Secure and Privacy-Preserving User Authentication Using Biometrics

Slides:



Advertisements
Similar presentations
Dr. Marc Valliant, VP & CTO
Advertisements

Match On Card Technology and its use for PKI Mgr. Miroslav Valeš Sales Manager Eastern Europe May 9, 2001 CATE 2001 Security and Protection.
CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
Securing Fingerprint Template - Fuzzy Vault with Helper Data
Fuzzy Stuff Lecture 24, Outline Motivation: Biometric Architectures Motivation: Biometric Architectures New Tool (for us): Error Correcting.
Biometrics based Cryptosystem Design. Cryptosystem A mechanism using which one can encode an information content to an incomprehensible form and also.
Chapter 9 Creating and Maintaining Database Presented by Zhiming Liu Instructor: Dr. Bebis.
Fingerprint Minutiae Matching Algorithm using Distance Histogram of Neighborhood Presented By: Neeraj Sharma M.S. student, Dongseo University, Pusan South.
USign—A Security Enhanced Electronic Consent Model Yanyan Li 1 Mengjun Xie 1 Jiang Bian 2 1 University of Arkansas at Little Rock 2 University of Arkansas.
66: Priyanka J. Sawant 67: Ayesha A. Upadhyay 75: Sumeet Sukthankar.
Randomized Radon Transforms for Biometric Authentication via Fingerprint Hashing 2007 ACM Digital Rights Management Workshop Alexandria, VA (USA) October.
Cascaded Filtering For Biometric Identification Using Random Projection Atif Iqbal.
Biometrics & Security Tutorial 7. 1 (a) Please compare two different kinds of biometrics technologies: Retina and Iris. (P8:2-3)
Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun.
Symmetric hash functions for fingerprint minutiae
1 Extracting Discriminative Binary Template for Face Template Protection Feng Yicheng Supervisor: Prof. Yuen August 31 st, 2009.
Biometrics II CUBS, University at Buffalo
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Chapter 11 Integration Information Instructor: Prof. G. Bebis Represented by Reza Fall 2005.
Thwarting Attacks Dr. Pushkin Kachroo. Introduction Biometrics can help convenience and security Might remove or strengthen some weak points but get new.
Comparison and Combination of Ear and Face Images in Appearance-Based Biometrics IEEE Trans on PAMI, VOL. 25, NO.9, 2003 Kyong Chang, Kevin W. Bowyer,
Biometrics and Authentication Shivani Kirubanandan.
Integrating Information Dr. Pushkin Kachroo. Integration Matcher 1 Matcher 2 Integration Decision Match No Match B1B1 B2B2.
Identification System Errors Guide to Biometrics – Chapter 6 Handbook of Fingerprint Recognition Presented By: Chris Miles.
A Brief Survey on Face Recognition Systems Amir Omidvarnia March 2007.
Authors: Anastasis Kounoudes, Anixi Antonakoudi, Vasilis Kekatos
TEAM-1 JACKIE ABBAZIO SASHA PEREZ DENISE SILVA ROBERT TESORIERO Face Recognition Systems.
ENTROPY OF FINGERPRINT SENSORS. Do different fingerprint sensors affect the entropy of a fingerprint? RESEARCH QUESTION/HYPOTHESIS.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Biometrics: Ear Recognition
Karthiknathan Srinivasan Sanchit Aggarwal
Authentication Approaches over Internet Jia Li
1 Fingerprint Classification sections Fingerprint matching using transformation parameter clustering R. Germain et al, IEEE And Fingerprint Identification.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
CPSC 601 Lecture Week 5 Hand Geometry. Outline: 1.Hand Geometry as Biometrics 2.Methods Used for Recognition 3.Illustrations and Examples 4.Some Useful.
Keystroke Biometric System Client: Dr. Mary Villani Instructor: Dr. Charles Tappert Team 4 Members: Michael Wuench ; Mingfei Bi ; Evelin Urbaez ; Shaji.
Symmetric hash functions for fingerprint minutiae S. Tulyakov, V. Chavan and V. Govindaraju Center for Unified Biometrics and Sensors SUNY at Buffalo,
DRS \\ 7jun02 1 Operating Principles for Very small fingerprint sensors.
Disclosure risk when responding to queries with deterministic guarantees Krish Muralidhar University of Kentucky Rathindra Sarathy Oklahoma State University.
The Future of Biometrics. Operation and performance In a typical IT biometric system, a person registers with the system when one or more of his physical.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #23 Biometrics Standards - II November 14, 2005.
Chapter 4: Pattern Recognition. Classification is a process that assigns a label to an object according to some representation of the object’s properties.
Designing multiple biometric systems: Measure of ensemble effectiveness Allen Tang NTUIM.
By Hafez Barghouthi. Definition ”Biometric Technologies” are automated methods of verifying or recognizing the identity of a living person based on a.
1 Iris Recognition Ying Sun AICIP Group Meeting November 3, 2006.
Biometric for Network Security. Finger Biometrics.
Biometrics and Security Colin Soutar, CTO Bioscrypt Inc. 10th CACR Information Security Workshop May 8th, 2002.
1 Authentication Technologies Authentication Mechanisms –Something you know –Something you have –Something you are Features –Authenticator & Base secret.
Signature Recognition Using Neural Networks and Rule Based Decision Systems CSC 8810 Computational Intelligence Instructor Dr. Yanqing Zhang Presented.
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT
Guillaume-Alexandre Bilodeau
Keystroke Biometric Studies with Short Numeric Input on Smartphones
Hand Geometry Recognition
A review of audio fingerprinting (Cano et al. 2005)
Cryptographic Hash Function
BLIND AUTHENTICATION: A SECURE CRYPTO-BIOMETRIC VERIFICATION PROTOCOL
Authentication.
Products/Solutions/Expertise of C-DAC Mumbai in Smart City Domain
FACE RECOGNITION TECHNOLOGY
FACE DETECTION USING ARTIFICIAL INTELLIGENCE
Visual Signature Verification using Affine Arc-length
Mobile Sensor-Based Biometrics Using Common Daily Activities
Keystroke Biometric Studies with Short Numeric Input on Smartphones
Keystroke Biometric Studies with Short Numeric Input on Smartphones
Geometric Hashing: An Overview
Multi-Biometrics: Fusing At The Classification Output Level Using Keystroke and Mouse Motion Features Todd Breuer, Paola Garcia Cardenas, Anu George, Hung.
A maximum likelihood estimation and training on the fly approach
Helen: Maliciously Secure Coopetitive Learning for Linear Models
Keystroke Biometric Studies with Short Numeric Input on Smartphones
Presentation transcript:

Secure and Privacy-Preserving User Authentication Using Biometrics Monday, 18/12/2017 Nikolaos Theodorakis

Research Motivation Fingerprint biometric systems still do not provide efficient security/accuracy Compatibility and privacy issues have not been addressed correctly Aim to improve performance of minutiae-based protected systems by investigating and experimenting on trade-offs

Thesis Outline Theory & Background Fuzzy Vault Implementation Results Future Research Plan

Biometric System Modules Sensor Feature Extraction Matching Database 4

Enrollment & Matching Enrollment Matching Template stored in database Verification (one-to-one) Identification (one-to-many) 5

Metrics Two types of errors: Comparisons between false/true attempts: False Match (false positive) False Non-Match (false negative) Comparisons between false/true attempts: FAR (False Acceptance Rate) FRR (False Rejection Rate) GAR (Genuine Acceptance Rate) EER (Equal Error Rate) ROC curves / DET curves FTCR (Failure to Capture Rate) FTQR (Failure to Quantize Rate) 6

Fingerprint Minutia m = { x, y, θ, t } x,y : coordinates θ : orientation angle t : type 7

Requirements Security Requirements Privacy Requirements Confidentiality Integrity Availability Renewability / Revocability Privacy Requirements Identity Privacy Irreversibility Unlinkability

Fuzzy Vault (1) Protects a secret k under a set A Encodes k as coefficients of a polynomial p Projects A to p over F(2m) as genuine points Merges and shuffles {x, p(x)} along with random points as noise (chaff) Unlocks vault when a set B overlaps substantially with A, by locating genuine points (polynomial reconstruction problem) 9

Fuzzy Vault (2) 10

Fuzzy Vault Security Security Analysis Attacks Full brute-force attack: 𝑛 𝑑+1 (1) Combinations unlocking vault: 𝑔 𝑑+1 (2) Average time: (1) (2) Attacks Record Multiplicity Key Inversion Blended Substitution 11

Alignment Problem Statement How to align two templates if one is encrypted? Additional information is needed (helper data) Helper data reveals information about the user Minutiae based helper data could unlock the vault or reveal part of the fingerprint Non-minutiae based helper data cannot be used in already implemented systems without access to the fingerprint image

Alignment Method (1) Enrollment: Matching: Triangle structures of minutiae points (3 minutiae for each triangle) as helper data at enrollment Each minutia: m = {x,y,θ,quality,type} Each triangle: m1x,m1y,m2x,m2y,m3x,m3y, r1, r2, r3, m1θ, m2 θ, m3 θ, φ1, φ2, φ3, m1type, m2type, m3type Matching: Locating almost identical triangles in the query template according to dr, dθ, types Outputs possible transformation sets: dx, dy, referencePointx, referencePointy , dθ Translate and Rotate query template accordingly

Alignment Method (2)

Alignment Method (3)

Alignment Evaluation Investigate proximity between minutiae points after a transformation For every helper data available: minimum distance of every TE point to TQ point as minDists minPercentile = k-th percentile of minDists for every helper data as best transformation For various θ values: θPercentage = 𝑛𝑜. 𝑜𝑓 𝑝𝑜𝑖𝑛𝑡𝑠 𝑤𝑖𝑡ℎ 𝑚𝑖𝑛𝐷𝑖𝑠𝑡<𝜃 𝑛𝑜. 𝑜𝑓 𝑡𝑜𝑡𝑎𝑙 𝑝𝑜𝑖𝑛𝑡𝑠 ∗100 Calculate EER, FAR, FRR, threshold

Fuzzy Vault Protection (1) Polynomial Generation Secret: S = [c1 c2 ... cd+1] ∈ F(2m) length(S) = (d + 1) · m p(x) = c1 · xd + c2 · xd−1 + ... + cd+1 Scaling and Quantization m-bit representation (16-bit in our implementation) x,y scaled to distribute uniformly across the image x,y,θ quantized into 6,5,5 bit strings m = x | y | θ as a 16-bit integer (0 – 65535)

Fuzzy Vault Protection (2) Genuine Point Projection p(mq) = c1 · mq + c2 · mq + ... + cd+1 · mq GenuinePoints = [mq p(mq)] for all q ∈ genuine points Chaff Points Creation Random [chaffX chaffY] which do not belong to GenuinePoints At least minDist distance to genuine points Fuzzy Vault Merge Genuine and Chaff Points and randomly shuffle rows

Fuzzy Vault Key Release Partitioning Fuzzy vault mq partitioned into x,y,θ (reversing quantization) Distances and Subsets Trying to locate a number of potentially genuine points based on distances between vault and input points A larger number than d+1 is selected to try all possible combinations and increase chances of unlocking Polynomial Reconstruction A combination of d + 1 points reconstruct the polynomial by solving a system of equations Secret is retrieved as the unknown variables of the system

Results (1) Database Evaluation Protocol Minutiae database based on FVC2002DB1A Good quality sample selected Evaluation Protocol Multi-Enrolment (1 query template against 1,2 and 3 enrolled) Multi-Query (1 enrolled template against 1,2 and 3 query) FAR and FRR computed 20

Alignment Evaluation (1) trianglesNο. percentile δr δθ Found GAR Found FMR 4 60 20 87% 59% FRR FAR EER Threshold 0.2169 0.2034 0.2101 22.2036 21

Alignment Evaluation (2) Best θ selection: θ = 20 22

Results (2) Degree chaffNo. FailureThreshold trianglesNo. subsetsNo. 7 200-minutiaeNo. 25 4 13 Multi-Query Multi-Enrollment Template No. Gen.No FRR FAR 1 15 38.30 1.08 55.68 20 29.47 2.15 46.59 2.13 25 24.21 4.30 32.95 4.26 2 26.37 1.22 19.35 2.44 30.34 1.06 14.89 6.10 15.73 7.44 3 22.34 1.15 17.24 1.11 14.43 2.30 13.64 2.22 13.27 6.82 7.87 11 223

Results (3) 24

Conclusion Advantages Limitations Applicability Modular, decoupled Ideal for minutiae-based legacy systems Limitations Performance degradation Security and privacy risks due to the usage of minutiae Little entropy Applicability User authentication, key protection Mobile devices ( sensor & TEE )

Future Work Tweak and experiment with more parameters Research on non-minutiae alignment methods Further linkability analysis based on the helper data

Thank you for your attention !