SlideShare a Scribd company logo
1 of 42
BIOMETRIC ENCRYPTION
PRESENTED BY
Divya Kottikkal
• INTRODUCTION
• BIOMETRICS
• CRYPTOGRAPHY
• BIOMETRIC ENCRYPTION
• BIOMETRIC ENCRYPTION ALGORITHM
• ADVANTAGES
• APPLICATION
• SUMMARY
INTRODUCTION
• There are billions of computers in the
world and they are connected to each
other.
• Security becomes a critical problem that
must be solved by new reliable and
robust identification, verification or
cryptographic techniques
• Traditional password or user-id systems
are not secure enough to provide full
access control to a system.
• In order to improve the security of such
systems biometric information could be
incorporated into the passwords.
BIOMETRICS
• A biometric is defined as a
unique, measurable, biological
characteristic for recognizing or
verifying the identity of a human
being.
• Statistically analyzing these
biological characteristics is
known as the science of
biometrics.
• Biometric technologies for security includes
recognition of
• Faces
• Fingerprints
• Voice
• Signature strokes
• Iris and retina scans
• Keystroke patterns
• Ear shape
• DNA
• Body odor
• Gait.
• Biometric identification consists of two
stages
Enrollment
Verification/identification
ENROLLMENT
• In enrollment stage, a sample of the
biometric is acquired.
• In order to decrease the high
dimensionality ,a feature extraction phase
is applied and form a template of the
biometric.
VERIFICATION
• In verification phase, these features are
compared with the previously generated
biometric template.
CRYPTOGRAPHY
• Cryptography is an important
feature of computer security.
• Encryption refers to algorithmic
schemes that encode plain text
into non-readable form or
cyphertext using a “key” providing
privacy.
• The receiver of the encrypted text
uses a "key" to decrypt the
message, returning it to its
original plain text form.
• In this scheme ,the security is dependent on
the secrecy of the secret or private key.
• Security of the cryptographic key is weak due
to practical problems of remembering various
passcodes or writing them down to avoid data
loss.
• Since the passcode is not directly tied to a
user, the system is unable to differentiate
between the legitimate user and the attacker.
• Solution for this problem is
‘Biometric Encryption’.
BIOMETRIC
ENCRYPTION (BE)
• Biometric Encryption is a process that securely
binds a PIN or a cryptographic key to a
biometric, so that neither the key nor the
biometric can be retrieved from the stored
template.
• The key is re-created only if the correct live
biometric sample is presented on verification.
• Two phases
ENROLLMENT
VERIFICATION
ENROLLMENT
110011001011…
……………..110
01011001…01
Randomly generated key
Biometrically-encrypted key is stored
Biometric Image
100110100010…
………………010
Biometric Template
BE binding
algorithm
VERIFICATION
101100101010…
………………000
Fresh Biometric Template
110011001011…
……………..110
Biometrically-encrypted key
BE retrieval
algorithm
01011001…01
Key retrieved
Fresh Biometric Image
BIOMETRIC
ENCRYPTION
ALGORITHM
• The objective of the Biometric
Encryption algorithm is to provide a
mechanism for the linking and retrieval
of a digital key using a biometric.
• Biometric might be fingerprint,
palmprint, face, iris or retina.
• The resulting digital key is then used as
a cryptographic key.
ALGORITHM
• Correlation function
• Enrollment phase
• Verification phase
CORRELATION
• Algorithm uses the entire image instead
of using a feature-based approach.
• In order to present the biometric input ,a
correlation mechanism is applied.
• The correlation between the input
image f1(x) and the obtained image
during the verification phase f0(x) is
formally defined as
c( x) = FT− 1
{F1( X) F0( X) }
FT -Fourier Transform
• The process of the Biometric Encryption
does not extract a simple True/False
system
• It produces a more sophisticated output
pattern which is linked during
enrollment
with a digital key and subsequently
regenerated during verification to
retrieve the same key.
ENROLLMENT
• Enrollment phase contains three
stages.
E-1: Image Processing
E-2: Key linking
E-3: Identification code creation
FT
FT-1
Hstored(u)
id0
filter function
identification code
Link
Algorithm
STAGE
E-2
k0
n-bit key
of filter
c 0(x)
output
pattern
S
bits
of
filter
STAGE E-3
Identification code creation
STAGE E-1
IMAGE PROCESSING
• E-1: Image Processing Combine a
series of input fingerprint images with a
random (phase) array to create two
output arrays: Hstored
(u) and c0
(x).
• E-2: Key linking Link a cryptographic
key, k0
, to the pattern, c0
(x), via the link
algorithm.
• E-3: Identification code creation
Create an identification code, id0
,
derived from the key, k0
.
VERIFICATION
• Verification phase contains three stages
V-1: Image Processing
V-2: Key Retrieval
V-3: Validation
Retrieval
Algorithm
FT
STAGE
C1(x)
output
pattern
STAGE V-1
IMAGE PROCESSING
STAGE V-3
k1
bits
S
of
filter
id1compareid0
Hstored(u)
filter function
FT
-1
V-2
• V-1: Image Processing Combine
Hstored
(u), from the Bioscrypt, with a new
series of input fingerprint images to
create an output pattern, c1
(x).
• V-2: Key Retrieval Extract a key, k1
,
from c1
(x) using the retrieval algorithm.
• V-3: Validate the key.
ADVANTAGES
BE technologies can enhance privacy and security.
Some key advantages offered:
1. NO Retention of biometric image or template
2. Multiple / cancelable / revocable identifiers
3. Improved authentication security: stronger binding
of user biometric & system identifier
4. Improved security of personal data and
communications
5. Greater public confidence, acceptance, use à
compliance with privacy & data protection laws
1.No Retention of biometric image
or template
• Most privacy and security concerns derive
from storage and misuse of the biometric
data.
• User retains control and use of their own
biometric
2.Multiple / cancelable / revocable
identifiers
• BE allows individuals to use one biometric for multiple
accounts and identifiers without fear that identifiers will be
linked together.
• If an account identifier becomes compromised, there is less
risk that all the other accounts will be compromised, i.e.,
no need to change one's fingers.
• BE technologies make possible the ability to change or
recomputed account identifiers; identifiers can be revoked
or cancelled, and substituted for newly generated ones
calculated from the same biometric.
3.Improved authentication
security
• Stronger binding of user biometric &
system identifier
• Results are much stronger account
identifiers:
– longer, more complex identifiers
– no need for user memorization
– less susceptible to security attacks
4.Improved security of personal
data and communications
• Since the key is one's own biometric, used
locally, this technology could place a
powerful tool in the hands of individuals
APPLICATIONS
• Biometric ticketing for events
• Biometric boarding cards for air travel
• Identification, credit and loyalty card systems
• “Anonymous” (untraceable) labeling of sensitive
records (medical, financial)
• Consumer biometric payment systems
• Access control to personal computing devices
• Personal encryption products
• Local or remote authentication to access files held
by government and other various organizations
SUMMARY
• BE technologies exemplify the fundamental
privacy and data protection principles
• Although introducing biometrics into
information systems may result in
considerable benefits, it can also introduce
many new security and privacy vulnerabilities,
risks, and concerns.
• Novel Biometric Encryption techniques can
overcome many of those risks and
vulnerabilities, resulting distinct advantages
to both security and privacy.
Biometric encryption

More Related Content

What's hot

Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication TechniqueRekha Yadav
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and SecurityShreyans Jain
 
Biometrics Technology by Capt Awal
Biometrics Technology by Capt AwalBiometrics Technology by Capt Awal
Biometrics Technology by Capt AwalAwal
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology Niharika Gupta
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsUsman Sheikh
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognitionvarsha mohite
 
Thesis presentation ist
Thesis presentation istThesis presentation ist
Thesis presentation istdeep sharma
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final pptAnkita Vanage
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshareprachi
 
Biometrics
BiometricsBiometrics
Biometricssenejug
 
Biometrics and Multi-Factor Authentication, The Unleashed Dragon
Biometrics and Multi-Factor Authentication, The Unleashed DragonBiometrics and Multi-Factor Authentication, The Unleashed Dragon
Biometrics and Multi-Factor Authentication, The Unleashed DragonClare Nelson, CISSP, CIPP-E
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology Ketan Sawakare
 

What's hot (20)

Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Technology In the 21st Century
Biometrics Technology In the 21st CenturyBiometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Ear Biometrics
Ear BiometricsEar Biometrics
Ear Biometrics
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and Security
 
Biometrics Technology by Capt Awal
Biometrics Technology by Capt AwalBiometrics Technology by Capt Awal
Biometrics Technology by Capt Awal
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 
Biometrics
BiometricsBiometrics
Biometrics
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Thesis presentation ist
Thesis presentation istThesis presentation ist
Thesis presentation ist
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
 
Bio cryptography
Bio cryptographyBio cryptography
Bio cryptography
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics and Multi-Factor Authentication, The Unleashed Dragon
Biometrics and Multi-Factor Authentication, The Unleashed DragonBiometrics and Multi-Factor Authentication, The Unleashed Dragon
Biometrics and Multi-Factor Authentication, The Unleashed Dragon
 
Biometrics Security System
Biometrics Security SystemBiometrics Security System
Biometrics Security System
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 

Similar to Biometric encryption

A secure Crypto-biometric verification protocol
A secure Crypto-biometric verification protocol A secure Crypto-biometric verification protocol
A secure Crypto-biometric verification protocol Nishmitha B
 
13 biometrics - fool proof security
13 biometrics  - fool proof security13 biometrics  - fool proof security
13 biometrics - fool proof securitySrikanth457
 
Biometric Access Control System .pdf
Biometric Access Control System .pdfBiometric Access Control System .pdf
Biometric Access Control System .pdftekfardeen
 
BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptxBIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptxSundusKhan42
 
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...Harikrishna Patel
 
Bank locker system
Bank locker systemBank locker system
Bank locker systemRahul Wagh
 
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptxSEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx1A255Gauravwankar
 
MasterClass Login Using Biometric Authentication.docx
MasterClass Login Using Biometric Authentication.docxMasterClass Login Using Biometric Authentication.docx
MasterClass Login Using Biometric Authentication.docxNelSon186520
 
Biometric ATM (1).pptx
Biometric ATM (1).pptxBiometric ATM (1).pptx
Biometric ATM (1).pptxPavani839789
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical BiometricJorge Sebastiao
 
Understanding Biometric Template Protection.pdf
Understanding Biometric Template Protection.pdfUnderstanding Biometric Template Protection.pdf
Understanding Biometric Template Protection.pdfBahaa Abdulhadi
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bmbranjith
 
We Know Your Type
We Know Your TypeWe Know Your Type
We Know Your TypeCTIN
 

Similar to Biometric encryption (20)

Biometrics
BiometricsBiometrics
Biometrics
 
A secure Crypto-biometric verification protocol
A secure Crypto-biometric verification protocol A secure Crypto-biometric verification protocol
A secure Crypto-biometric verification protocol
 
13 biometrics - fool proof security
13 biometrics  - fool proof security13 biometrics  - fool proof security
13 biometrics - fool proof security
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
term 2
term 2term 2
term 2
 
Blind authentication
Blind authenticationBlind authentication
Blind authentication
 
Biometric Access Control System .pdf
Biometric Access Control System .pdfBiometric Access Control System .pdf
Biometric Access Control System .pdf
 
BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptxBIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
 
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
 
Bank locker system
Bank locker systemBank locker system
Bank locker system
 
Embedded system
Embedded systemEmbedded system
Embedded system
 
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptxSEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
 
MasterClass Login Using Biometric Authentication.docx
MasterClass Login Using Biometric Authentication.docxMasterClass Login Using Biometric Authentication.docx
MasterClass Login Using Biometric Authentication.docx
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
 
Biometric ATM (1).pptx
Biometric ATM (1).pptxBiometric ATM (1).pptx
Biometric ATM (1).pptx
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical Biometric
 
Security
SecuritySecurity
Security
 
Understanding Biometric Template Protection.pdf
Understanding Biometric Template Protection.pdfUnderstanding Biometric Template Protection.pdf
Understanding Biometric Template Protection.pdf
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 
We Know Your Type
We Know Your TypeWe Know Your Type
We Know Your Type
 

Recently uploaded

Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 

Recently uploaded (20)

Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 

Biometric encryption

  • 2. • INTRODUCTION • BIOMETRICS • CRYPTOGRAPHY • BIOMETRIC ENCRYPTION • BIOMETRIC ENCRYPTION ALGORITHM • ADVANTAGES • APPLICATION • SUMMARY
  • 4. • There are billions of computers in the world and they are connected to each other. • Security becomes a critical problem that must be solved by new reliable and robust identification, verification or cryptographic techniques • Traditional password or user-id systems are not secure enough to provide full access control to a system. • In order to improve the security of such systems biometric information could be incorporated into the passwords.
  • 6. • A biometric is defined as a unique, measurable, biological characteristic for recognizing or verifying the identity of a human being. • Statistically analyzing these biological characteristics is known as the science of biometrics.
  • 7. • Biometric technologies for security includes recognition of • Faces • Fingerprints • Voice • Signature strokes • Iris and retina scans • Keystroke patterns • Ear shape • DNA • Body odor • Gait.
  • 8.
  • 9. • Biometric identification consists of two stages Enrollment Verification/identification
  • 10. ENROLLMENT • In enrollment stage, a sample of the biometric is acquired. • In order to decrease the high dimensionality ,a feature extraction phase is applied and form a template of the biometric.
  • 11. VERIFICATION • In verification phase, these features are compared with the previously generated biometric template.
  • 13. • Cryptography is an important feature of computer security. • Encryption refers to algorithmic schemes that encode plain text into non-readable form or cyphertext using a “key” providing privacy. • The receiver of the encrypted text uses a "key" to decrypt the message, returning it to its original plain text form.
  • 14. • In this scheme ,the security is dependent on the secrecy of the secret or private key. • Security of the cryptographic key is weak due to practical problems of remembering various passcodes or writing them down to avoid data loss. • Since the passcode is not directly tied to a user, the system is unable to differentiate between the legitimate user and the attacker. • Solution for this problem is ‘Biometric Encryption’.
  • 16. • Biometric Encryption is a process that securely binds a PIN or a cryptographic key to a biometric, so that neither the key nor the biometric can be retrieved from the stored template. • The key is re-created only if the correct live biometric sample is presented on verification.
  • 18. ENROLLMENT 110011001011… ……………..110 01011001…01 Randomly generated key Biometrically-encrypted key is stored Biometric Image 100110100010… ………………010 Biometric Template BE binding algorithm
  • 21. • The objective of the Biometric Encryption algorithm is to provide a mechanism for the linking and retrieval of a digital key using a biometric. • Biometric might be fingerprint, palmprint, face, iris or retina. • The resulting digital key is then used as a cryptographic key.
  • 22. ALGORITHM • Correlation function • Enrollment phase • Verification phase
  • 23. CORRELATION • Algorithm uses the entire image instead of using a feature-based approach. • In order to present the biometric input ,a correlation mechanism is applied.
  • 24. • The correlation between the input image f1(x) and the obtained image during the verification phase f0(x) is formally defined as c( x) = FT− 1 {F1( X) F0( X) } FT -Fourier Transform
  • 25. • The process of the Biometric Encryption does not extract a simple True/False system • It produces a more sophisticated output pattern which is linked during enrollment with a digital key and subsequently regenerated during verification to retrieve the same key.
  • 26. ENROLLMENT • Enrollment phase contains three stages. E-1: Image Processing E-2: Key linking E-3: Identification code creation
  • 27. FT FT-1 Hstored(u) id0 filter function identification code Link Algorithm STAGE E-2 k0 n-bit key of filter c 0(x) output pattern S bits of filter STAGE E-3 Identification code creation STAGE E-1 IMAGE PROCESSING
  • 28. • E-1: Image Processing Combine a series of input fingerprint images with a random (phase) array to create two output arrays: Hstored (u) and c0 (x). • E-2: Key linking Link a cryptographic key, k0 , to the pattern, c0 (x), via the link algorithm. • E-3: Identification code creation Create an identification code, id0 , derived from the key, k0 .
  • 29. VERIFICATION • Verification phase contains three stages V-1: Image Processing V-2: Key Retrieval V-3: Validation
  • 30. Retrieval Algorithm FT STAGE C1(x) output pattern STAGE V-1 IMAGE PROCESSING STAGE V-3 k1 bits S of filter id1compareid0 Hstored(u) filter function FT -1 V-2
  • 31. • V-1: Image Processing Combine Hstored (u), from the Bioscrypt, with a new series of input fingerprint images to create an output pattern, c1 (x). • V-2: Key Retrieval Extract a key, k1 , from c1 (x) using the retrieval algorithm. • V-3: Validate the key.
  • 33. BE technologies can enhance privacy and security. Some key advantages offered: 1. NO Retention of biometric image or template 2. Multiple / cancelable / revocable identifiers 3. Improved authentication security: stronger binding of user biometric & system identifier 4. Improved security of personal data and communications 5. Greater public confidence, acceptance, use à compliance with privacy & data protection laws
  • 34. 1.No Retention of biometric image or template • Most privacy and security concerns derive from storage and misuse of the biometric data. • User retains control and use of their own biometric
  • 35. 2.Multiple / cancelable / revocable identifiers • BE allows individuals to use one biometric for multiple accounts and identifiers without fear that identifiers will be linked together. • If an account identifier becomes compromised, there is less risk that all the other accounts will be compromised, i.e., no need to change one's fingers. • BE technologies make possible the ability to change or recomputed account identifiers; identifiers can be revoked or cancelled, and substituted for newly generated ones calculated from the same biometric.
  • 36. 3.Improved authentication security • Stronger binding of user biometric & system identifier • Results are much stronger account identifiers: – longer, more complex identifiers – no need for user memorization – less susceptible to security attacks
  • 37. 4.Improved security of personal data and communications • Since the key is one's own biometric, used locally, this technology could place a powerful tool in the hands of individuals
  • 39. • Biometric ticketing for events • Biometric boarding cards for air travel • Identification, credit and loyalty card systems • “Anonymous” (untraceable) labeling of sensitive records (medical, financial) • Consumer biometric payment systems • Access control to personal computing devices • Personal encryption products • Local or remote authentication to access files held by government and other various organizations
  • 41. • BE technologies exemplify the fundamental privacy and data protection principles • Although introducing biometrics into information systems may result in considerable benefits, it can also introduce many new security and privacy vulnerabilities, risks, and concerns. • Novel Biometric Encryption techniques can overcome many of those risks and vulnerabilities, resulting distinct advantages to both security and privacy.