Upload
sarath-kumar
View
79
Download
1
Embed Size (px)
Citation preview
Blind authentication protocol provides secure and
blind biometric authentication protocol, which addresses
the concerns of user's privacy, template protection, and
trust issues. The protocol is blind in the sense that it
reveals only the identity, and no additional information
about the user or the biometric to the authenticating
server or vice-versa. As the protocol is based on
asymmetric encryption of the biometric data, it captures
the advantages of biometric authentication as well as the
security of public key cryptography. The authentication
protocol can run over public networks and provide
nonrepudiable identity verification. The encryption also
provides template protection, the ability to revoke
enrolled templates, and alleviates the concerns on
privacy in widespread use of biometrics. The proposed
approach makes no restrictive assumptions on the
biometric data and is hence applicable to multiple
biometrics. Such a protocol has significant advantages
over existing biometric cryptosystems, which use a
biometric to secure a secret key, which in turn is used for
authentication. We analyze the security of the protocol
under various attack scenarios. Experimental results on
four biometric datasets (face, iris, hand geometry, and
fingerprint) show that carrying out the authentication in
the encrypted domain does not affect the accuracy, while
the encryption key acts as an additional layer of security.
Some biometric systems permit more than one attempt to identify or verify an individual.Some biometric features are persistent over time while others change. All biometric features are deemed ‘unique’ but some are less ‘distinct’ than others and thus less useful for automated identification purposes. The distinctiveness of any biometric feature depends also on the effectiveness of the sampling technique used to measure it, as well as the efficiency of the matching process used to declare a ‘match’ between two samples. Biometric identification is a technique that uses biometric features to identify human beings. Biometrics are used to strongly link a stored identity to the physical person this represents. Since a person’s biometric features are a part of his or her body, they will always be with that person where ever he/she goes and available to prove his or her identity. Biometric technologies may be used in three ways: (a) to verify that people are who they claim to be, (b) to discover the identity of unknown people, and (c) to screen people against a watch-list. Jain A. states that the evaluation whether a particular body characteristic is suitable for biometric use can be done on the following seven criteria 11 identified by the author as being the seven pillars of Biometric Wisdom:Universality. All human beings are endowed with the same physical characteristics - such as fingers, iris, face, DNA – which can be used for identification.Distinctiveness. For each person these
characteristics are unique, and thus constitute a distinguishing feature.Permanence. These characteristics remain largely unchanged throughout a person's life.Collect ability. A person's unique physical characteristics need to be collected in a reasonably easy fashion for quick identification.Performance. The degree of accuracy of identification must be quite high before the system can be operational.Acceptability. Applications will not be successful if the public offers strong and continuous resistance to biometrics.Resistance to Circumvention.