Security of fingerprints in biometric authentication systems using cryptography and watermarking technique

Consideration of four major requirements when a biometric template protection algorithm is designed. The definition of a secure authentication model, based on fingerprint template protection by using the approaches of cryptography and watermarking.

Рубрика Программирование, компьютеры и кибернетика
Вид статья
Язык английский
Дата добавления 26.01.2018
Размер файла 139,1 K

Отправить свою хорошую работу в базу знаний просто. Используйте форму, расположенную ниже

Студенты, аспиранты, молодые ученые, использующие базу знаний в своей учебе и работе, будут вам очень благодарны.

Размещено на http://www.allbest.ru/

Security of fingerprints in biometric authentication systems using cryptography and watermarking technique

Zaripov N.N. Teacher of Department of Information

Technology, Bukhara State University

Introduction

Identity recognition is still an open problem and its solution can help for user authentication, the secure access to restricted areas and, more generally, anytime it is necessary to automatically acquire the identity of a human operator. It is worth to point out that the application of an identity recognition system can go beyond security issues, being the basic for a more sophisticated human machine interface in a pervasive context. A person can be identified through the analysis of her physical peculiar features: automated methods and algorithms for feature acquisition, analysis and recognition stand at the core of biometrics.

A biometric identifier is a physiological or behavioral characteristic of a person such as face features, iris, palm, fingerprint, hand or finger geometry, retina, voice, handwritten signature, keystroke dynamics, etc., that are strictly linked to each person and cannot be easily tampered with. Basically, all them are unique, universal, unalterable, and can be measured. Due these properties, biometrics have been used to identify or authenticate users in a biometric system, which is becoming more popular than traditional identification techniques such as identification card (ID), password and personal identification number (PIN). In the recognition process acquired raw data are preprocessed to extract relevant geometric arrangements of features that are then compared and matched to those that form the user template stored in a backend database.

Biometric systems are based on the following steps [5]: first, a biometric sample is taken from an individual, for example iris scan; then, this biometric can be presented as an image or some data are extracted from that sample which constitute a biometric template; finally, the biometric data, either the image or the template or both, are stored on a database or in a smart card. All these steps constitute the process known as enrollment. One time a person performs the enrollment process, he/she can identify (distinguish an individual from a larger set of individual biometric records, i.e. one-to-many matching) or authenticate (a live biometric sample presented by a person is compared with a stored sample, i.e. one-to-one matching) by presenting his/her biometric sample in the system, which will compare the submitted sample with stored sample and if the matching process succeeds, the person is recognized and the system will accept him/her. In other case, she/he is not recognized, i.e. will be rejected. Talking about the reliability of a biometric system, the submitted sample (actual) can present some variance with the stored reference sample, which could make of the comparison, matching and identification, an inexact process, i.e. the biometric system does not have 100% of accuracy. There are two metrics to measure the accuracy of a biometric system, false rejection rate (FRR) and false acceptance rate (FAR). FRR is how many rejects (incorrectly) performs the bio- metric system, i.e. when the system rejects a legitimate user. FAR is how many acceptances (incorrectly) performs the biometric system, i.e. when the system incorrectly match a biometric sample with a wrong stored reference sample, resulting in misidentification. The ranges of FRR for most biometric system are from 0.1% to 20%, i.e. a legitimate user will be rejected one of 1000 times and one to 5 times on average [2].

Nevertheless, the biometric systems present some security concerns related with secrecy of personal data and identity theft. Basically there are four types of attack in a generic biometric system: attack on sensor, attack between modules, software attack and attack against the biometric template stored in database. The last kind of attack is the most dangerous in a biometric system because the biometric template can be replaced by an impostor to compromise the security of the system. In addition, the user will lost its biometric trait for ever (identity theft) and he/she cannot use it further for authentication due it is irrevocable, i.e. the authorized user can not generate two different fingerprint traits from the same finger. Therefore, biometric template protection is required a biometric systems to increase the security in both the biometric system and personal biometric protection [1]. biometric fingerprint template cryptography

Due to these security challenges, there are an increasing interest to design, built and implement secure biometric template protection in biometric systems.

There are four major requirements when a biometric template protection algorithm is designed [3]:

§ Revocability. Ability of the algorithm to cancel the compromised template and generate a new one from the same biometric trait.

§ Diversity. The secure biometric template must not allow cross-matching across databases, thereby ensuring the users privacy.

§ Security. Extract the original template from the protected template must be computationally difficult to achieve. This ensures the secrecy of the user's biometric template.

§ Performance. The protecting algorithm should not affect the recognition performance of the biometric system, i.e. the FAR and FRR rates need to be acceptable.

Cryptography and watermarking are other approaches to protect sensitive information against not authorized users. Watermarking is used for the copyright protection. Cryptography is a technique thoroughly used on secure communications and private data storing, where the plain data are transformed in encrypted data by using an algorithm and secret key. Although, these schemes do not guarantee revocation and they are not recommend for biometric protection because the matching process requires decryption of stored templates and the security depends of the cryptographic key the cryptographic method can achieve a very high security and it can be verified with several security analysis at statistical level (where several approaches fail).

Watermarking is used for hiding information imperceptibly in digital content for protecting its integrity. A number of watermarking techniques are available for embedding information securely in an image. Recently watermarking techniques have been used in conjunction with biometric identifiers. Fingerprints are one of the reliable biometric identifiers that are extensively used for personal identification.

In this paper, we proposed a novel embedded fingerprint authentication system by using an encryption algorithm and watermarking technique. The proposed biometric scheme protections are based on features transform, but the matching process is performing in plain domain and decryption template is required. The implementation is based in an embedded expert system with high accuracy, secure enrollment and authentication process, with fingerprint template protection. The security of the proposed scheme is verified with a complete statistical security analysis and a hardware analysis such as architecture, memory space, communication ports, frequency system, speed, precision and others.

Main part

Extraction of fingerprint texture features. Texture is an important feature for the analysis of many types of images. Properties such as roughness, granulation and regularity which do not have smooth varying intensities can be determined through a set of local neighborhood properties of the gray levels of an image region. Multi-scale processing which, humans apply for texture perception is modeled using wavelet analysis [4]. The image features that represent the scale-dependent properties can be extracted from each sub-image separately. A non-linear function that produces the energy of the image when summed over a sub-image is widely used for texture computation. The feature set thus obtained consists of energies of different scales, which is an important characteristic for texture analysis. A signal when decomposed using a one-dimensional wavelet transform into a basis of wavelet functions to obtain the transformed signal, is given by

(1)

where, p and q are scale and position parameters, respectively. The basis vectors are obtained by translating and dilating the mother wavelet:

(2)

The mother wavelet has to be localized in both spatial and frequency domains. A two-dimensional wavelet transform is obtained by first applying a one-dimensional transform along the rows and then along the columns. In this paper, a Daubechies filter bank is used to implement the discrete wavelet transform (DWT) resulting in a pyramid structure of sub-bands shown in Fig. 1. The two-level decomposition consists of seven sub-bands. The sub-bands labeled HH, HL and LH contain the diagonal, horizontal and vertical details of the fingerprint image, respectively, while the LL sub-band contains the coarse details of the image.

Figure 1 Two level decomposition using DWT

In this paper, the face and the demographic text data are used as contextual watermarks and are embedded in the fingerprint image to be authenticated. The grayscale fingerprint image is decomposed using two-level discrete wavelet transform to obtain seven sub-bands as shown in Fig. 1. The text and face watermark images are embedded into the wavelet coefficients of the fingerprint image that represent the locations of the selected texture regions. The facial image is in grayscale while the text image is in binary. The sub-image selection for watermarking depends on several factors. The modification of the low frequency sub image LL2 will impose severe degradation of the reconstructed image as most of the energy is concentrated in this band. During filtering and compression some of the information will be lost in the high frequency bands. One way of overcoming this information loss is by redundantly embedding information in all the high frequency bands (LH1, HL1 and HH1). The mid-frequency bands (LH2, HL2 and HH2) are good choices for embedding. We embed the grayscale face image into the mid-frequency bands and the binary text image is redundantly embedded into the high frequency bands for increased robustness. The final watermarked fingerprint image is obtained when the embedded sub-b ands are reconstructed using a two-level inverse discrete wavelet transform (IDWT).

Image watermarking. The digital watermarking system essentially consists of a watermark embedder and a watermark detector (Figure 2). The watermark embedder inserts a watermark onto the cover signal and the watermark detector detects the presence of watermark signal. Note that an entity called watermark key is used during the process of embedding and detecting watermarks. The watermark key has a one-to-one correspondence with watermark signal (i.e., a unique watermark key exists for every watermark signal). The watermark key is private and known to only authorized parties and it ensures that only authorized parties can detect the watermark. Further, note that the communication channel can be noisy and hostile (i.e., prone to security attacks) and hence the digital watermarking techniques should be resilient to both noise and security attacks (Fig. 2.).

Figure 2 General watermarking system

Watermarking techniques should be tamper resistant to hostile attacks. Depending on the application, the watermarked content encounters certain types of attacks. Some types of attacks are more important than others. Some basic types of attack are [6]:

§ Active attacks

§ Passive attacks

§ Collusion attacks

§ Forgery attacks

Proposed authentication process scheme. A watermark, which is often consists of a binary data sequence, is inserted into a host signal with the use of a key. The information embedding routine imposes small signal changes, determined by the key and the watermark, to generate the watermarked signal. This embedding procedure involves imperceptibly modifying a hoist signal to reflect the information content in the watermark so that the changes can be later observed with the use of the key to ascertain the embedded bit sequence. The process is called watermark extraction.

Watermark Embedding

Input:

Cover Image - gray scale fingerprint image, to be watermarked.

Face image - a binary image act as a watermark.

Demographic data image- a binary image act as watermark.

E1 - key used to encrypting IDWT.

E2 - key used for encrypting face image and demographic data image watermarks.

W - key used to watermarked embedder, encrypted watermark in Cover Image.

Output:

Watermarked fingerprint - finally watermarked image.

Fig. 3 shows the proposed watermarking algorithm used for embedding the face and the text images in the fingerprint.

Figure 3 Enrollment process scheme

The resulting watermarked fingerprint is securely protected and can be used to verify if the chain of custody is maintained or if the fingerprint has been compromised by tampering. Using the same technique, the facial image is extracted from the lower frequency channel. Neither the original fingerprint image nor the original watermark images are required for extraction. The contextual watermarking approach using face and text images and encryption to watermark a fingerprint is useful for authenticating the integrity of the fingerprint. The watermarked fingerprint image is compact and takes less memory space compared to the space occupied by individual images. Furthermore, the time taken to search different database to obtain all pertinent information corresponding to an individual is greatly minimized since each fingerprint image has the demographic text and face image embedded as watermarks and can be easily extracted.

Finally, the authentication process is achieved on fingerprint module with its matching algorithm. If the templates are the same, the user has access to the restricted area (Fig. 4).

The watermarked fingerprint was shown to be robust and resilient when subjected to various attacks. Unauthorized tampering or substitution of the fingerprint data can be detected by extracting the watermarks. Since the visual quality of the text and the face images are commonly used for personal identification, it is appropriate to use the human visual metrics for comparison purposes.

Figur 4 Authentication process scheme

Conclusion

In this work, we proposed a secure authentication with fingerprint template based on watermarking and cryptography. In addition two watermarks, a facial image and the corresponding demographic text data of an individual are secure embedded into selected texture regions of fingerprint image using discrete wavelet transform. The watermarked fingerprint provides added protection from tampering and the fingerprint matching ability is not affected even when subjected to common attacks. For extracting the embedded face and text images, the original images are not required. One of the main advantages is that the fingerprint, the demographic text information of the individual and the facial image need not be stored in separate databases. Using the proposed approach, the absence of watermarks or visual distortions in the extracted watermarks would reveal that the integrity of the fingerprint image has been compromised. The proposed scheme has high potential in several applications in both simple embedded system or embedded expert systems such as control access in offices, banks, factories, hospitals, universities, e-commerce and others.

References

1. Admek, M., Matsek, M., & Neumann, P. Security of biometric systems. 25th DAAAM International Symposium on Intelligent Manufacturing and Automation, DAAAM, 2014, pp. 169 - 176.

2. Cavoukian, A., Stoianov, A. Biometric encryption: A positive-sum technology that achieves strong authentication, security and privacy. Information and Privacy Commissioner of Ontario 48, 2007.

3. Jain, A. K., Nandakumar, K., & Nagar, A. Fingerprint template protection: From theory to practice. In Security and privacy in biometrics. London: Springer, 2012, pp. 187 - 214.

4. M. Kociolek, A. Materka, M. Strzelecki, P. Szczypinski, Discrete wavelet transform-derived features for digital image texture analysis, in: Proceedings of the International Conference on Signals and Electronic Systems, 2001, pp. 163 - 168.

5. M.A. Murillo-Escobar, C. Cruz-Hernandez, F. Abundiz-Perez, R.M. Lopez-Gutierrez. A robust embedded biometric authentication system based on fingerprint and chaotic encryption. Expert System with Applications 42, 2015, pp. 8198 - 8211.

6. William Stallings, “Cryptography And Network Security Principles And Practice”, 5th ed., NY, Pearson Education, Inc., 2011, pp. 809 - 812.

Аннотация

Безопасность отпечатков пальцев в биометрических системах аутентификации с использованием криптографии и технику водяных знаков

Распознавание отпечатков пальцев является надежным решением в системах аутентификации пользователей. Эта статья посвящена определению защищенной модели аутентификации, основанной на защите шаблонов отпечатков пальцев, используя подходы, криптографии и водяных знаков.

Ключевые слова: темплейд отпечатка пальца, биометрическая аутентификации, отпечатка пальца водяным знаком, шифрование.

Annotation

Fingerprint recognition is a reliable solution in user authentication systems. This paper deals with the definition of a secure authentication model, based on fingerprint template protection by using the approaches of cryptography and watermarking.

Keywords: fingerprint template, biometric authentication, watermarked fingerprint, encryption.

Размещено на Allbest.ru

...

Подобные документы

  • Practical acquaintance with the capabilities and configuration of firewalls, their basic principles and types. Block specific IP-address. Files and Folders Integrity Protection firewalls. Development of information security of corporate policy system.

    лабораторная работа [3,2 M], добавлен 09.04.2016

  • Information security problems of modern computer companies networks. The levels of network security of the company. Methods of protection organization's computer network from unauthorized access from the Internet. Information Security in the Internet.

    реферат [20,9 K], добавлен 19.12.2013

  • Review of development of cloud computing. Service models of cloud computing. Deployment models of cloud computing. Technology of virtualization. Algorithm of "Cloudy". Safety and labor protection. Justification of the cost-effectiveness of the project.

    дипломная работа [2,3 M], добавлен 13.05.2015

  • Basic assumptions and some facts. Algorithm for automatic recognition of verbal and nominal word groups. Lists of markers used by Algorithm No 1. Text sample processed by the algorithm. Examples of hand checking of the performance of the algorithm.

    курсовая работа [22,8 K], добавлен 13.01.2010

  • Lists used by Algorithm No 2. Some examples of the performance of Algorithm No 2. Invention of the program of reading, development of efficient algorithm of the program. Application of the programs to any English texts. The actual users of the algorithm.

    курсовая работа [19,3 K], добавлен 13.01.2010

  • Consideration of a systematic approach to the identification of the organization's processes for improving management efficiency. Approaches to the identification of business processes. Architecture of an Integrated Information Systems methodology.

    реферат [195,5 K], добавлен 12.02.2016

  • Технология Active Template Library. Создание полнофункционального элемента управления и расширение свойств. Подготовка рабочего пространства и ресурсов. Проектирование пользовательского интерфейса. Добавление переменных для управления анимацией.

    курсовая работа [722,5 K], добавлен 09.12.2015

  • NANO Security - сплоченная команда молодых специалистов: программистов, аналитиков, тестировщиков, менеджеров. Предметная область, назначение разработки, требования к программному изделию, системы управления обучением. Обзор языков программирования.

    отчет по практике [1,1 M], добавлен 22.07.2012

  • Модель взаимодействия открытых систем Open Systems Interconnection Reference Model. Основные особенности модели ISO/OSI. Характеристики физических сигналов, метод кодирования, способ подключения. Канальный уровень модели ISO/OSI. Передача и прием кадров.

    презентация [52,7 K], добавлен 25.10.2013

  • Модели нарушителей глобальной информационной системы Интернет. Классификация угроз в соответствии с IT-Baseline Protection Manual. Реализация DoS/DDos атак. Программная реализация Snort: установка, препроцессоры и структура модулей обнаружения и вывода.

    дипломная работа [509,5 K], добавлен 05.06.2011

  • The material and technological basis of the information society are all sorts of systems based on computers and computer networks, information technology, telecommunication. The task of Ukraine in area of information and communication technologies.

    реферат [29,5 K], добавлен 10.05.2011

  • Процессоры Duron на ядре Spitfire (Model 3), Morgan (Model 7), Applebred (Model 8), Mobile Duron Camaro. Схема материнской платы EP-8KHAL+. Микросхема "Северный мост". Звуковой чип ALC201A. Конфигурация системной памяти. Регулятор заглушки шины RT9173.

    курсовая работа [3,6 M], добавлен 26.03.2013

  • IS management standards development. The national peculiarities of the IS management standards. The most integrated existent IS management solution. General description of the ISS model. Application of semi-Markov processes in ISS state description.

    дипломная работа [2,2 M], добавлен 28.10.2011

  • Lines of communication and the properties of the fiber optic link. Selection of the type of optical cable. The choice of construction method, the route for laying fiber-optic. Calculation of the required number of channels. Digital transmission systems.

    дипломная работа [1,8 M], добавлен 09.08.2016

  • Сrime of ciber is an activity done using computers and internet. History of cyber crime. Categories and types of cyber crime. Advantages of cyber security. The characteristic of safety tips to cyber crime. Application of cyber security in personal compute

    презентация [203,5 K], добавлен 08.12.2014

  • Overview history of company and structure of organization. Characterization of complex tasks and necessity of automation. Database specifications and system security. The calculation of economic efficiency of the project. Safety measures during work.

    дипломная работа [1009,6 K], добавлен 09.03.2015

  • Сравнительная характеристика антивирусных программ. Фирма-разработчик и характеристика программы Eset Smart Security, форма продажи лицензий и структура модулей защиты информации. Назначение утилиты Eset SysInspector. Правила корректного обновления.

    контрольная работа [28,8 K], добавлен 10.03.2011

  • Классификация вирусов, методы защиты от них. Виды и типы антивирусных программ. Антивирус Kaspersky Internet Security 2012, компоненты защиты и мониторинг сети, достоинства. Динамика изменения возможностей антивирусов по лечению активного заражения.

    курсовая работа [467,8 K], добавлен 06.09.2013

  • Сравнение эталонных моделей OSI, TCP. Концепции OSI: службы; интерфейсы; протоколы. Критика модели, протоколов OSI. Теория стандартов Дэвида Кларка (апокалипсис двух слонов). Плохая технология как одна из причин, по которой модель OSI не была реализована.

    реферат [493,1 K], добавлен 23.12.2010

  • Концептуальна модель бази даних, визначення зв’язків між ними, атрибутів сутностей їх доменів. Створення ORM source model та Database model diagram для бази даних "Автотранспортне підприємство". Генерування ddl-скрипта для роботи в СУБД SQL-Server.

    курсовая работа [47,3 K], добавлен 17.10.2013

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу.