SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
Dilip Menariya, D. B. Ojha / International Journal of Engineering Research and Applications
                 (IJERA)              ISSN: 2248-9622         www.ijera.com
                     Vol. 2, Issue 5, September- October 2012, pp.328-332
         A vital application of security with biometric templates
                                Dilip Menariya1 and D. B. Ojha2
                                      1Department of Computer Science
                                    Mewar University Chittorgarh, Raj.India
                                        2Department of Mathematics
                                    Mewar University Chittorgarh, Raj.India


Abstract
            In this Paper, We will discuss high level     behavioral or physiological feature to identify one
of biometric templates security is critical issue in      person form other. Many application for biometric
personal base authentication system due to addition       system are available and all of them fall into two
of error in transmission channel. Therefore we            main functionality verification and identification
propose the framework of security of biometric            [5][6][7].
template, based on the concept of encryption with
secret key, based on braid group for unauthorized         A large number of errors in biometric templates are
user access, Fuzzy error correction code determine        encountered in day to day communication due to
and encounters error if any error is introduce during     environments change. Many approaches used to solve
the transmission between users to database server We      the noise problem which is one approach Fuzzy
store the biometric templates in encrypted form both      commitment scheme is one the scheme for solving
without the fusion of score level and decision level in   the noise problem in biometric templates of a
database server Stenography is related to hide            biometric recognition system, Jules and Wattenberg’s
biometric templates with help of secret key based on      Fuzzy Commitment Scheme[3]has been published to
braid groups.                                             handling difference occurring
Section 2 of this paper describe the state of Biometric   between two captured of biometric data, using error
System, and section 3 as our proposed method and          correcting code.
finally Section 4 the Conclusion
                                                          1.1 Related work
Keywords:                                                                 A handful of papers have been
    Cryptography, Fuzzy Commitment Scheme,                published so far in the area of key generation for
Biometric System Templates, Registration Phase,           biometric secure templates [3,4,10,12,13] Further
Verification Phase, Braid Groups                          more amount of work suggest biometric data
                                                          gathering one or more actual biometric analysis and
1.Introduction:                                           combine their results which increase the reliability of
              In Ancient times the people recognized      the biometric system[1][2]
each other by face, voice and their tongs movement.
Today’s scenario is different due to large increase in    2.Preliminaries
our population. As a byproduct of Biometric system
is activity in our day to day communication ,we need      2.1 Biometric System
more secure and authenticated communication. This         Biometric System measure and analyzes biological
requirement challenged us of think on biometric           data and provide capability of identifying person
facilitation[5].Large     number    of    government      based on Their intrinsic characteristics that can be
organizations, industry and non government                physical such hand shape, a fingerprint, facial
organizations to must attain security with accuracy       characteristics, voice, or DNA and proving that the
and error free Communication            .The various      aim is same that is registered in the biometric
properties exhibited by biometric system are              security system as a biometric template Basically
uniqueness collectability, performance, acceptability     Biometric–Based Personal authentication systems
and circumvention [3]                                     have five major components 1.Sensor, 2.Feature-
                                                          Extractor, 3.Template Database Server, 4.Matcher,
Various cryptography approaches are used for              5.Decesion Module. Sensor is the interface between
protection of biometric templates some are based on       users and Biometric System and its function is to
the hardware, some are software base, but common          scan biometric traits of the user. Feature extractor
encryption technique AES and RAS cannot be used,          module process the scan biometric traits to extract
because of large number of interclass variation in the    the silent feature set, in some case Feature. Extractor
biometric    templates [5][6][16].Personal base           is followed by quality assessment module for
authentication system use                                 checking the sufficient quality of scan biometric
                                                          traits In Biometric–Based Personal authentication
                                                          systems works in two steps


                                                                                                  328 | P a g e
Dilip Menariya, D. B. Ojha / International Journal of Engineering Research and Applications
                 (IJERA)              ISSN: 2248-9622         www.ijera.com
                     Vol. 2, Issue 5, September- October 2012, pp.328-332

Step1.Registered: In the first step the scan biometric
traits of user R are processed and then stored in the    Otherwise rejected strings remain uncrossed. The
database Server in Encrypted or secure form              defining relations are
Step2. Verification: In this step again new scan              i j = ji |i j |2,
biometric traits of user R ’is captured and processed        i j i = j i j For |i j |
its then process for Comparing it with already
Registered scan biometric traits as template and if      An n-braid has the following geometric
both R and R’ is matches then it is valid for            interpretation: It is a set of disjoint n-strands all of
Validation in biometric           system otherwise       which are attached to two horizontal bars at the top
Verification is invalid in biometric system Basically    and at the bottom such that each strands always
two types of errors are introduce In the Biometric–      heads downward as one walks along the strand from
Based Personal authentication systems[14]                the top to the bottom. In this geometric interpretation,
                                                         each generator i i represents the process of swapping
1. False Reject: Valid user (Probability of un           the ith strand with the next one (with ith strand going
matching of two traits R and R’ of same user)            under the (i+1)th one). Two braids are equivalent if
2. False Acceptance: Invalid User (Probability of
                                                         one can be deformed to the other continuously in the
matching of two traits R and R’ of same user)
                                                         set of braids. Bn is the set of all equivalence classes
                                                         of geometric n-braids with a natural group structure.
2.2 Error Correction Code                                The multiplication ab of two braids a and b is the
                                                         braid obtained by positioning a on the top of b. The
2.2.1 Definition: A Metric space is a set B with a       identity e is the braid consisting of n straight vertical
distance function dist B X B→B+= {0, ∞), which           strands and the inverse of a is the reflection of a with
obeys the usual properties (symmetric, triangle                                              1
                                                         respect to a horizontal line. So  can be obtained
inequalities, Zero distance between equal points)
                                                         from by switching the overstrand and under-
                                                                                             -
[13].
                                                         strand. ∆=(I, 2,……..n-1) (I, 2,……..n-2) (I, 2)
2.2.2 Definition : Let B(0,1)n be a code set which       (I)is called the fundamental braid. We describe
consists of a set code words bi of length n ,The         some mathematically hard problems in braid groups.
distance metric between any two code words b i and       We say that x and y are conjugate if there is an
bj in B is defined By                                    element a such that y = 1 . For m <n; Bm can
                                                                                     axa
                  𝑛
 dist ( bi , bj)= 𝑟=1 |𝑏 𝑖𝑟 − bjr | bi , bj ЄC          be considered as a subgroup of Bn generated by I,
This is known as Hamming Distance [13].                  2,……..m-1

2.2.2 Definition: An Error Correction Function f for
a code B Defined as                                      3. Proposed Scheme
F(bi)={bj/dist(bi ,bj) is the minimum, over B-{bi }}.            Here we propose biometric based
Here,     bj= f(bi) is called the nearest neighbor of    Authentication system using the concept of braid
bi[16].                                                  group based cryptosystem for security purpose and
                                                         fuzzy commitment schema for error correction. We
2.2.3 Definition: the measurement of nearness            describe the complete process step of biometric
between two code word v and v’ is defined by             Authentication system will achieve the high security
nearness (v,v’)=dist(v.v’)/n,.it is obvious that 0 ≤     and accuracy
nearness(v.v’) ≤ 1[13].
                                                         Step 1: Scanning Scan the biometric traits of users
2.2.4 Definition: the fuzzy membership function for      using sensor at the user side 1. False Reject: Valid
a code v’ to be equal to given v is defined as[17]       user (Probability of un matching of two traits R and
     FUZZ (v’) =0 if nearness (v,v’) =z ≤ zo ≤1)         R’ of same user)
                =z otherwise
2.3 Braid Group
Emil Artin[11] in 1925 defined B ,the braid group of     Step2: Quality Assessment Checking
                                 n
                                                         This process is to check the quality is sufficient of
index n, using following generators and relations:
                                                         scanned traits of user for further processing
Consider the generators , ……. , nwhere
irepresents the braid in which the(i1) string
                                         st
                                                         Step3: Process for convert scans biometric traits of
                 th                                      users to Message Bits
crosses over the i string while all other                First the scan biometric traits images decomposed
                                                         into w/8 *h/8 blocks where each one contain a fix
                                                         number of pixel where w=height and h=height



                                                                                                  329 | P a g e
Dilip Menariya, D. B. Ojha / International Journal of Engineering Research and Applications
                 (IJERA)              ISSN: 2248-9622         www.ijera.com
                     Vol. 2, Issue 5, September- October 2012, pp.328-332
Step 4: Feature Extraction: At this step the silent     c=commita lg(XOR,g(m1), Fkshared (m),R) where
feature are extracted from transformed block of         Fkshared (m)=m1Kshared+e, m is the K-bit message ,
biometric traits and generate the biometric templates   m=m1∆ m2, Fkshared (m) is an n-bit unreadable text ,R
as set of blocks                                        is random braid (R can be changed in every Message
                                                        that sent),e=h(m2),here h is an invertible function
Step 5: Cryptographic key generation based on braid     which maps m2 in to an n-bit error vector of weight α
Group
Our scheme is made up of Five algorithms: setup,        Decryption: in the open Phase Alice open the
encryption, decryption, enrollment, verification        commitment at time t2 which was sent by Bob at time
                                                        t1using the inverse procedure of commita lg(a2)and
Initially set up phase: the environment is set up       Alice make a calculation c’ using with help of secret
initially for generating public and private key,the     key c’=commita lg(XOR,g(m1), F kshared (m),R)and
secret key according to the algorithms using braid      check its time t3 result is same as the sent by Bob
group at time to where event time is function           Fuzzy decision Making
E={ti,ai} of time and event algorithms and publish      If (near(c,c’) ≤Zo) if result is less than Accept
secret key between two parties        requires for      otherwise reject
secures communication starting

Encryption: According to the commit phase, Bob
commits to a Message m€ M to Alice, send as:




                                                                                              330 | P a g e
Dilip Menariya, D. B. Ojha / International Journal of Engineering Research and Applications
                 (IJERA)              ISSN: 2248-9622         www.ijera.com
                     Vol. 2, Issue 5, September- October 2012, pp.328-332


                               Liveness check                Templates                      D(m1)= t1 X Kshared
     User
                                                             Generation   t1 Є H
     Biometric (v)             and Acquisition


                              Pre-Processing                      Feature                   Shared Key
                                                                 Extraction                 Generate (Kshared)



                               Pre-Processing                    Feature
                                                                Extraction


    User                                                     Templates                           D(m2)= t2 X Kshared
                               Liveness check
    Biometric (v’)
                                                             Generation   t2 Є H
                                    and
                                 Acquisition
                                                                                                          DV(M)=biX Kshared+Δe
                                                                          Database
  (a) Enrollment Phase                                                    Server
………………………………………………………………………………………………………………………
                             …………………………………………




       Verified
                     F(DV(M))( Kshared)-1        Accept                   Fuzzy

                                                                          Decision

                                                                                   Reject




    (b)Identification Phase

                                                          Figure(1)

Enrollment/Identification         Phase     of   Biometric        Database server where database server found
System                                                            encrypted biometric templates with error are
                                                                  introduce in transmission channel so finally
In the Identification phase                                       Ev(M)=Ma+@e
          Biometric template’s of user is u’ at receive
at receive side and compared it with one is stored                Step 6 error correction codes
previously in database if they are matching then user                      If Error introduce in transmission of
is validate for the system                                        biometric template we can correct using fuzzy error
                                                                  correcting code if any error are introduce during the
In the Registration Phase                                         transmission of biometric templates
        User biometric scan traits as biometric
template as encrypted using secret key and send to



                                                                                                                  331 | P a g e
Dilip Menariya, D. B. Ojha / International Journal of Engineering Research and Applications
                 (IJERA)              ISSN: 2248-9622         www.ijera.com
                     Vol. 2, Issue 5, September- October 2012, pp.328-332
Receiver check the dist(t(c),c’)>0 he realize that there          match score data”, Proc. Canadian Conf.
is an error occur during transmission .receive applies            Electrical Computer Eng., pp.469-472.
the error correction function c’:f(c)
The       receive      will      compute       nearness    [9]    Sunil V. K. Gaddam, Manohar             Lal
(t{c},f{c}=dist{t{c},f(c’)}/n                                     (2010), “Efficient Cancellable Biometric A
Fuzz(c’)=0 if nearness(c,c’)=Z<Z<1                                Multi- Biometric Template Security: An
=z otherwise                                                      Application of Code-Based Cryptosystem

4. Conclusion                                              [10]   Deo Brat Ojha, Ajay Sharma (2010), “A
         This paper presents fuzzy commitment                     fuzzy commitment scheme with McEliece’s
Method for error correcting code and braid group to               cipher”, Survey in Mathematics and Its
compute a cryptographic key for biometric data .The               Application Vol.5pp73-83.
method not only meet the security requirements, but
also produce comparable accuracy to well-known K-          [11]   F. J. MacWilliams and N. J. A. Sloane
NN classification method. Experiments on real                     (1991), Theory of Error-Correcting Codes.
biometric data, particular fingerprints and voice, are            North Holland.
being conducted and will be reported in the near
future.                                                    [12]   A. A. Al-saggaf, H. S. Acharya (2007), “A
                                                                  Fuzzy Commitment Scheme”,           IEEE
REFERENCES                                                        International Conference on Advances in
  [1]    K. NandaKumar (2008),       “Multibio-                   Computer      Vision   and    Information
         metric Systems: Fusion Strategies and                    Technology, 28-30 November– India.
         Template     Security”, PhD     Thesis,
         Department of Computer Science and                [13]   Andrew Burnett, Adam Duffy, and Tom
         Engineering, Michigan State University,                  Dowling (2004) “A Biometric Identity
         January.                                                 Based            Signature   Scheme”,
                                                                  eprint.iacr.org/2004/176.pdf
  [2]    Anil     K.    Jain   and    Arun   Ross
         (2004),“Multibiometric systems,”Communi-          [14]. V. Pless (1982), Introduction to theory of
         cations of the ACM, January, Volume 47,                 Error Correcting Codes, Wiley, New York.
         Number 1.
                                                           [15]   T. van der Putte and J. Keuning (2000),
  [3].   A. Juels and M. Wattenberg (1999), “A                    “Biometrical Fingerprint Recognition: Don’t
         fuzzy commitment scheme”, In Proceedings                 Get Your Fingers Burned”. Proceedings of
         of    the    6th    Security,   pp.28-36,                the Fourth Working Conference on Smart
         November.ACM Conference on Computer                      Card Research and Advanced Applications.
         and Communication
                                                           [16]   J. Bringer    and H. Chabanne (2008),
  [4]    M. Blum        (1982), “Coin flipping by                 “An Authentication protocol with encrypted
         telephone: a protocol for solving impossible             biometric data”, Proc. Int. con cryptology.
         problems”,        Proc. IEEE Computer                    Africacrypt. pp-109-124,.
         Conference, pp. 133-137.
  [5]    A. K. Jain, S. Pankanti, S. Prabhakar, L.
         Hong, A. Ross (2004), “Biometrics: A
         Grand Challenge”, Proc. of the International
         Conference on Pattern Recognition, Vol. 2,
         pp. 935–942, August.

  [6]    J. Wayman, A. Jain, D. Maltoni, D.
         Maio(2005),Biometric Systems:Technology,
         Design and Performance Evaluation,
         Springer-Verlag,.

  [7]    D. Maltoni, D. Maio, A. K. Jain,
         S.Prabhakar     (2003),      Handbook of
         Fingerprint Recognition, Springer,.

  [8]    A. Adler       (2004), “Images can be
         regenerated    from quantized biometric




                                                                                              332 | P a g e

Mais conteúdo relacionado

Mais procurados

­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...IRJET Journal
 
Designing an Efficient Multimodal Biometric System using Palmprint and Speech...
Designing an Efficient Multimodal Biometric System using Palmprint and Speech...Designing an Efficient Multimodal Biometric System using Palmprint and Speech...
Designing an Efficient Multimodal Biometric System using Palmprint and Speech...IDES Editor
 
Signature recognition using clustering techniques dissertati
Signature recognition using clustering techniques dissertatiSignature recognition using clustering techniques dissertati
Signature recognition using clustering techniques dissertatiDr. Vinayak Bharadi
 
Character recognition of Devanagari characters using Artificial Neural Network
Character recognition of Devanagari characters using Artificial Neural NetworkCharacter recognition of Devanagari characters using Artificial Neural Network
Character recognition of Devanagari characters using Artificial Neural Networkijceronline
 
Simplified Multimodal Biometric Identification
Simplified Multimodal Biometric IdentificationSimplified Multimodal Biometric Identification
Simplified Multimodal Biometric Identificationijeei-iaes
 
7 rupali kasar_final paper--74-85
7 rupali kasar_final paper--74-857 rupali kasar_final paper--74-85
7 rupali kasar_final paper--74-85Alexander Decker
 
Successive Geometric Center Based Dynamic Signature Recognition
Successive Geometric Center Based Dynamic Signature RecognitionSuccessive Geometric Center Based Dynamic Signature Recognition
Successive Geometric Center Based Dynamic Signature RecognitionDr. Vinayak Bharadi
 
An Indexing Technique Based on Feature Level Fusion of Fingerprint Features
An Indexing Technique Based on Feature Level Fusion of Fingerprint FeaturesAn Indexing Technique Based on Feature Level Fusion of Fingerprint Features
An Indexing Technique Based on Feature Level Fusion of Fingerprint FeaturesIDES Editor
 
Online signature recognition using sectorization of complex walsh
Online signature recognition using sectorization of complex walshOnline signature recognition using sectorization of complex walsh
Online signature recognition using sectorization of complex walshDr. Vinayak Bharadi
 
3 rupali kasar_final paper--23-34
3 rupali kasar_final paper--23-343 rupali kasar_final paper--23-34
3 rupali kasar_final paper--23-34Alexander Decker
 
A Robust Image Watermarking Technique using Luminance Based Area Selection an...
A Robust Image Watermarking Technique using Luminance Based Area Selection an...A Robust Image Watermarking Technique using Luminance Based Area Selection an...
A Robust Image Watermarking Technique using Luminance Based Area Selection an...IRJET Journal
 
An effective approach to offline arabic handwriting recognition
An effective approach to offline arabic handwriting recognitionAn effective approach to offline arabic handwriting recognition
An effective approach to offline arabic handwriting recognitionijaia
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)theijes
 
Automatic Synthesis and Formal Verification of Interfaces Between Incompatibl...
Automatic Synthesis and Formal Verification of Interfaces Between Incompatibl...Automatic Synthesis and Formal Verification of Interfaces Between Incompatibl...
Automatic Synthesis and Formal Verification of Interfaces Between Incompatibl...IDES Editor
 

Mais procurados (20)

Bb32351355
Bb32351355Bb32351355
Bb32351355
 
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
 
Designing an Efficient Multimodal Biometric System using Palmprint and Speech...
Designing an Efficient Multimodal Biometric System using Palmprint and Speech...Designing an Efficient Multimodal Biometric System using Palmprint and Speech...
Designing an Efficient Multimodal Biometric System using Palmprint and Speech...
 
Signature recognition using clustering techniques dissertati
Signature recognition using clustering techniques dissertatiSignature recognition using clustering techniques dissertati
Signature recognition using clustering techniques dissertati
 
Character recognition of Devanagari characters using Artificial Neural Network
Character recognition of Devanagari characters using Artificial Neural NetworkCharacter recognition of Devanagari characters using Artificial Neural Network
Character recognition of Devanagari characters using Artificial Neural Network
 
IEEE HST 2009
IEEE HST 2009IEEE HST 2009
IEEE HST 2009
 
Simplified Multimodal Biometric Identification
Simplified Multimodal Biometric IdentificationSimplified Multimodal Biometric Identification
Simplified Multimodal Biometric Identification
 
7 rupali kasar_final paper--74-85
7 rupali kasar_final paper--74-857 rupali kasar_final paper--74-85
7 rupali kasar_final paper--74-85
 
ICPR Workshop ETCHB 2010
ICPR Workshop ETCHB 2010ICPR Workshop ETCHB 2010
ICPR Workshop ETCHB 2010
 
K42016368
K42016368K42016368
K42016368
 
Successive Geometric Center Based Dynamic Signature Recognition
Successive Geometric Center Based Dynamic Signature RecognitionSuccessive Geometric Center Based Dynamic Signature Recognition
Successive Geometric Center Based Dynamic Signature Recognition
 
An Indexing Technique Based on Feature Level Fusion of Fingerprint Features
An Indexing Technique Based on Feature Level Fusion of Fingerprint FeaturesAn Indexing Technique Based on Feature Level Fusion of Fingerprint Features
An Indexing Technique Based on Feature Level Fusion of Fingerprint Features
 
Online signature recognition using sectorization of complex walsh
Online signature recognition using sectorization of complex walshOnline signature recognition using sectorization of complex walsh
Online signature recognition using sectorization of complex walsh
 
3 rupali kasar_final paper--23-34
3 rupali kasar_final paper--23-343 rupali kasar_final paper--23-34
3 rupali kasar_final paper--23-34
 
A Robust Image Watermarking Technique using Luminance Based Area Selection an...
A Robust Image Watermarking Technique using Luminance Based Area Selection an...A Robust Image Watermarking Technique using Luminance Based Area Selection an...
A Robust Image Watermarking Technique using Luminance Based Area Selection an...
 
An effective approach to offline arabic handwriting recognition
An effective approach to offline arabic handwriting recognitionAn effective approach to offline arabic handwriting recognition
An effective approach to offline arabic handwriting recognition
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
Chapter3
Chapter3Chapter3
Chapter3
 
Automatic Synthesis and Formal Verification of Interfaces Between Incompatibl...
Automatic Synthesis and Formal Verification of Interfaces Between Incompatibl...Automatic Synthesis and Formal Verification of Interfaces Between Incompatibl...
Automatic Synthesis and Formal Verification of Interfaces Between Incompatibl...
 
El31908912
El31908912El31908912
El31908912
 

Destaque (20)

Br25404411
Br25404411Br25404411
Br25404411
 
Cg25492495
Cg25492495Cg25492495
Cg25492495
 
B25004007
B25004007B25004007
B25004007
 
Cm25524527
Cm25524527Cm25524527
Cm25524527
 
Ct25566571
Ct25566571Ct25566571
Ct25566571
 
Bm25379383
Bm25379383Bm25379383
Bm25379383
 
A26001006
A26001006A26001006
A26001006
 
Ad26188191
Ad26188191Ad26188191
Ad26188191
 
Na2522282231
Na2522282231Na2522282231
Na2522282231
 
X25119123
X25119123X25119123
X25119123
 
Brands Magazine Presentation
Brands Magazine PresentationBrands Magazine Presentation
Brands Magazine Presentation
 
Unidad 1 origen de la cultura
Unidad 1 origen de la culturaUnidad 1 origen de la cultura
Unidad 1 origen de la cultura
 
Speech apresentação 3 t11
Speech   apresentação 3 t11Speech   apresentação 3 t11
Speech apresentação 3 t11
 
Plaza
PlazaPlaza
Plaza
 
Escuela
EscuelaEscuela
Escuela
 
Normas vancouver
Normas vancouverNormas vancouver
Normas vancouver
 
Andrew wiles m
Andrew wiles mAndrew wiles m
Andrew wiles m
 
Matematicasen usera
Matematicasen useraMatematicasen usera
Matematicasen usera
 
Casco antiguo de cieza 12997880
Casco antiguo de cieza 12997880Casco antiguo de cieza 12997880
Casco antiguo de cieza 12997880
 
Rapport ufo
Rapport  ufoRapport  ufo
Rapport ufo
 

Semelhante a Bd25328332

Analysis of the Iriscode Bioencoding Scheme
Analysis of the Iriscode Bioencoding SchemeAnalysis of the Iriscode Bioencoding Scheme
Analysis of the Iriscode Bioencoding SchemeCSCJournals
 
Multimodal Biometrics at Feature Level Fusion using Texture Features
Multimodal Biometrics at Feature Level Fusion using Texture FeaturesMultimodal Biometrics at Feature Level Fusion using Texture Features
Multimodal Biometrics at Feature Level Fusion using Texture FeaturesCSCJournals
 
31 8949 punithavathi ramesh sub.id.69 (edit)new
31 8949 punithavathi ramesh   sub.id.69 (edit)new31 8949 punithavathi ramesh   sub.id.69 (edit)new
31 8949 punithavathi ramesh sub.id.69 (edit)newIAESIJEECS
 
Feature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed SystemFeature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed SystemIJMER
 
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDAA NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDAcsandit
 
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA cscpconf
 
Performance Enhancement Of Multimodal Biometrics Using Cryptosystem
Performance Enhancement Of Multimodal Biometrics Using CryptosystemPerformance Enhancement Of Multimodal Biometrics Using Cryptosystem
Performance Enhancement Of Multimodal Biometrics Using CryptosystemIJERA Editor
 
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...IJERA Editor
 
Biometric Authentication Based on Hash Iris Features
Biometric Authentication Based on Hash Iris FeaturesBiometric Authentication Based on Hash Iris Features
Biometric Authentication Based on Hash Iris FeaturesCSCJournals
 
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...IJNSA Journal
 
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...IJNSA Journal
 
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...CSCJournals
 
An Overview of Biometric Template Security Techniques
An Overview of Biometric Template Security TechniquesAn Overview of Biometric Template Security Techniques
An Overview of Biometric Template Security TechniquesIJCSIS Research Publications
 

Semelhante a Bd25328332 (20)

Analysis of the Iriscode Bioencoding Scheme
Analysis of the Iriscode Bioencoding SchemeAnalysis of the Iriscode Bioencoding Scheme
Analysis of the Iriscode Bioencoding Scheme
 
Iy3615601568
Iy3615601568Iy3615601568
Iy3615601568
 
Multimodal Biometrics at Feature Level Fusion using Texture Features
Multimodal Biometrics at Feature Level Fusion using Texture FeaturesMultimodal Biometrics at Feature Level Fusion using Texture Features
Multimodal Biometrics at Feature Level Fusion using Texture Features
 
31 8949 punithavathi ramesh sub.id.69 (edit)new
31 8949 punithavathi ramesh   sub.id.69 (edit)new31 8949 punithavathi ramesh   sub.id.69 (edit)new
31 8949 punithavathi ramesh sub.id.69 (edit)new
 
R01754129132
R01754129132R01754129132
R01754129132
 
Feature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed SystemFeature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed System
 
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDAA NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA
 
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA
 
F1803042939
F1803042939F1803042939
F1803042939
 
F1803042939
F1803042939F1803042939
F1803042939
 
G0333946
G0333946G0333946
G0333946
 
Performance Enhancement Of Multimodal Biometrics Using Cryptosystem
Performance Enhancement Of Multimodal Biometrics Using CryptosystemPerformance Enhancement Of Multimodal Biometrics Using Cryptosystem
Performance Enhancement Of Multimodal Biometrics Using Cryptosystem
 
D56021216
D56021216D56021216
D56021216
 
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...
 
Biometric Authentication Based on Hash Iris Features
Biometric Authentication Based on Hash Iris FeaturesBiometric Authentication Based on Hash Iris Features
Biometric Authentication Based on Hash Iris Features
 
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
 
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
 
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
 
An Overview of Biometric Template Security Techniques
An Overview of Biometric Template Security TechniquesAn Overview of Biometric Template Security Techniques
An Overview of Biometric Template Security Techniques
 
Ijebea14 276
Ijebea14 276Ijebea14 276
Ijebea14 276
 

Bd25328332

  • 1. Dilip Menariya, D. B. Ojha / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.328-332 A vital application of security with biometric templates Dilip Menariya1 and D. B. Ojha2 1Department of Computer Science Mewar University Chittorgarh, Raj.India 2Department of Mathematics Mewar University Chittorgarh, Raj.India Abstract In this Paper, We will discuss high level behavioral or physiological feature to identify one of biometric templates security is critical issue in person form other. Many application for biometric personal base authentication system due to addition system are available and all of them fall into two of error in transmission channel. Therefore we main functionality verification and identification propose the framework of security of biometric [5][6][7]. template, based on the concept of encryption with secret key, based on braid group for unauthorized A large number of errors in biometric templates are user access, Fuzzy error correction code determine encountered in day to day communication due to and encounters error if any error is introduce during environments change. Many approaches used to solve the transmission between users to database server We the noise problem which is one approach Fuzzy store the biometric templates in encrypted form both commitment scheme is one the scheme for solving without the fusion of score level and decision level in the noise problem in biometric templates of a database server Stenography is related to hide biometric recognition system, Jules and Wattenberg’s biometric templates with help of secret key based on Fuzzy Commitment Scheme[3]has been published to braid groups. handling difference occurring Section 2 of this paper describe the state of Biometric between two captured of biometric data, using error System, and section 3 as our proposed method and correcting code. finally Section 4 the Conclusion 1.1 Related work Keywords: A handful of papers have been Cryptography, Fuzzy Commitment Scheme, published so far in the area of key generation for Biometric System Templates, Registration Phase, biometric secure templates [3,4,10,12,13] Further Verification Phase, Braid Groups more amount of work suggest biometric data gathering one or more actual biometric analysis and 1.Introduction: combine their results which increase the reliability of In Ancient times the people recognized the biometric system[1][2] each other by face, voice and their tongs movement. Today’s scenario is different due to large increase in 2.Preliminaries our population. As a byproduct of Biometric system is activity in our day to day communication ,we need 2.1 Biometric System more secure and authenticated communication. This Biometric System measure and analyzes biological requirement challenged us of think on biometric data and provide capability of identifying person facilitation[5].Large number of government based on Their intrinsic characteristics that can be organizations, industry and non government physical such hand shape, a fingerprint, facial organizations to must attain security with accuracy characteristics, voice, or DNA and proving that the and error free Communication .The various aim is same that is registered in the biometric properties exhibited by biometric system are security system as a biometric template Basically uniqueness collectability, performance, acceptability Biometric–Based Personal authentication systems and circumvention [3] have five major components 1.Sensor, 2.Feature- Extractor, 3.Template Database Server, 4.Matcher, Various cryptography approaches are used for 5.Decesion Module. Sensor is the interface between protection of biometric templates some are based on users and Biometric System and its function is to the hardware, some are software base, but common scan biometric traits of the user. Feature extractor encryption technique AES and RAS cannot be used, module process the scan biometric traits to extract because of large number of interclass variation in the the silent feature set, in some case Feature. Extractor biometric templates [5][6][16].Personal base is followed by quality assessment module for authentication system use checking the sufficient quality of scan biometric traits In Biometric–Based Personal authentication systems works in two steps 328 | P a g e
  • 2. Dilip Menariya, D. B. Ojha / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.328-332 Step1.Registered: In the first step the scan biometric traits of user R are processed and then stored in the Otherwise rejected strings remain uncrossed. The database Server in Encrypted or secure form defining relations are Step2. Verification: In this step again new scan i j = ji |i j |2, biometric traits of user R ’is captured and processed i j i = j i j For |i j | its then process for Comparing it with already Registered scan biometric traits as template and if An n-braid has the following geometric both R and R’ is matches then it is valid for interpretation: It is a set of disjoint n-strands all of Validation in biometric system otherwise which are attached to two horizontal bars at the top Verification is invalid in biometric system Basically and at the bottom such that each strands always two types of errors are introduce In the Biometric– heads downward as one walks along the strand from Based Personal authentication systems[14] the top to the bottom. In this geometric interpretation, each generator i i represents the process of swapping 1. False Reject: Valid user (Probability of un the ith strand with the next one (with ith strand going matching of two traits R and R’ of same user) under the (i+1)th one). Two braids are equivalent if 2. False Acceptance: Invalid User (Probability of one can be deformed to the other continuously in the matching of two traits R and R’ of same user) set of braids. Bn is the set of all equivalence classes of geometric n-braids with a natural group structure. 2.2 Error Correction Code The multiplication ab of two braids a and b is the braid obtained by positioning a on the top of b. The 2.2.1 Definition: A Metric space is a set B with a identity e is the braid consisting of n straight vertical distance function dist B X B→B+= {0, ∞), which strands and the inverse of a is the reflection of a with obeys the usual properties (symmetric, triangle 1 respect to a horizontal line. So  can be obtained inequalities, Zero distance between equal points) from by switching the overstrand and under- - [13]. strand. ∆=(I, 2,……..n-1) (I, 2,……..n-2) (I, 2) 2.2.2 Definition : Let B(0,1)n be a code set which (I)is called the fundamental braid. We describe consists of a set code words bi of length n ,The some mathematically hard problems in braid groups. distance metric between any two code words b i and We say that x and y are conjugate if there is an bj in B is defined By element a such that y = 1 . For m <n; Bm can axa 𝑛 dist ( bi , bj)= 𝑟=1 |𝑏 𝑖𝑟 − bjr | bi , bj ЄC be considered as a subgroup of Bn generated by I, This is known as Hamming Distance [13]. 2,……..m-1 2.2.2 Definition: An Error Correction Function f for a code B Defined as 3. Proposed Scheme F(bi)={bj/dist(bi ,bj) is the minimum, over B-{bi }}. Here we propose biometric based Here, bj= f(bi) is called the nearest neighbor of Authentication system using the concept of braid bi[16]. group based cryptosystem for security purpose and fuzzy commitment schema for error correction. We 2.2.3 Definition: the measurement of nearness describe the complete process step of biometric between two code word v and v’ is defined by Authentication system will achieve the high security nearness (v,v’)=dist(v.v’)/n,.it is obvious that 0 ≤ and accuracy nearness(v.v’) ≤ 1[13]. Step 1: Scanning Scan the biometric traits of users 2.2.4 Definition: the fuzzy membership function for using sensor at the user side 1. False Reject: Valid a code v’ to be equal to given v is defined as[17] user (Probability of un matching of two traits R and FUZZ (v’) =0 if nearness (v,v’) =z ≤ zo ≤1) R’ of same user) =z otherwise 2.3 Braid Group Emil Artin[11] in 1925 defined B ,the braid group of Step2: Quality Assessment Checking n This process is to check the quality is sufficient of index n, using following generators and relations: scanned traits of user for further processing Consider the generators , ……. , nwhere irepresents the braid in which the(i1) string st Step3: Process for convert scans biometric traits of th users to Message Bits crosses over the i string while all other First the scan biometric traits images decomposed into w/8 *h/8 blocks where each one contain a fix number of pixel where w=height and h=height 329 | P a g e
  • 3. Dilip Menariya, D. B. Ojha / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.328-332 Step 4: Feature Extraction: At this step the silent c=commita lg(XOR,g(m1), Fkshared (m),R) where feature are extracted from transformed block of Fkshared (m)=m1Kshared+e, m is the K-bit message , biometric traits and generate the biometric templates m=m1∆ m2, Fkshared (m) is an n-bit unreadable text ,R as set of blocks is random braid (R can be changed in every Message that sent),e=h(m2),here h is an invertible function Step 5: Cryptographic key generation based on braid which maps m2 in to an n-bit error vector of weight α Group Our scheme is made up of Five algorithms: setup, Decryption: in the open Phase Alice open the encryption, decryption, enrollment, verification commitment at time t2 which was sent by Bob at time t1using the inverse procedure of commita lg(a2)and Initially set up phase: the environment is set up Alice make a calculation c’ using with help of secret initially for generating public and private key,the key c’=commita lg(XOR,g(m1), F kshared (m),R)and secret key according to the algorithms using braid check its time t3 result is same as the sent by Bob group at time to where event time is function Fuzzy decision Making E={ti,ai} of time and event algorithms and publish If (near(c,c’) ≤Zo) if result is less than Accept secret key between two parties requires for otherwise reject secures communication starting Encryption: According to the commit phase, Bob commits to a Message m€ M to Alice, send as: 330 | P a g e
  • 4. Dilip Menariya, D. B. Ojha / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.328-332 Liveness check Templates D(m1)= t1 X Kshared User Generation t1 Є H Biometric (v) and Acquisition Pre-Processing Feature Shared Key Extraction Generate (Kshared) Pre-Processing Feature Extraction User Templates D(m2)= t2 X Kshared Liveness check Biometric (v’) Generation t2 Є H and Acquisition DV(M)=biX Kshared+Δe Database (a) Enrollment Phase Server ……………………………………………………………………………………………………………………… ………………………………………… Verified F(DV(M))( Kshared)-1 Accept Fuzzy Decision Reject (b)Identification Phase Figure(1) Enrollment/Identification Phase of Biometric Database server where database server found System encrypted biometric templates with error are introduce in transmission channel so finally In the Identification phase Ev(M)=Ma+@e Biometric template’s of user is u’ at receive at receive side and compared it with one is stored Step 6 error correction codes previously in database if they are matching then user If Error introduce in transmission of is validate for the system biometric template we can correct using fuzzy error correcting code if any error are introduce during the In the Registration Phase transmission of biometric templates User biometric scan traits as biometric template as encrypted using secret key and send to 331 | P a g e
  • 5. Dilip Menariya, D. B. Ojha / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.328-332 Receiver check the dist(t(c),c’)>0 he realize that there match score data”, Proc. Canadian Conf. is an error occur during transmission .receive applies Electrical Computer Eng., pp.469-472. the error correction function c’:f(c) The receive will compute nearness [9] Sunil V. K. Gaddam, Manohar Lal (t{c},f{c}=dist{t{c},f(c’)}/n (2010), “Efficient Cancellable Biometric A Fuzz(c’)=0 if nearness(c,c’)=Z<Z<1 Multi- Biometric Template Security: An =z otherwise Application of Code-Based Cryptosystem 4. Conclusion [10] Deo Brat Ojha, Ajay Sharma (2010), “A This paper presents fuzzy commitment fuzzy commitment scheme with McEliece’s Method for error correcting code and braid group to cipher”, Survey in Mathematics and Its compute a cryptographic key for biometric data .The Application Vol.5pp73-83. method not only meet the security requirements, but also produce comparable accuracy to well-known K- [11] F. J. MacWilliams and N. J. A. Sloane NN classification method. Experiments on real (1991), Theory of Error-Correcting Codes. biometric data, particular fingerprints and voice, are North Holland. being conducted and will be reported in the near future. [12] A. A. Al-saggaf, H. S. Acharya (2007), “A Fuzzy Commitment Scheme”, IEEE REFERENCES International Conference on Advances in [1] K. NandaKumar (2008), “Multibio- Computer Vision and Information metric Systems: Fusion Strategies and Technology, 28-30 November– India. Template Security”, PhD Thesis, Department of Computer Science and [13] Andrew Burnett, Adam Duffy, and Tom Engineering, Michigan State University, Dowling (2004) “A Biometric Identity January. Based Signature Scheme”, eprint.iacr.org/2004/176.pdf [2] Anil K. Jain and Arun Ross (2004),“Multibiometric systems,”Communi- [14]. V. Pless (1982), Introduction to theory of cations of the ACM, January, Volume 47, Error Correcting Codes, Wiley, New York. Number 1. [15] T. van der Putte and J. Keuning (2000), [3]. A. Juels and M. Wattenberg (1999), “A “Biometrical Fingerprint Recognition: Don’t fuzzy commitment scheme”, In Proceedings Get Your Fingers Burned”. Proceedings of of the 6th Security, pp.28-36, the Fourth Working Conference on Smart November.ACM Conference on Computer Card Research and Advanced Applications. and Communication [16] J. Bringer and H. Chabanne (2008), [4] M. Blum (1982), “Coin flipping by “An Authentication protocol with encrypted telephone: a protocol for solving impossible biometric data”, Proc. Int. con cryptology. problems”, Proc. IEEE Computer Africacrypt. pp-109-124,. Conference, pp. 133-137. [5] A. K. Jain, S. Pankanti, S. Prabhakar, L. Hong, A. Ross (2004), “Biometrics: A Grand Challenge”, Proc. of the International Conference on Pattern Recognition, Vol. 2, pp. 935–942, August. [6] J. Wayman, A. Jain, D. Maltoni, D. Maio(2005),Biometric Systems:Technology, Design and Performance Evaluation, Springer-Verlag,. [7] D. Maltoni, D. Maio, A. K. Jain, S.Prabhakar (2003), Handbook of Fingerprint Recognition, Springer,. [8] A. Adler (2004), “Images can be regenerated from quantized biometric 332 | P a g e