Optimal sequential fusion for multibiometric cryptosystems
نویسندگان
چکیده
Biometric cryptosystems have been widely studied in the literature to protect biometric templates. To ensure sufficient security of the biometric cryptosystem against the offline brute-force attack (also called the FAR attack), it is critical to reduce FAR of the system. One of the most effective approaches to improve the accuracy is multibiometric fusion, which can be divided into three categories: feature level fusion, score level fusion, and decision level fusion. Among them, only feature level fusion can be applied to the biometric cryptosystem for security and accuracy reasons. Conventional feature level fusion schemes, however, require a user to input all of the enrolled biometric samples at each time of authentication, and make the system inconvenient. In this paper, we first propose a general framework for feature level sequential fusion, which combines biometric features and makes a decision each time a user inputs a biometric sample. We then propose a feature level sequential fusion algorithm that can minimize the average number of input, and prove its optimality theoretically. We apply the proposed scheme to the fuzzy commitment scheme, and demonstrate its effectiveness through experiments using the finger-vein dataset that contains 6 fingers from 505 subjects. We also analyze the security of the proposed scheme against various attacks: attacks that exploit the relationship between multiple protected templates, the soft-decoding attack, the statistical attack, and the decodability attack. ∗Corresponding author Email addresses: [email protected] (Takao Murakami), [email protected] (Tetsushi Ohki), [email protected] (Kenta Takahashi) Preprint submitted to Information Fusion January 21, 2016
منابع مشابه
Technical Report: Multibiometric Cryptosystems
Multibiometric systems are being increasingly deployed in many large scale biometric applications (e.g., FBIIAFIS, UIDAI system in India) because they have several advantages such as lower error rates and larger population coverage compared to unibiometric systems. However, multibiometric systems require storage of multiple biometric templates (e.g., fingerprint, iris, and face) for each user, ...
متن کاملInformation-Theoretic Performance Evaluation of Multibiometric Fusion under Modality Selection Attacks
The likelihood-ratio based score level fusion (LR-based fusion) scheme has attracted much attention, since it maximizes accuracy if a log-likelihood ratio (LLR) is accurately estimated. In reality, it can happen that a user cannot input some query samples due to temporary physical conditions such as injuries and illness. It can also happen that some modalities tend to cause false rejection (i.e...
متن کاملLevel Fusion of Multibiometric Cryptosystem in Distributed System
Multibiometrics is the combination of one or more biometrics (e.g., Fingerprint, Iris, and Face). Researchers are focusing on how to provide security to the system, the template which was generated from the biometric need to be protected. The problems of unimodal biometrics are solved by multibiometrics. The main objective is to provide a security to the biometric template by generating a secur...
متن کاملMultibiometric Systems: Fusion Strategies and Template Security
Multibiometric Systems: Fusion Strategies and Template Security By Karthik Nandakumar Multibiometric systems, which consolidate information from multiple biometric sources, are gaining popularity because they are able to overcome limitations such as non-universality, noisy sensor data, large intra-user variations and susceptibility to spoof attacks that are commonly encountered in unibiometric ...
متن کاملA Review of Multibiometric System with Fusion Strategies and Weighting Factor
Biometric is a technology for verification or identification of individuals by employing a person’s physiological and behavioural traits. Although these systems are more secured compared the traditional methods such as key, smart card or password, they also undergo with many limitations such as noise in sensed data, intra-class variations and spoof attacks. One of the solutions to these problem...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Information Fusion
دوره 32 شماره
صفحات -
تاریخ انتشار 2016