SlideShare a Scribd company logo
1 of 26
BLIND AUTHENTICATION: A SECURE
CRYPTO-BIOMETRIC VERIFICATION
PROTOCOL
Nishmitha.B
CONTENTS
1. Biometrics
2. Biometric Authentication System
3. Comparison of Biometric systems
4. Privacy concerns in Biometric systems
5. What is Blind Authentication?
6. Previous work
7. Features of Blind Authentication
8. Enrollment
9. Authentication
10. Security, Privacy and Trust
11. Extensions to Kernels and Neural networks
12. Blind Secure Product Protocol
13. Implementation and analysis
14. Advantages
15. Conclusion
BIOMETRICS
A biometric is a physiological or behavioral characteristic
of a human being that can distinguish one person from
another and that theoretically can be used for identification
or verification of identity.
AUTHENTICATION
WHAT YOU KNOW?
WHAT YOU HAVE?
WHAT YOU ARE?
Biometric Authentication System
COMPARISON OF BIOMETRIC
SYSTEMS
PHYSIOLOGICAL BIOMETRICS
1. Fingerprint recognition
a) No two persons share the same fingerprints
b) Can go for thermal sensing, optical sensing, capacitance sensing,
ultrasound sensing etc.
c) Wet, dry, or dirty skin may create problems
2. Face Recognition
a) One of the most acceptable biometrics
b) Not accurate and dependable
3. Hand Geometry
a) Include length and width of fingers, different aspect
ratios of palm and fingers, thickness and width of the palm etc.
b) Existing hand geometry systems mostly use images of the
hand
4. Iris Recognition
a) Reliable and accurate
b) Believed to be unique in every individual
c) Not work for people who are missing both eyes or who have
serious eye illnesses that affect the iris.
BEHAVIORAL BIOMETRICS
1. Signature
a) High degree of acceptance
b) Signatures lack permanence
c) Static signature verification systems & Dynamic signature
verification systems
2. Voice
a) Depend on numerous characteristics of a human voice to identify
the speaker
b) Does not require expensive input devices
c) Issues- may skillfully imitate others' voices, record and replay
attacks
Primary Concerns in a Biometric
System
Template Protection
User's privacy
Trust between user and
server
Network security
What is Blind Authentication?
A blind authentication protocol that does
not reveal any:
information about the biometric samples to the
authenticating server.
information regarding the classifier, employed by
the server, to the user or client
PREVIOUS WORK
Categorization of template protection schemes by Jain
SALTING
Design a classifier in the encrypted feature space
Specific to a biometric trait
Security using a transformation function seeded by a user
specific key
Do not offer well defined security
NON-INVERTIBLE TRANSFORM
Apply non-invertible function on the biometric template
Key must be available at the time of transformation
Eg. Robust hashing, Cancelable templates
KEY BINDING AND KEY GENERATION
Integrate the advantages of biometrics and cryptography
Using the biometric as a protection for the secret key or to
generate secret key
FEATURES OF BLIND
AUTHENTICATION
Strong encryption
Non-repudiable authentication
Protection against replay and
client-side attacks
Revocability
ENROLLMENT
Enrollment based on a trusted third party(TTP): At the time of
registering with a website, the encrypted version of the user’s
biometric template is made available to the website. The one-time
classifier training is done on the plain biometrics, and hence requires
a trusted server to handle training.
AUTHENTICATION
Blind Authentication Process: Linear kernel computation for
encrypted feature vectors. At no point, the identity vectors x,
w or the intermediate results xi · wi is revealed to anyone.
SECURITY PRIVACY AND
TRUST
SYSTEM SECURITY
 Server Security
 Client Security
 Network Security
PRIVACY
 Concern of revealing personal
information
Server security
Hacker gains access to the template database
Hacker is in the database server during the authentication
Impostor trying blind attacks from a remote machine
Client security
Hacker gains access to the user’s biometric or private key
Passive attack at the user’s computer
Network Security
Attacker gains access to the network
PRIVACY
Concern of revealing personal information-Template is
never revealed to the server
Concern of being tracked-Use different keys for different
applications
EXTENSIONS TO KERNELS AND
NEURAL NETWORKS
Kernel based classifier uses a discriminating function
like
Similarly, in Neural Network the basic units are, for
example perceptron and sigmoid
Model above functions as arithmetic circuits consisting
of add and multiplication gates over a finite domain.
Consider two encryptions E+
and E*
BLIND SECURE PRODUCT
PROTOCOL
Receive from client
Server computes kn+k random numbers such that
Server computes
and send it to the client.Client decrypts it.
Client computes
to the server
Server computes
Send
IMPLEMENTATION AND ANALYSIS
Experiments designed to evaluate the efficiency and
accuracy of proposed approach.
For evaluation, an SVM based verifier based on client-
server architecture was implemented.
Verification time for various
key sizes and feature vector
lengths
Variation of accuracy w.r.t. The
precisionof representation
ROC CURVES FOR VERIFICATION
ADVANTAGES OF BLIND
AUTHENTICATION
Fast and Provably Secure authentication without
trading off accuracy.
Supports generic classifiers such as Neural Network
and SVMs.
Useful with wide variety of fixed-length biometric-
traits.
Ideal for applications such as biometric ATMs, login
from public terminals.
CONCLUSION
Verification can be done in real-time with the help of
available hardware
Keep the interaction between the user and the server to a
minimum
Extensions to this work includes secure enrollment
protocols and encryption methods to reduce computations
Dynamic warping based matching of variable length feature
vectors can further enhance the utility of the approach
REFERENCES
N. K. Ratha, J. H. Connell, and R. M. Bolle, “Enhancing security
and privacy in biometrics-based authentication systems”
Maneesh Upmanyu, Anoop M. Namboodiri, K. Srinathan and C.V.
Jawahar,“Blind authentication: A secure crypto-biometric
verification protocol”
A secure Crypto-biometric verification protocol

More Related Content

What's hot

Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
Fred Beck MBA, CPA
 

What's hot (20)

Data Processing - data privacy and sensitive data
Data Processing - data privacy and sensitive dataData Processing - data privacy and sensitive data
Data Processing - data privacy and sensitive data
 
User expert forum user-id
User expert forum   user-idUser expert forum   user-id
User expert forum user-id
 
Phishing and prevention
Phishing and preventionPhishing and prevention
Phishing and prevention
 
Cyber security(2018 updated)
Cyber security(2018 updated)Cyber security(2018 updated)
Cyber security(2018 updated)
 
Network security
Network securityNetwork security
Network security
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - English
 
SC-900 Concepts of Security, Compliance, and Identity
SC-900 Concepts of Security, Compliance, and IdentitySC-900 Concepts of Security, Compliance, and Identity
SC-900 Concepts of Security, Compliance, and Identity
 
Digital evidence
Digital evidenceDigital evidence
Digital evidence
 
LAN Security
LAN Security LAN Security
LAN Security
 
Network security
Network securityNetwork security
Network security
 
Network firewall function & benefits
Network firewall function & benefitsNetwork firewall function & benefits
Network firewall function & benefits
 
Email phising and spoofing hurting your business
Email phising and spoofing hurting your businessEmail phising and spoofing hurting your business
Email phising and spoofing hurting your business
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Social engineering
Social engineering Social engineering
Social engineering
 
Ssl in a nutshell
Ssl in a nutshellSsl in a nutshell
Ssl in a nutshell
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Data security
Data securityData security
Data security
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity Fundamentals
 
Firewall
FirewallFirewall
Firewall
 

Viewers also liked

Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
Sukhdeep Kaur
 
50409621003 fingerprint recognition system-ppt
50409621003  fingerprint recognition system-ppt50409621003  fingerprint recognition system-ppt
50409621003 fingerprint recognition system-ppt
Mohankumar Ramachandran
 
FREE SPACE OPTICAL COMMUNICATION
FREE SPACE OPTICAL COMMUNICATIONFREE SPACE OPTICAL COMMUNICATION
FREE SPACE OPTICAL COMMUNICATION
Akhil Kumar
 

Viewers also liked (20)

Blind authentication
Blind authenticationBlind authentication
Blind authentication
 
Final report
Final reportFinal report
Final report
 
Delve and Office Graph
Delve and Office GraphDelve and Office Graph
Delve and Office Graph
 
Face recognition a survey
Face recognition a surveyFace recognition a survey
Face recognition a survey
 
Password based cryptography
Password based cryptographyPassword based cryptography
Password based cryptography
 
Network and web security
Network and web securityNetwork and web security
Network and web security
 
Wearable Biosensors Presentation
Wearable Biosensors PresentationWearable Biosensors Presentation
Wearable Biosensors Presentation
 
Project Seminar on Leapmotion Technology
Project Seminar on Leapmotion TechnologyProject Seminar on Leapmotion Technology
Project Seminar on Leapmotion Technology
 
Domain-Driven Data
Domain-Driven DataDomain-Driven Data
Domain-Driven Data
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
JINI Technology
JINI TechnologyJINI Technology
JINI Technology
 
50409621003 fingerprint recognition system-ppt
50409621003  fingerprint recognition system-ppt50409621003  fingerprint recognition system-ppt
50409621003 fingerprint recognition system-ppt
 
FREE SPACE OPTICAL COMMUNICATION
FREE SPACE OPTICAL COMMUNICATIONFREE SPACE OPTICAL COMMUNICATION
FREE SPACE OPTICAL COMMUNICATION
 
Airborne Internet
Airborne InternetAirborne Internet
Airborne Internet
 
3d search
3d search3d search
3d search
 
Double DES & Triple DES
Double DES & Triple DESDouble DES & Triple DES
Double DES & Triple DES
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Voice based email for blinds
Voice based email for blindsVoice based email for blinds
Voice based email for blinds
 
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febBiometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 feb
 
Fingerprint Technology
Fingerprint TechnologyFingerprint Technology
Fingerprint Technology
 

Similar to A secure Crypto-biometric verification protocol

iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesiaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineries
Iaetsd Iaetsd
 
DEVELOPMENT OF SECURE CLOUD TRANSMISSION PROTOCOL (SCTP) ENGINEERING PHASES :...
DEVELOPMENT OF SECURE CLOUD TRANSMISSION PROTOCOL (SCTP) ENGINEERING PHASES :...DEVELOPMENT OF SECURE CLOUD TRANSMISSION PROTOCOL (SCTP) ENGINEERING PHASES :...
DEVELOPMENT OF SECURE CLOUD TRANSMISSION PROTOCOL (SCTP) ENGINEERING PHASES :...
ijcisjournal
 
Privacypreservingauthenticationbiometrics 100228075830-phpapp02
Privacypreservingauthenticationbiometrics 100228075830-phpapp02Privacypreservingauthenticationbiometrics 100228075830-phpapp02
Privacypreservingauthenticationbiometrics 100228075830-phpapp02
Hai Nguyen
 

Similar to A secure Crypto-biometric verification protocol (20)

Biometric authentication reiew
Biometric authentication reiewBiometric authentication reiew
Biometric authentication reiew
 
term 2
term 2term 2
term 2
 
Secure Key Encapsulation and Distribution Mechanism for Real Time Secure Mobi...
Secure Key Encapsulation and Distribution Mechanism for Real Time Secure Mobi...Secure Key Encapsulation and Distribution Mechanism for Real Time Secure Mobi...
Secure Key Encapsulation and Distribution Mechanism for Real Time Secure Mobi...
 
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryption
 
ITIMP35.pptx
ITIMP35.pptxITIMP35.pptx
ITIMP35.pptx
 
A Review on Two Level Authentication Using Image Selection and Voice Recognition
A Review on Two Level Authentication Using Image Selection and Voice RecognitionA Review on Two Level Authentication Using Image Selection and Voice Recognition
A Review on Two Level Authentication Using Image Selection and Voice Recognition
 
Network Security Certification
Network Security CertificationNetwork Security Certification
Network Security Certification
 
Nt2580 Final Project Essay Examples
Nt2580 Final Project Essay ExamplesNt2580 Final Project Essay Examples
Nt2580 Final Project Essay Examples
 
Continuous User Identity Verification through Secure Login Session
 	  Continuous User Identity Verification through Secure Login Session 	  Continuous User Identity Verification through Secure Login Session
Continuous User Identity Verification through Secure Login Session
 
Single Sign-On & Strong Authentication
Single Sign-On & Strong AuthenticationSingle Sign-On & Strong Authentication
Single Sign-On & Strong Authentication
 
iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesiaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineries
 
Comparative analysis of authentication and authorization security in distribu...
Comparative analysis of authentication and authorization security in distribu...Comparative analysis of authentication and authorization security in distribu...
Comparative analysis of authentication and authorization security in distribu...
 
DEVELOPMENT OF SECURE CLOUD TRANSMISSION PROTOCOL (SCTP) ENGINEERING PHASES :...
DEVELOPMENT OF SECURE CLOUD TRANSMISSION PROTOCOL (SCTP) ENGINEERING PHASES :...DEVELOPMENT OF SECURE CLOUD TRANSMISSION PROTOCOL (SCTP) ENGINEERING PHASES :...
DEVELOPMENT OF SECURE CLOUD TRANSMISSION PROTOCOL (SCTP) ENGINEERING PHASES :...
 
Enhanced Security Through Token
Enhanced Security Through TokenEnhanced Security Through Token
Enhanced Security Through Token
 
Privacypreservingauthenticationbiometrics 100228075830-phpapp02
Privacypreservingauthenticationbiometrics 100228075830-phpapp02Privacypreservingauthenticationbiometrics 100228075830-phpapp02
Privacypreservingauthenticationbiometrics 100228075830-phpapp02
 
The Future of PKI. Using automation tools and protocols to bootstrap trust in...
The Future of PKI. Using automation tools and protocols to bootstrap trust in...The Future of PKI. Using automation tools and protocols to bootstrap trust in...
The Future of PKI. Using automation tools and protocols to bootstrap trust in...
 
introductiontobiometricsystemssecurity-150607104617-lva1-app6892.pdf
introductiontobiometricsystemssecurity-150607104617-lva1-app6892.pdfintroductiontobiometricsystemssecurity-150607104617-lva1-app6892.pdf
introductiontobiometricsystemssecurity-150607104617-lva1-app6892.pdf
 
Introduction to biometric systems security
Introduction to biometric systems securityIntroduction to biometric systems security
Introduction to biometric systems security
 

Recently uploaded

Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 

Recently uploaded (20)

Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 

A secure Crypto-biometric verification protocol

  • 1. BLIND AUTHENTICATION: A SECURE CRYPTO-BIOMETRIC VERIFICATION PROTOCOL Nishmitha.B
  • 2. CONTENTS 1. Biometrics 2. Biometric Authentication System 3. Comparison of Biometric systems 4. Privacy concerns in Biometric systems 5. What is Blind Authentication? 6. Previous work 7. Features of Blind Authentication 8. Enrollment 9. Authentication 10. Security, Privacy and Trust 11. Extensions to Kernels and Neural networks 12. Blind Secure Product Protocol 13. Implementation and analysis 14. Advantages 15. Conclusion
  • 3. BIOMETRICS A biometric is a physiological or behavioral characteristic of a human being that can distinguish one person from another and that theoretically can be used for identification or verification of identity.
  • 4. AUTHENTICATION WHAT YOU KNOW? WHAT YOU HAVE? WHAT YOU ARE?
  • 6. COMPARISON OF BIOMETRIC SYSTEMS PHYSIOLOGICAL BIOMETRICS 1. Fingerprint recognition a) No two persons share the same fingerprints b) Can go for thermal sensing, optical sensing, capacitance sensing, ultrasound sensing etc. c) Wet, dry, or dirty skin may create problems 2. Face Recognition a) One of the most acceptable biometrics b) Not accurate and dependable
  • 7. 3. Hand Geometry a) Include length and width of fingers, different aspect ratios of palm and fingers, thickness and width of the palm etc. b) Existing hand geometry systems mostly use images of the hand 4. Iris Recognition a) Reliable and accurate b) Believed to be unique in every individual c) Not work for people who are missing both eyes or who have serious eye illnesses that affect the iris.
  • 8. BEHAVIORAL BIOMETRICS 1. Signature a) High degree of acceptance b) Signatures lack permanence c) Static signature verification systems & Dynamic signature verification systems 2. Voice a) Depend on numerous characteristics of a human voice to identify the speaker b) Does not require expensive input devices c) Issues- may skillfully imitate others' voices, record and replay attacks
  • 9. Primary Concerns in a Biometric System Template Protection User's privacy Trust between user and server Network security
  • 10. What is Blind Authentication? A blind authentication protocol that does not reveal any: information about the biometric samples to the authenticating server. information regarding the classifier, employed by the server, to the user or client
  • 11. PREVIOUS WORK Categorization of template protection schemes by Jain
  • 12. SALTING Design a classifier in the encrypted feature space Specific to a biometric trait Security using a transformation function seeded by a user specific key Do not offer well defined security NON-INVERTIBLE TRANSFORM Apply non-invertible function on the biometric template Key must be available at the time of transformation Eg. Robust hashing, Cancelable templates KEY BINDING AND KEY GENERATION Integrate the advantages of biometrics and cryptography Using the biometric as a protection for the secret key or to generate secret key
  • 13. FEATURES OF BLIND AUTHENTICATION Strong encryption Non-repudiable authentication Protection against replay and client-side attacks Revocability
  • 14. ENROLLMENT Enrollment based on a trusted third party(TTP): At the time of registering with a website, the encrypted version of the user’s biometric template is made available to the website. The one-time classifier training is done on the plain biometrics, and hence requires a trusted server to handle training.
  • 15. AUTHENTICATION Blind Authentication Process: Linear kernel computation for encrypted feature vectors. At no point, the identity vectors x, w or the intermediate results xi · wi is revealed to anyone.
  • 16. SECURITY PRIVACY AND TRUST SYSTEM SECURITY  Server Security  Client Security  Network Security PRIVACY  Concern of revealing personal information
  • 17. Server security Hacker gains access to the template database Hacker is in the database server during the authentication Impostor trying blind attacks from a remote machine Client security Hacker gains access to the user’s biometric or private key Passive attack at the user’s computer Network Security Attacker gains access to the network
  • 18. PRIVACY Concern of revealing personal information-Template is never revealed to the server Concern of being tracked-Use different keys for different applications
  • 19. EXTENSIONS TO KERNELS AND NEURAL NETWORKS Kernel based classifier uses a discriminating function like Similarly, in Neural Network the basic units are, for example perceptron and sigmoid Model above functions as arithmetic circuits consisting of add and multiplication gates over a finite domain. Consider two encryptions E+ and E*
  • 20. BLIND SECURE PRODUCT PROTOCOL Receive from client Server computes kn+k random numbers such that Server computes and send it to the client.Client decrypts it. Client computes to the server Server computes Send
  • 21. IMPLEMENTATION AND ANALYSIS Experiments designed to evaluate the efficiency and accuracy of proposed approach. For evaluation, an SVM based verifier based on client- server architecture was implemented. Verification time for various key sizes and feature vector lengths Variation of accuracy w.r.t. The precisionof representation
  • 22. ROC CURVES FOR VERIFICATION
  • 23. ADVANTAGES OF BLIND AUTHENTICATION Fast and Provably Secure authentication without trading off accuracy. Supports generic classifiers such as Neural Network and SVMs. Useful with wide variety of fixed-length biometric- traits. Ideal for applications such as biometric ATMs, login from public terminals.
  • 24. CONCLUSION Verification can be done in real-time with the help of available hardware Keep the interaction between the user and the server to a minimum Extensions to this work includes secure enrollment protocols and encryption methods to reduce computations Dynamic warping based matching of variable length feature vectors can further enhance the utility of the approach
  • 25. REFERENCES N. K. Ratha, J. H. Connell, and R. M. Bolle, “Enhancing security and privacy in biometrics-based authentication systems” Maneesh Upmanyu, Anoop M. Namboodiri, K. Srinathan and C.V. Jawahar,“Blind authentication: A secure crypto-biometric verification protocol”