SlideShare a Scribd company logo
1 of 22
A
Seminar
ON
Blind Authentication: A Secure Crypto-Biometric Authentication
Protocol
OFOF
M.C.A.M.C.A.
ByBy
Pranjul Mishra (2014024000132)Pranjul Mishra (2014024000132)
Under the Guidence of
Mr. M.Hasan
Department of Computer Science and Engineering
Madan Mohan Malaviya University of Technology Session(2015-16)
CONTENTS
1. Biometrics
2. Biometric Authentication System
3. Different types of biometric systems
4. Privacy concerns in Biometric authentication systems
5. What is Blind Authentication ?
6. Features of Blind Authentication
7. Previous work
8. Security, Privacy and Trust
9. Blind Secure Product Protocol
10. Advantages
11. Conclusion
12. References
BIOMETRICS
A biometric is a physiological or behavioral
characteristic of a human being that can
distinguish one person from another and
that can be used for identification or
verification of identity.
Biometric Authentication System
Different type of biometric systems
Primary Concerns in a Biometric
authentication System
1. Template Protection
2. User's privacy
3. Network security
What is Blind Authentication?
A blind authentication protocol that means it
reveals only the identity , and no other
additional information to the user and the
authenticating server.
Key point of Blind Authentication
Use of cryptography primitives to bolster the
authenticating process
Encryption provides protection and ability to
revoke enrolled templates,
Reduced the concern on privacy
PREVIOUS WORK
Categorization of template protection schemes by Jain
SALTING
Invertible function defined by a key or password
Due to compromise Easy to revoke and replace with
new key
No longer secure
NON-INVERTIBLE TRANSFORM
Apply non-invertible function on the biometric template
Key must be available at the time of transformation
Eg. Robust hashing etc.
KEY BINDING AND KEY GENERATION
Computationally to decode the key or the template
It is hard to develop scheme for generate a same key
for different templates of same person.
Process of blind Authentication
1.Feature extraction
2.Enrollment
3.Authentication
ENROLLMENT
ALGORITHM ENROLLMENT
1: Client collects multiple sample of her biometric, B1..k
2: Feature vectors, xi, are computed from each sample
3: Client sends xi, along with her identity and public key
E, to the enrollment server
4: Enrollment server uses xi and the information from
other
users to compute an authenticating classifier (ω, τ) for
the user
5: The classifier parameters are encrypted using the
users public key: E(ωi)
6: E(ωi)s, along with the user’s identity, the encryption
key (E), and the threshold (τ), are sent to the
authentication server for registration
7: The client is then notified about success
AUTHENTICATION
Blind Authentication Process: the identity vectors x, w or the
intermediate results xi · wi is revealed to anyone.
Features of blind authentication
SYSTEM SECURITY

Server Security

Client Security

Network Security
PRIVACY

Concern of revealing personal information

Concern of being tracked
Server security
Hacker gains access to the template database
Client security
Hacker gains access to the user’s biometric or private key
Passive attack at the user’s computer
Concern of revealing personal information-Template is
never revealed to the server.
Privacy
ADVANTAGES OF BLIND AUTHENTICATION
• Fast and Provably Secure authentication without
trading off accuracy.
• Supports generic classifiers such as Neural
Network and SVMs.
• Ideal for applications such as biometric ATMs etc.
CONCLUSION
 Verification can be done in real-time with the help of
available hardware.
 Keep the interaction between the user and the server to a
minimum.
 Extensions to this work includes secure enerollment
protocols and encryption methods to reduce
computations.
REFERENCES
www.wikipedia.org
www.studymafiya.org
THANK YOUTHANK YOU
QUERIES ??QUERIES ??

More Related Content

What's hot

IEEE 2023 - 2024 EMBEDDED SYSTEM TITLES
IEEE 2023 - 2024 EMBEDDED SYSTEM TITLESIEEE 2023 - 2024 EMBEDDED SYSTEM TITLES
IEEE 2023 - 2024 EMBEDDED SYSTEM TITLESArudhra Innovations
 
Face Recognition System for Door Unlocking
Face Recognition System for Door UnlockingFace Recognition System for Door Unlocking
Face Recognition System for Door UnlockingHassan Tariq
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final pptAnkita Vanage
 
Hand Gesture Recognition Using OpenCV Python
Hand Gesture Recognition Using OpenCV Python Hand Gesture Recognition Using OpenCV Python
Hand Gesture Recognition Using OpenCV Python Arijit Mukherjee
 
Design and implementation of qpsk modulator using digital subcarrier
Design and implementation of qpsk modulator using digital subcarrierDesign and implementation of qpsk modulator using digital subcarrier
Design and implementation of qpsk modulator using digital subcarrierGongadi Nagaraju
 
Fingerprint Authentication for ATM
Fingerprint Authentication for ATMFingerprint Authentication for ATM
Fingerprint Authentication for ATMParas Garg
 
Bio atm with-microsoft_finger_print_sdk
Bio atm with-microsoft_finger_print_sdkBio atm with-microsoft_finger_print_sdk
Bio atm with-microsoft_finger_print_sdkMahesh Shitole
 
Steganography Project
Steganography Project Steganography Project
Steganography Project Jitu Choudhary
 
Graphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureGraphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureeSAT Journals
 
Smart dust
Smart dustSmart dust
Smart dustSubhram
 
Biometrics Technology by Capt Awal
Biometrics Technology by Capt AwalBiometrics Technology by Capt Awal
Biometrics Technology by Capt AwalAwal
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentationrs2003
 
biometric payment system authentication
biometric payment system authenticationbiometric payment system authentication
biometric payment system authenticationSaurabh Pandey
 

What's hot (20)

IEEE 2023 - 2024 EMBEDDED SYSTEM TITLES
IEEE 2023 - 2024 EMBEDDED SYSTEM TITLESIEEE 2023 - 2024 EMBEDDED SYSTEM TITLES
IEEE 2023 - 2024 EMBEDDED SYSTEM TITLES
 
Biometrics
BiometricsBiometrics
Biometrics
 
3D Password
3D Password3D Password
3D Password
 
Face Recognition System for Door Unlocking
Face Recognition System for Door UnlockingFace Recognition System for Door Unlocking
Face Recognition System for Door Unlocking
 
3D Password
3D Password3D Password
3D Password
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Hand Gesture Recognition Using OpenCV Python
Hand Gesture Recognition Using OpenCV Python Hand Gesture Recognition Using OpenCV Python
Hand Gesture Recognition Using OpenCV Python
 
Design and implementation of qpsk modulator using digital subcarrier
Design and implementation of qpsk modulator using digital subcarrierDesign and implementation of qpsk modulator using digital subcarrier
Design and implementation of qpsk modulator using digital subcarrier
 
Fingerprint Authentication for ATM
Fingerprint Authentication for ATMFingerprint Authentication for ATM
Fingerprint Authentication for ATM
 
BIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEMBIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEM
 
Bio atm with-microsoft_finger_print_sdk
Bio atm with-microsoft_finger_print_sdkBio atm with-microsoft_finger_print_sdk
Bio atm with-microsoft_finger_print_sdk
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Graphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureGraphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signature
 
Smart dust
Smart dustSmart dust
Smart dust
 
Biometrics Technology by Capt Awal
Biometrics Technology by Capt AwalBiometrics Technology by Capt Awal
Biometrics Technology by Capt Awal
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryption
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
biometric payment system authentication
biometric payment system authenticationbiometric payment system authentication
biometric payment system authentication
 
Smart Fabrics-ppt
Smart Fabrics-pptSmart Fabrics-ppt
Smart Fabrics-ppt
 

Viewers also liked

Brillo operating system(os)
Brillo operating system(os)Brillo operating system(os)
Brillo operating system(os)dipakshelkepatil
 
Wearable Biosensors Presentation
Wearable Biosensors PresentationWearable Biosensors Presentation
Wearable Biosensors PresentationShubham Rokade
 
Project Seminar on Leapmotion Technology
Project Seminar on Leapmotion TechnologyProject Seminar on Leapmotion Technology
Project Seminar on Leapmotion TechnologyAbhijit Dey
 
Domain-Driven Data
Domain-Driven DataDomain-Driven Data
Domain-Driven DataDATAVERSITY
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptographySukhdeep Kaur
 
EmoSpark
EmoSparkEmoSpark
EmoSparkAnand
 
FREE SPACE OPTICAL COMMUNICATION
FREE SPACE OPTICAL COMMUNICATIONFREE SPACE OPTICAL COMMUNICATION
FREE SPACE OPTICAL COMMUNICATIONAkhil Kumar
 
Airborne Internet
Airborne InternetAirborne Internet
Airborne InternetLokesh Loke
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptographyPriya Winsome
 
PPT on Wireless charging of mobile using microwaves
PPT on Wireless charging of mobile using microwavesPPT on Wireless charging of mobile using microwaves
PPT on Wireless charging of mobile using microwavesDivya KJ
 
Wireless charging of mobilephones
Wireless charging of  mobilephonesWireless charging of  mobilephones
Wireless charging of mobilephonesPRADEEP Cheekatla
 

Viewers also liked (20)

Report11402
Report11402Report11402
Report11402
 
Delve and Office Graph
Delve and Office GraphDelve and Office Graph
Delve and Office Graph
 
Brillo operating system(os)
Brillo operating system(os)Brillo operating system(os)
Brillo operating system(os)
 
Emo spark
Emo sparkEmo spark
Emo spark
 
E call ppt
E call pptE call ppt
E call ppt
 
Wearable Biosensors Presentation
Wearable Biosensors PresentationWearable Biosensors Presentation
Wearable Biosensors Presentation
 
Smart street light system
Smart street light systemSmart street light system
Smart street light system
 
Project Seminar on Leapmotion Technology
Project Seminar on Leapmotion TechnologyProject Seminar on Leapmotion Technology
Project Seminar on Leapmotion Technology
 
Domain-Driven Data
Domain-Driven DataDomain-Driven Data
Domain-Driven Data
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
EmoSpark
EmoSparkEmoSpark
EmoSpark
 
JINI Technology
JINI TechnologyJINI Technology
JINI Technology
 
FREE SPACE OPTICAL COMMUNICATION
FREE SPACE OPTICAL COMMUNICATIONFREE SPACE OPTICAL COMMUNICATION
FREE SPACE OPTICAL COMMUNICATION
 
Airborne Internet
Airborne InternetAirborne Internet
Airborne Internet
 
3d search
3d search3d search
3d search
 
Wireless Charging
Wireless ChargingWireless Charging
Wireless Charging
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
PPT on Wireless charging of mobile using microwaves
PPT on Wireless charging of mobile using microwavesPPT on Wireless charging of mobile using microwaves
PPT on Wireless charging of mobile using microwaves
 
Wireless charging of mobilephones
Wireless charging of  mobilephonesWireless charging of  mobilephones
Wireless charging of mobilephones
 
Leap motion
Leap motionLeap motion
Leap motion
 

Similar to Blind authentication

MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...ijcisjournal
 
Final Report Biometrics
Final Report BiometricsFinal Report Biometrics
Final Report Biometricsanoop80686
 
Continuous User Identity Verification through Secure Login Session
 	  Continuous User Identity Verification through Secure Login Session 	  Continuous User Identity Verification through Secure Login Session
Continuous User Identity Verification through Secure Login SessionIRJET Journal
 
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...Harikrishna Patel
 
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...IJCSIS Research Publications
 
MasterClass Login Using Biometric Authentication.docx
MasterClass Login Using Biometric Authentication.docxMasterClass Login Using Biometric Authentication.docx
MasterClass Login Using Biometric Authentication.docxNelSon186520
 
Privacypreservingauthenticationbiometrics 100228075830-phpapp02
Privacypreservingauthenticationbiometrics 100228075830-phpapp02Privacypreservingauthenticationbiometrics 100228075830-phpapp02
Privacypreservingauthenticationbiometrics 100228075830-phpapp02Hai Nguyen
 
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATIONAN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATIONIJCNCJournal
 
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATIONAN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATIONIJCNCJournal
 
Enhancing Security and Efficiency The Power of Biometric Access Control Systems
Enhancing Security and Efficiency The Power of Biometric Access Control SystemsEnhancing Security and Efficiency The Power of Biometric Access Control Systems
Enhancing Security and Efficiency The Power of Biometric Access Control SystemsStar Link Communication Pvt Ltd
 
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...Editor IJCATR
 
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...IJNSA Journal
 
An Overview of Biometric Template Security Techniques
An Overview of Biometric Template Security TechniquesAn Overview of Biometric Template Security Techniques
An Overview of Biometric Template Security TechniquesIJCSIS Research Publications
 
Privacy Preserving Biometrics-Based and User Centric Authentication Protocol
Privacy Preserving Biometrics-Based and User Centric Authentication ProtocolPrivacy Preserving Biometrics-Based and User Centric Authentication Protocol
Privacy Preserving Biometrics-Based and User Centric Authentication ProtocolHasiniG
 
Us20140380431 Patent: COMPUTER IMPLEMENTED METHOD TO PREVENT ATTACKS AGAINST...
Us20140380431 Patent: COMPUTER IMPLEMENTED METHOD TO  PREVENT ATTACKS AGAINST...Us20140380431 Patent: COMPUTER IMPLEMENTED METHOD TO  PREVENT ATTACKS AGAINST...
Us20140380431 Patent: COMPUTER IMPLEMENTED METHOD TO PREVENT ATTACKS AGAINST...Telefónica
 

Similar to Blind authentication (20)

IS - User Authentication
IS - User AuthenticationIS - User Authentication
IS - User Authentication
 
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...
 
Final Report Biometrics
Final Report BiometricsFinal Report Biometrics
Final Report Biometrics
 
Continuous User Identity Verification through Secure Login Session
 	  Continuous User Identity Verification through Secure Login Session 	  Continuous User Identity Verification through Secure Login Session
Continuous User Identity Verification through Secure Login Session
 
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
 
term 2
term 2term 2
term 2
 
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...
 
MasterClass Login Using Biometric Authentication.docx
MasterClass Login Using Biometric Authentication.docxMasterClass Login Using Biometric Authentication.docx
MasterClass Login Using Biometric Authentication.docx
 
Privacypreservingauthenticationbiometrics 100228075830-phpapp02
Privacypreservingauthenticationbiometrics 100228075830-phpapp02Privacypreservingauthenticationbiometrics 100228075830-phpapp02
Privacypreservingauthenticationbiometrics 100228075830-phpapp02
 
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATIONAN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
 
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATIONAN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
 
(2007) Privacy Preserving Multi-Factor Authentication with Biometrics
(2007) Privacy Preserving Multi-Factor Authentication with Biometrics(2007) Privacy Preserving Multi-Factor Authentication with Biometrics
(2007) Privacy Preserving Multi-Factor Authentication with Biometrics
 
Enhancing Security and Efficiency The Power of Biometric Access Control Systems
Enhancing Security and Efficiency The Power of Biometric Access Control SystemsEnhancing Security and Efficiency The Power of Biometric Access Control Systems
Enhancing Security and Efficiency The Power of Biometric Access Control Systems
 
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...
 
An Overview of Biometric Template Security Techniques
An Overview of Biometric Template Security TechniquesAn Overview of Biometric Template Security Techniques
An Overview of Biometric Template Security Techniques
 
Biometrics
BiometricsBiometrics
Biometrics
 
Privacy Preserving Biometrics-Based and User Centric Authentication Protocol
Privacy Preserving Biometrics-Based and User Centric Authentication ProtocolPrivacy Preserving Biometrics-Based and User Centric Authentication Protocol
Privacy Preserving Biometrics-Based and User Centric Authentication Protocol
 
Us20140380431 Patent: COMPUTER IMPLEMENTED METHOD TO PREVENT ATTACKS AGAINST...
Us20140380431 Patent: COMPUTER IMPLEMENTED METHOD TO  PREVENT ATTACKS AGAINST...Us20140380431 Patent: COMPUTER IMPLEMENTED METHOD TO  PREVENT ATTACKS AGAINST...
Us20140380431 Patent: COMPUTER IMPLEMENTED METHOD TO PREVENT ATTACKS AGAINST...
 

Recently uploaded

VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoordharasingh5698
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 

Recently uploaded (20)

VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 

Blind authentication

  • 1. A Seminar ON Blind Authentication: A Secure Crypto-Biometric Authentication Protocol OFOF M.C.A.M.C.A. ByBy Pranjul Mishra (2014024000132)Pranjul Mishra (2014024000132) Under the Guidence of Mr. M.Hasan Department of Computer Science and Engineering Madan Mohan Malaviya University of Technology Session(2015-16)
  • 2. CONTENTS 1. Biometrics 2. Biometric Authentication System 3. Different types of biometric systems 4. Privacy concerns in Biometric authentication systems 5. What is Blind Authentication ? 6. Features of Blind Authentication 7. Previous work 8. Security, Privacy and Trust 9. Blind Secure Product Protocol 10. Advantages 11. Conclusion 12. References
  • 3. BIOMETRICS A biometric is a physiological or behavioral characteristic of a human being that can distinguish one person from another and that can be used for identification or verification of identity.
  • 5. Different type of biometric systems
  • 6. Primary Concerns in a Biometric authentication System 1. Template Protection 2. User's privacy 3. Network security
  • 7. What is Blind Authentication? A blind authentication protocol that means it reveals only the identity , and no other additional information to the user and the authenticating server.
  • 8. Key point of Blind Authentication Use of cryptography primitives to bolster the authenticating process Encryption provides protection and ability to revoke enrolled templates, Reduced the concern on privacy
  • 9. PREVIOUS WORK Categorization of template protection schemes by Jain
  • 10. SALTING Invertible function defined by a key or password Due to compromise Easy to revoke and replace with new key No longer secure NON-INVERTIBLE TRANSFORM Apply non-invertible function on the biometric template Key must be available at the time of transformation Eg. Robust hashing etc. KEY BINDING AND KEY GENERATION Computationally to decode the key or the template It is hard to develop scheme for generate a same key for different templates of same person.
  • 11. Process of blind Authentication 1.Feature extraction 2.Enrollment 3.Authentication
  • 13. ALGORITHM ENROLLMENT 1: Client collects multiple sample of her biometric, B1..k 2: Feature vectors, xi, are computed from each sample 3: Client sends xi, along with her identity and public key E, to the enrollment server 4: Enrollment server uses xi and the information from other users to compute an authenticating classifier (ω, τ) for the user 5: The classifier parameters are encrypted using the users public key: E(ωi) 6: E(ωi)s, along with the user’s identity, the encryption key (E), and the threshold (τ), are sent to the authentication server for registration 7: The client is then notified about success
  • 14. AUTHENTICATION Blind Authentication Process: the identity vectors x, w or the intermediate results xi · wi is revealed to anyone.
  • 15. Features of blind authentication SYSTEM SECURITY  Server Security  Client Security  Network Security PRIVACY  Concern of revealing personal information  Concern of being tracked
  • 16. Server security Hacker gains access to the template database Client security Hacker gains access to the user’s biometric or private key Passive attack at the user’s computer
  • 17. Concern of revealing personal information-Template is never revealed to the server. Privacy
  • 18. ADVANTAGES OF BLIND AUTHENTICATION • Fast and Provably Secure authentication without trading off accuracy. • Supports generic classifiers such as Neural Network and SVMs. • Ideal for applications such as biometric ATMs etc.
  • 19. CONCLUSION  Verification can be done in real-time with the help of available hardware.  Keep the interaction between the user and the server to a minimum.  Extensions to this work includes secure enerollment protocols and encryption methods to reduce computations.