SlideShare a Scribd company logo
1 of 23
A HYBRID APPROACH FOR
GENERATING BINARY SECURED FACE
TEMPLATE (BDA)
Dhananjay Dewangan
Hybrid Approach
• Combination of both methods, Biometric
cryptosystem and cancellable biometrics.
Binary Discriminant Analysis
• The rationale of the proposed method is to use a set
of n linear discriminant function to transform a real-
valued template into a n dimensional binary face
template.
Binary Discriminant Analysis
• The key issue is how to find the optimal linear
discriminant functions so that the discriminability of
the binary templates is maximized.
• To maximize the discriminability Between class
variance should be maximum and Within class
variance should be minimum.
• To minimize within class variance, we use perceptron
learning rule
• To maximize between class variance we make use of
BCH codes.
Perceptron Learning Rule
• The perceptron is employed to find optimal linear
discriminant function (LDFs) so that the output binary
templates are close to the corresponding target binary
template. Thus, the within-class variance of the binary
templates is minimized.
• If two classes C1 and C0 are linearly separable, a linear
discriminant function
g(x) = wTx + t
is constructed so that for a random sample in these two
classes,
g(x) > 0, if x Ɛ C1
g(x) ≤ 0, if x Ɛ C0
Proposed Method - Enrolment
BCH Codes
(255,37,45)
Feature
Extraction
(DCT)
Perceptron
Learning Rule
Compare
SHA-256
Database (Stores Hashed Password and
Weight & Bias matrix)
Weight & Bias
Password (5 digit)
Alphanumeric
Biometric
Template( Face)
Identical
Not Identical
Proposed Method - Authentication
Feature Extraction
• In our project we are using DCT transform for
feature extraction.
Feature Extraction
• DCT Coefficient Scanning Order
Currently we are using first approx 500 coefficients in zig
zag order but it can be reduced to less number by taking
large no of sample of same facial image varying its
Illumination, Pose, Expression and Lighting conditions.
• BCH Codes
In our project, we have used BCH [255,37,45]
code.
• Hashing Algorithm
We have used SHA 256 hash algorithm to
secure the confidential data(password).
• Pre-processing
We have taken 256 bit length BCH code and
SHA 256 takes input length 512 bit hence we
need to preprocess it. Append the bit '1' to
the message .Append k bits '0', where k is the
minimum number >= 0 such that the resulting
message length (modulo 512 in bits) is
448.Append length of message (without the
'1' bit or padding), in bits, as 64-bit big-endian
integer (this will make the entire post-
processed length a multiple of 512 bits)
Performance Analysis
Image Database
Image Database contains two types of database
• Password – Secured Hash
• Weight & Bias matrix – Adjusted in binary
format.
Image Database (cont)
Experimental Analysis
• Between Class Variance
The BCH coding scheme preserves the
minimum hamming distance between its each
code. For BCH (255, 37, 45), the minimum
hamming distance is (2x45+1)=91 and the
corresponding variance is (91)^2/4 which can
be considered as strong between class
variance and also helps to improve
performance of our biometric cryptosystems.
Experimental Analysis
• Within Class Variance
In our project we have taken more number of
images of each individual having different pose
and expression. As the no of image increases, the
correlation between them also increases which
leads to less variance. . Another importance of
having more images of each individual is
decrease in storage requirements since only few
DCT coefficients or low frequency components
need to be retained.
Experimental Analysis
• Revocability
In our project we have adopted the BCH coding
scheme as a target which is further stored in the
database after employing hashing technique such
as SHA-256 for security purpose. This coding
scheme is applied over the user’s password. So if
the password is changed in case of templates
compromisation, its BCH code will be changed
and their corresponding hash will also be
changed which leads to a different data in the
database to be stored
Experimental Analysis
• Performance
In our project, database contains not directly
images but secured binary representation of
such images. So we can conclude that the
binarization and their hash don’t affect the
actual performance of our biometric
cryptosystem.
Experimental Analysis
• Security
In our project, we have used SHA-256 to
accommodate the security of face template
which provides the security level over birthday
attack of 2^128 which is quite enough for any
moderate level application.
Experimental Analysis
• Diversity
Since SHA algorithm is noninvertible and the
weight and bias matrix doesn’t reveal any information,
the imposter has to make an attempt for both what the
password is and what the relevant face should look
like. Therefore the brute-force attack is nearly
impossible for 5 digit password (94^5) consisting 94
different alphanumeric key. Since it is a two stage
verification systems, it provides enough security and
strong diversity for moderate level application.
Future Scope
• In order to achieve higher level of security, more
number of biometric traits are required to
authenticate whether the user is genuine or
imposter. So multimodal biometric cryptosystem
can be implemented by the same proposed
method along with other biometric traits.
• For higher level of security ,BCH coding schemes
and corresponding hashing techniques can be
changed to more number of bits as per
application requirements and number of users
References
 S. Prabhakar, S. Pankanti, and A. K. Jain, “Biometric
Recognition: Security and Privacy Concerns,” IEEE Security and
Privacy Magazine, Vol. 1, No. 2, pp. 33-42, March-April 2003.
 Anil K Jain, Ajay Kumar, Biometrics on Next Generation: An
Overview.
 Jain AK, Nandakumar K, and Nagar A (2008) Biometric
template security. EURASIP J Advances n Signal Processing,
Special issue on Biometrics.
 A. K. Jain, K. Nandakumar and A. Nagar, "Biometric Template
Security", EURASIP Journal on Advances in Signal Processing,
January 2008.
 Stelvio Cimato, Marco Gamassi, Vincenzo Piuri, Roberto Sassi
and Fabio Scotti, Privacy in Biometrics.
References
 A. Teoh Beng Jin, D. Ngo Chek Ling, and A. Goh. Biohashing:
two factor authentication featuring fingerprint data and
tokenised random number. Pattern recognition, 37(11):2245–
2255, 2004.
 Hossein Malekinezhad, Hossein Ebrahimpour-Komleh,
Protecting Biometric-based Authentication Systems against
Indirect Attacks.
 Hossein Malekinezhad, Hossein Ebrahimpour-Komleh, Fractal
Technique for Face Recognition.
 Y C Feng1, Pong C Yuen1and Anil K Jain, A Hybrid Approach for
Face Template Protection.
 Andrew B.J. Teoha, Yip Wai Kuan b Sangyoun Lee a,
Cancellable biometrics and annotations on BioHash, Pattern
Recognition 41 (2008) 2034 – 2044.

More Related Content

What's hot

A Hybrid Approach for Ensuring Security in Data Communication
A Hybrid Approach for Ensuring Security in Data Communication A Hybrid Approach for Ensuring Security in Data Communication
A Hybrid Approach for Ensuring Security in Data Communication cscpconf
 
Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual...
Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual...Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual...
Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual...TELKOMNIKA JOURNAL
 
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEDESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEIJNSA Journal
 
Two level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automataTwo level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automataeSAT Publishing House
 
Features of genetic algorithm for plain text encryption
Features of genetic algorithm for plain text encryption Features of genetic algorithm for plain text encryption
Features of genetic algorithm for plain text encryption IJECEIAES
 
Text in Image Hiding using Developed LSB and Random Method
Text in Image Hiding using Developed LSB and  Random Method Text in Image Hiding using Developed LSB and  Random Method
Text in Image Hiding using Developed LSB and Random Method IJECEIAES
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryptionAashish R
 
The efficient digital signature technique with message recovery based on elgamal
The efficient digital signature technique with message recovery based on elgamalThe efficient digital signature technique with message recovery based on elgamal
The efficient digital signature technique with message recovery based on elgamalIAEME Publication
 
Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java  Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java PiyushPatil73
 
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
IRJET-  	  A Probabilistic  Model of Visual Cryptography Scheme for Anti-Phis...IRJET-  	  A Probabilistic  Model of Visual Cryptography Scheme for Anti-Phis...
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...IRJET Journal
 
IRJET- Comparison Among RSA, AES and DES
IRJET-  	  Comparison Among RSA, AES and DESIRJET-  	  Comparison Among RSA, AES and DES
IRJET- Comparison Among RSA, AES and DESIRJET Journal
 
Bespoke Technique for Secret Messaging
Bespoke Technique for Secret MessagingBespoke Technique for Secret Messaging
Bespoke Technique for Secret MessagingAjay Kumar
 
VECTOR QUANTIZATION FOR PRIVACY PRESERVING CLUSTERING IN DATA MINING
VECTOR QUANTIZATION FOR PRIVACY PRESERVING CLUSTERING IN DATA MININGVECTOR QUANTIZATION FOR PRIVACY PRESERVING CLUSTERING IN DATA MINING
VECTOR QUANTIZATION FOR PRIVACY PRESERVING CLUSTERING IN DATA MININGacijjournal
 

What's hot (18)

A Hybrid Approach for Ensuring Security in Data Communication
A Hybrid Approach for Ensuring Security in Data Communication A Hybrid Approach for Ensuring Security in Data Communication
A Hybrid Approach for Ensuring Security in Data Communication
 
Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual...
Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual...Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual...
Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual...
 
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEDESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
 
Two level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automataTwo level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automata
 
Features of genetic algorithm for plain text encryption
Features of genetic algorithm for plain text encryption Features of genetic algorithm for plain text encryption
Features of genetic algorithm for plain text encryption
 
Text in Image Hiding using Developed LSB and Random Method
Text in Image Hiding using Developed LSB and  Random Method Text in Image Hiding using Developed LSB and  Random Method
Text in Image Hiding using Developed LSB and Random Method
 
Secure image encryption using aes
Secure image encryption using aesSecure image encryption using aes
Secure image encryption using aes
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryption
 
The efficient digital signature technique with message recovery based on elgamal
The efficient digital signature technique with message recovery based on elgamalThe efficient digital signature technique with message recovery based on elgamal
The efficient digital signature technique with message recovery based on elgamal
 
R04405103106
R04405103106R04405103106
R04405103106
 
Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java  Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java
 
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
IRJET-  	  A Probabilistic  Model of Visual Cryptography Scheme for Anti-Phis...IRJET-  	  A Probabilistic  Model of Visual Cryptography Scheme for Anti-Phis...
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
 
IRJET- Comparison Among RSA, AES and DES
IRJET-  	  Comparison Among RSA, AES and DESIRJET-  	  Comparison Among RSA, AES and DES
IRJET- Comparison Among RSA, AES and DES
 
Bespoke Technique for Secret Messaging
Bespoke Technique for Secret MessagingBespoke Technique for Secret Messaging
Bespoke Technique for Secret Messaging
 
H42054550
H42054550H42054550
H42054550
 
G017444651
G017444651G017444651
G017444651
 
VECTOR QUANTIZATION FOR PRIVACY PRESERVING CLUSTERING IN DATA MINING
VECTOR QUANTIZATION FOR PRIVACY PRESERVING CLUSTERING IN DATA MININGVECTOR QUANTIZATION FOR PRIVACY PRESERVING CLUSTERING IN DATA MINING
VECTOR QUANTIZATION FOR PRIVACY PRESERVING CLUSTERING IN DATA MINING
 
E017443136
E017443136E017443136
E017443136
 

Viewers also liked

Telecentro con grabación
Telecentro con grabaciónTelecentro con grabación
Telecentro con grabaciónyennnya
 
E c certificate
E c certificateE c certificate
E c certificatealfmar01
 
אמונות מגבילות
אמונות מגבילותאמונות מגבילות
אמונות מגבילותElad Zion
 
Safety guidelines by ec 17 references r 1
Safety guidelines by ec   17 references r 1Safety guidelines by ec   17 references r 1
Safety guidelines by ec 17 references r 1Mumbai Hiker
 
ಮಾನವನನ್ನು ಮಣ್ಣಿನ ಸತ್ವದಿಂದ ಉಂಟುಮಾದಿದನು
ಮಾನವನನ್ನು ಮಣ್ಣಿನ ಸತ್ವದಿಂದ ಉಂಟುಮಾದಿದನುಮಾನವನನ್ನು ಮಣ್ಣಿನ ಸತ್ವದಿಂದ ಉಂಟುಮಾದಿದನು
ಮಾನವನನ್ನು ಮಣ್ಣಿನ ಸತ್ವದಿಂದ ಉಂಟುಮಾದಿದನುFAHIM AKTHAR ULLAL
 
Aprendizaje de la Percepción
Aprendizaje de la Percepción Aprendizaje de la Percepción
Aprendizaje de la Percepción jhoncapa1
 
מצגת אדיג'ס
מצגת   אדיג'סמצגת   אדיג'ס
מצגת אדיג'סYardena Cohen
 
Pembahasan soal kalkulus pada buku karangan edwin j. purcell dan dale varberg...
Pembahasan soal kalkulus pada buku karangan edwin j. purcell dan dale varberg...Pembahasan soal kalkulus pada buku karangan edwin j. purcell dan dale varberg...
Pembahasan soal kalkulus pada buku karangan edwin j. purcell dan dale varberg...Faris Audah
 

Viewers also liked (17)

Syncronized up
Syncronized upSyncronized up
Syncronized up
 
Soal ulangan tengah semester 1
Soal ulangan tengah semester 1Soal ulangan tengah semester 1
Soal ulangan tengah semester 1
 
Telecentro con grabación
Telecentro con grabaciónTelecentro con grabación
Telecentro con grabación
 
E c certificate
E c certificateE c certificate
E c certificate
 
BLAKLEY 10439
BLAKLEY 10439BLAKLEY 10439
BLAKLEY 10439
 
משוב
משובמשוב
משוב
 
Psicología
PsicologíaPsicología
Psicología
 
אמונות מגבילות
אמונות מגבילותאמונות מגבילות
אמונות מגבילות
 
Safety guidelines by ec 17 references r 1
Safety guidelines by ec   17 references r 1Safety guidelines by ec   17 references r 1
Safety guidelines by ec 17 references r 1
 
Alpema standards9
Alpema standards9Alpema standards9
Alpema standards9
 
Trinidad nucera
Trinidad nuceraTrinidad nucera
Trinidad nucera
 
ಮಾನವನನ್ನು ಮಣ್ಣಿನ ಸತ್ವದಿಂದ ಉಂಟುಮಾದಿದನು
ಮಾನವನನ್ನು ಮಣ್ಣಿನ ಸತ್ವದಿಂದ ಉಂಟುಮಾದಿದನುಮಾನವನನ್ನು ಮಣ್ಣಿನ ಸತ್ವದಿಂದ ಉಂಟುಮಾದಿದನು
ಮಾನವನನ್ನು ಮಣ್ಣಿನ ಸತ್ವದಿಂದ ಉಂಟುಮಾದಿದನು
 
Aprendizaje de la Percepción
Aprendizaje de la Percepción Aprendizaje de la Percepción
Aprendizaje de la Percepción
 
מצגת אדיג'ס
מצגת   אדיג'סמצגת   אדיג'ס
מצגת אדיג'ס
 
Pembahasan soal kalkulus pada buku karangan edwin j. purcell dan dale varberg...
Pembahasan soal kalkulus pada buku karangan edwin j. purcell dan dale varberg...Pembahasan soal kalkulus pada buku karangan edwin j. purcell dan dale varberg...
Pembahasan soal kalkulus pada buku karangan edwin j. purcell dan dale varberg...
 
Receita 188
Receita 188Receita 188
Receita 188
 
Receita 196
Receita 196Receita 196
Receita 196
 

Similar to Hybrid Approach for generating Binary Secured Face templates with BDA

ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUEACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUEIRJET Journal
 
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDAA NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDAcsandit
 
Encrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image SlicingEncrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image SlicingIRJET Journal
 
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA cscpconf
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage Adz91 Digital Ads Pvt Ltd
 
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptAn efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptZiadAlqady
 
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptAn efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptZiadAlqady
 
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptAn efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptZiadAlqady
 
An encryption scheme using chaotic map and
An encryption scheme using chaotic map andAn encryption scheme using chaotic map and
An encryption scheme using chaotic map andjpstudcorner
 
Parsimonious topic models with salient word discovery
Parsimonious topic models with salient word discoveryParsimonious topic models with salient word discovery
Parsimonious topic models with salient word discoveryieeepondy
 
IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptx
IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptxIMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptx
IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptxDeepikaShivam
 
IRJET-Efficient Revocation and Secure Attribute-Based Proxy Re-Encryption Scheme
IRJET-Efficient Revocation and Secure Attribute-Based Proxy Re-Encryption SchemeIRJET-Efficient Revocation and Secure Attribute-Based Proxy Re-Encryption Scheme
IRJET-Efficient Revocation and Secure Attribute-Based Proxy Re-Encryption SchemeIRJET Journal
 
Java image processing ieee projects 2012 @ Seabirds ( Chennai, Bangalore, Hyd...
Java image processing ieee projects 2012 @ Seabirds ( Chennai, Bangalore, Hyd...Java image processing ieee projects 2012 @ Seabirds ( Chennai, Bangalore, Hyd...
Java image processing ieee projects 2012 @ Seabirds ( Chennai, Bangalore, Hyd...SBGC
 
Pso based optimized security scheme for image authentication and tamper proofing
Pso based optimized security scheme for image authentication and tamper proofingPso based optimized security scheme for image authentication and tamper proofing
Pso based optimized security scheme for image authentication and tamper proofingcsandit
 
PSO BASED OPTIMIZED SECURITY SCHEME FOR IMAGE AUTHENTICATION AND TAMPER PROOFING
PSO BASED OPTIMIZED SECURITY SCHEME FOR IMAGE AUTHENTICATION AND TAMPER PROOFINGPSO BASED OPTIMIZED SECURITY SCHEME FOR IMAGE AUTHENTICATION AND TAMPER PROOFING
PSO BASED OPTIMIZED SECURITY SCHEME FOR IMAGE AUTHENTICATION AND TAMPER PROOFINGcscpconf
 
survey paper on object oriented cryptographic security for runtime entities
survey paper on object oriented cryptographic security for runtime entitiessurvey paper on object oriented cryptographic security for runtime entities
survey paper on object oriented cryptographic security for runtime entitiesINFOGAIN PUBLICATION
 
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-EncryptionIRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-EncryptionIRJET Journal
 

Similar to Hybrid Approach for generating Binary Secured Face templates with BDA (20)

ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUEACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
 
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDAA NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA
 
Encrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image SlicingEncrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image Slicing
 
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
 
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptAn efficient and highly secure technique to encrypt
An efficient and highly secure technique to encrypt
 
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptAn efficient and highly secure technique to encrypt
An efficient and highly secure technique to encrypt
 
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptAn efficient and highly secure technique to encrypt
An efficient and highly secure technique to encrypt
 
An encryption scheme using chaotic map and
An encryption scheme using chaotic map andAn encryption scheme using chaotic map and
An encryption scheme using chaotic map and
 
H0154448
H0154448H0154448
H0154448
 
Parsimonious topic models with salient word discovery
Parsimonious topic models with salient word discoveryParsimonious topic models with salient word discovery
Parsimonious topic models with salient word discovery
 
581 517-525
581 517-525581 517-525
581 517-525
 
Ijcatr04051002
Ijcatr04051002Ijcatr04051002
Ijcatr04051002
 
IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptx
IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptxIMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptx
IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptx
 
IRJET-Efficient Revocation and Secure Attribute-Based Proxy Re-Encryption Scheme
IRJET-Efficient Revocation and Secure Attribute-Based Proxy Re-Encryption SchemeIRJET-Efficient Revocation and Secure Attribute-Based Proxy Re-Encryption Scheme
IRJET-Efficient Revocation and Secure Attribute-Based Proxy Re-Encryption Scheme
 
Java image processing ieee projects 2012 @ Seabirds ( Chennai, Bangalore, Hyd...
Java image processing ieee projects 2012 @ Seabirds ( Chennai, Bangalore, Hyd...Java image processing ieee projects 2012 @ Seabirds ( Chennai, Bangalore, Hyd...
Java image processing ieee projects 2012 @ Seabirds ( Chennai, Bangalore, Hyd...
 
Pso based optimized security scheme for image authentication and tamper proofing
Pso based optimized security scheme for image authentication and tamper proofingPso based optimized security scheme for image authentication and tamper proofing
Pso based optimized security scheme for image authentication and tamper proofing
 
PSO BASED OPTIMIZED SECURITY SCHEME FOR IMAGE AUTHENTICATION AND TAMPER PROOFING
PSO BASED OPTIMIZED SECURITY SCHEME FOR IMAGE AUTHENTICATION AND TAMPER PROOFINGPSO BASED OPTIMIZED SECURITY SCHEME FOR IMAGE AUTHENTICATION AND TAMPER PROOFING
PSO BASED OPTIMIZED SECURITY SCHEME FOR IMAGE AUTHENTICATION AND TAMPER PROOFING
 
survey paper on object oriented cryptographic security for runtime entities
survey paper on object oriented cryptographic security for runtime entitiessurvey paper on object oriented cryptographic security for runtime entities
survey paper on object oriented cryptographic security for runtime entities
 
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-EncryptionIRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
 

Recently uploaded

Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 

Recently uploaded (20)

Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 

Hybrid Approach for generating Binary Secured Face templates with BDA

  • 1. A HYBRID APPROACH FOR GENERATING BINARY SECURED FACE TEMPLATE (BDA) Dhananjay Dewangan
  • 2. Hybrid Approach • Combination of both methods, Biometric cryptosystem and cancellable biometrics.
  • 3. Binary Discriminant Analysis • The rationale of the proposed method is to use a set of n linear discriminant function to transform a real- valued template into a n dimensional binary face template.
  • 4. Binary Discriminant Analysis • The key issue is how to find the optimal linear discriminant functions so that the discriminability of the binary templates is maximized. • To maximize the discriminability Between class variance should be maximum and Within class variance should be minimum. • To minimize within class variance, we use perceptron learning rule • To maximize between class variance we make use of BCH codes.
  • 5. Perceptron Learning Rule • The perceptron is employed to find optimal linear discriminant function (LDFs) so that the output binary templates are close to the corresponding target binary template. Thus, the within-class variance of the binary templates is minimized. • If two classes C1 and C0 are linearly separable, a linear discriminant function g(x) = wTx + t is constructed so that for a random sample in these two classes, g(x) > 0, if x Ɛ C1 g(x) ≤ 0, if x Ɛ C0
  • 6. Proposed Method - Enrolment BCH Codes (255,37,45) Feature Extraction (DCT) Perceptron Learning Rule Compare SHA-256 Database (Stores Hashed Password and Weight & Bias matrix) Weight & Bias Password (5 digit) Alphanumeric Biometric Template( Face) Identical Not Identical
  • 7. Proposed Method - Authentication
  • 8. Feature Extraction • In our project we are using DCT transform for feature extraction.
  • 9. Feature Extraction • DCT Coefficient Scanning Order Currently we are using first approx 500 coefficients in zig zag order but it can be reduced to less number by taking large no of sample of same facial image varying its Illumination, Pose, Expression and Lighting conditions.
  • 10. • BCH Codes In our project, we have used BCH [255,37,45] code. • Hashing Algorithm We have used SHA 256 hash algorithm to secure the confidential data(password).
  • 11. • Pre-processing We have taken 256 bit length BCH code and SHA 256 takes input length 512 bit hence we need to preprocess it. Append the bit '1' to the message .Append k bits '0', where k is the minimum number >= 0 such that the resulting message length (modulo 512 in bits) is 448.Append length of message (without the '1' bit or padding), in bits, as 64-bit big-endian integer (this will make the entire post- processed length a multiple of 512 bits)
  • 13. Image Database Image Database contains two types of database • Password – Secured Hash • Weight & Bias matrix – Adjusted in binary format.
  • 15. Experimental Analysis • Between Class Variance The BCH coding scheme preserves the minimum hamming distance between its each code. For BCH (255, 37, 45), the minimum hamming distance is (2x45+1)=91 and the corresponding variance is (91)^2/4 which can be considered as strong between class variance and also helps to improve performance of our biometric cryptosystems.
  • 16. Experimental Analysis • Within Class Variance In our project we have taken more number of images of each individual having different pose and expression. As the no of image increases, the correlation between them also increases which leads to less variance. . Another importance of having more images of each individual is decrease in storage requirements since only few DCT coefficients or low frequency components need to be retained.
  • 17. Experimental Analysis • Revocability In our project we have adopted the BCH coding scheme as a target which is further stored in the database after employing hashing technique such as SHA-256 for security purpose. This coding scheme is applied over the user’s password. So if the password is changed in case of templates compromisation, its BCH code will be changed and their corresponding hash will also be changed which leads to a different data in the database to be stored
  • 18. Experimental Analysis • Performance In our project, database contains not directly images but secured binary representation of such images. So we can conclude that the binarization and their hash don’t affect the actual performance of our biometric cryptosystem.
  • 19. Experimental Analysis • Security In our project, we have used SHA-256 to accommodate the security of face template which provides the security level over birthday attack of 2^128 which is quite enough for any moderate level application.
  • 20. Experimental Analysis • Diversity Since SHA algorithm is noninvertible and the weight and bias matrix doesn’t reveal any information, the imposter has to make an attempt for both what the password is and what the relevant face should look like. Therefore the brute-force attack is nearly impossible for 5 digit password (94^5) consisting 94 different alphanumeric key. Since it is a two stage verification systems, it provides enough security and strong diversity for moderate level application.
  • 21. Future Scope • In order to achieve higher level of security, more number of biometric traits are required to authenticate whether the user is genuine or imposter. So multimodal biometric cryptosystem can be implemented by the same proposed method along with other biometric traits. • For higher level of security ,BCH coding schemes and corresponding hashing techniques can be changed to more number of bits as per application requirements and number of users
  • 22. References  S. Prabhakar, S. Pankanti, and A. K. Jain, “Biometric Recognition: Security and Privacy Concerns,” IEEE Security and Privacy Magazine, Vol. 1, No. 2, pp. 33-42, March-April 2003.  Anil K Jain, Ajay Kumar, Biometrics on Next Generation: An Overview.  Jain AK, Nandakumar K, and Nagar A (2008) Biometric template security. EURASIP J Advances n Signal Processing, Special issue on Biometrics.  A. K. Jain, K. Nandakumar and A. Nagar, "Biometric Template Security", EURASIP Journal on Advances in Signal Processing, January 2008.  Stelvio Cimato, Marco Gamassi, Vincenzo Piuri, Roberto Sassi and Fabio Scotti, Privacy in Biometrics.
  • 23. References  A. Teoh Beng Jin, D. Ngo Chek Ling, and A. Goh. Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern recognition, 37(11):2245– 2255, 2004.  Hossein Malekinezhad, Hossein Ebrahimpour-Komleh, Protecting Biometric-based Authentication Systems against Indirect Attacks.  Hossein Malekinezhad, Hossein Ebrahimpour-Komleh, Fractal Technique for Face Recognition.  Y C Feng1, Pong C Yuen1and Anil K Jain, A Hybrid Approach for Face Template Protection.  Andrew B.J. Teoha, Yip Wai Kuan b Sangyoun Lee a, Cancellable biometrics and annotations on BioHash, Pattern Recognition 41 (2008) 2034 – 2044.