Data over a Network
Our modern day era faces an inevitable problem of securing our most integrated data and messages. The chief problem is to protect our data in a unique way that could only be worked upon by the sender and the recipient. Most of the traditional techniques probably in-use today, emphasizes on keys that are generated by generic function, algorithms or in random key generators. But question remains ...
متن کاملA collusion attack on the fuzzy vault scheme
The Fuzzy Vault scheme is an encryption scheme, which can tolerate errors in the keys. This leads to the possibility of enhancing the security in environments where these errors can be common, such as biometrics storage systems. Although several researchers have provided implementations, we find that the scheme is vulnerable to attacks when not properly used. This paper describes an attack on t...
متن کاملRank-Level Fusion of Multimodal Biometric Cryptosystems
In this paper we present an effective scheme that preserves the biometric templates more secured. We present a new algorithm called Enhanced Blind Encryption Algorithm for securing biometric templates between client and server and using that for authentication. There are four phases involved in this process namely, enrollment, identification, matching and fusion. During enrollment, biometric tr...
متن کاملA Dissimilarity-Based Approach for Biometric Fuzzy Vaults-Application to Handwritten Signature Images
Bio-Cryptographic systems enforce authenticity of cryptographic applications like data encryption and digital signatures. Instead of simple user passwords, biometrics, such as, fingerprint and handwritten signatures, are employed to access the cryptographic secret keys. The Fuzzy Vault scheme (FV) is massively employed to produce bio-cryptographic systems, as it absorbs variability in biometric...
متن کامل