Anonymous Biometrics: Privacy Protection of Biometric Templates Pim Tuyls, E. Verbitskiy, D. Denteneer, J.P. Linnartz, J. Goseling, T. Ignatenko

Slides:



Advertisements
Similar presentations
Ari Juels RSA Laboratories Marty Wattenberg 328 W. 19th Street, NYC A Fuzzy Commitment Scheme.
Advertisements

Biometry and Security: Secure Biometric Authentication for Weak Computational Devices Author: Zelenevskiy Vladimir Based on the research by M.J. Atallah.
Building web applications on top of encrypted data using Mylar Presented by Tenglu Liang Tai Liu.
CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
Fuzzy Vaults: Toward Secure Client-Side Matching Ari Juels RSA Laboratories 10th CACR Information Security Workshop 8 May 2002 LABORATORIES.
Securing Fingerprint Template - Fuzzy Vault with Helper Data
Fuzzy Stuff Lecture 24, Outline Motivation: Biometric Architectures Motivation: Biometric Architectures New Tool (for us): Error Correcting.
Biometrics based Cryptosystem Design. Cryptosystem A mechanism using which one can encode an information content to an incomprehensible form and also.
Chapter 9 Creating and Maintaining Database Presented by Zhiming Liu Instructor: Dr. Bebis.
Short course on quantum computing Andris Ambainis University of Latvia.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (7) AUTHENTICATION.
Fuzzy extractor based on universal hashes
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Session 4 Asymmetric ciphers.
 Secure Authentication Using Biometric Data Karen Cui.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Digital Data Transmission ECE 457 Spring Information Representation Communication systems convert information into a form suitable for transmission.
Symmetric hash functions for fingerprint minutiae
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
1 CS 430 / INFO 430 Information Retrieval Lecture 12 Probabilistic Information Retrieval.
1 Extracting Discriminative Binary Template for Face Template Protection Feng Yicheng Supervisor: Prof. Yuen August 31 st, 2009.
Biometrics II CUBS, University at Buffalo
FIT3105 Biometric based authentication and identity management
Oded Regev Tel-Aviv University On Lattices, Learning with Errors, Learning with Errors, Random Linear Codes, Random Linear Codes, and Cryptography and.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Chapter 11 Integration Information Instructor: Prof. G. Bebis Represented by Reza Fall 2005.
Lattices for Distributed Source Coding - Reconstruction of a Linear function of Jointly Gaussian Sources -D. Krithivasan and S. Sandeep Pradhan - University.
Laurent Itti: CS599 – Computational Architectures in Biological Vision, USC Lecture 7: Coding and Representation 1 Computational Architectures in.
PRIAM: PRivate Information Access Management on Outsourced Storage Service Providers Mark Shaneck Karthikeyan Mahadevan Jeff Yongdae Kim.
Karthiknathan Srinivasan Sanchit Aggarwal
Csci5233 Computer Security1 Bishop: Chapter 12 Authentication.
14.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 14 Entity Authentication.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.
CS548 Advanced Information Security Presented by Gowun Jeong Mar. 9, 2010.
Symmetric hash functions for fingerprint minutiae S. Tulyakov, V. Chavan and V. Govindaraju Center for Unified Biometrics and Sensors SUNY at Buffalo,
G53SEC 1 Authentication and Identification Who? What? Where?
Presented by: Suparita Parakarn Kinzang Wangdi Research Report Presentation Computer Network Security.
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Privacy-preserving rule mining. Outline  A brief introduction to association rule mining  Privacy preserving rule mining Single party  Perturbation.
1 Introduction to Quantum Information Processing CS 667 / PH 767 / CO 681 / AM 871 Richard Cleve DC 2117 Lecture 20 (2009)
14.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 14 Entity Authentication.
Merkle trees Introduced by Ralph Merkle, 1979 An authentication scheme
G53SEC 1 Authentication and Identification Who? What? Where?
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Pertemuan #9 Security in Practice Kuliah Pengaman Jaringan.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Biometrics: A Tool for Information Security 1 Authors: Anil K. Jain, Arun Ross, Sharath Pankanti IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY,
Biometric for Network Security. Finger Biometrics.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
多媒體網路安全實驗室 Anonymous Authentication Systems Based on Private Information Retrieval Date: Reporter: Chien-Wen Huang 出處: Networked Digital Technologies,
Irfan Ullah Department of Information and Communication Engineering Myongji university, Yongin, South Korea Copyright © solarlits.com.
When is Key Derivation from Noisy Sources Possible?
CSCE 201 Identification and Authentication Fall 2015.
Richard Cleve DC 2117 Introduction to Quantum Information Processing QIC 710 / CS 667 / PH 767 / CO 681 / AM 871 Lecture (2011)
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Multi-Party Computation r n parties: P 1,…,P n  P i has input s i  Parties want to compute f(s 1,…,s n ) together  P i doesn’t want any information.
Secure Biometric Authentication for Weak Computational Devices Mikhail Atallah (Purdue),Keith Frikken (Purdue), Michael Goodrich (UC- Irvine), Roberto.
Multimodal Biometric Security 1.
7/10/20161 Computer Security Protection in general purpose Operating Systems.
Reusable Fuzzy Extractors for Low-Entropy Distributions
Coexistence Among Cryptography and Noisy Data Theory and Applications
Computational Fuzzy Extractors
BLIND AUTHENTICATION: A SECURE CRYPTO-BIOMETRIC VERIFICATION PROTOCOL
Multimodal Biometric Security
Secure and Privacy-Preserving User Authentication Using Biometrics
Faculty of Science IT Department Lecturer: Raz Dara MA.
Information Theoretical Analysis of Digital Watermarking
Computer Security Protection in general purpose Operating Systems
Presentation transcript:

Anonymous Biometrics: Privacy Protection of Biometric Templates Pim Tuyls, E. Verbitskiy, D. Denteneer, J.P. Linnartz, J. Goseling, T. Ignatenko Philips Research Eindhoven The Netherlands

2 Overview Introduction Challenge Literature and Related Topic Information-Theoretic model Secrecy Extractor Requirements Bounds Examples “General” Theory Experiments Summary

3 Introduction Biometric Identification (fingerprints, iris, speech) - is often used to identify people - is often part of a security system - uses databases containing Ref. Information (Templates) Advantages Convenience can not be lost or forgotten easy to use Uniqueness unique for a human being Offers therefore a very attractive alternative to e.g. passwords

4 Risks - Forgeability - Impersonation by Artificial Biometrics - Once Compromised Compromised Forever -Theft of Identity (Stolen Biometrics) - Sensitive Information - Fingerprints contain Genetic Information - Retina reveals susceptibility for Strokes and Diabetes Additional Problem - Noisy: Biometric data are obtained through noisy measurements PRIVACY

5 ARCHITECTURE ASSUMPTIONS Database public Channel public Sensor trusted ATTACKS - Outside (on database) - Eavesdropping of Communications - Inside (on database): Malicious owner (Verifier) - Fingerprints left on glasses, door handles (not discussed today) Database Sensor Template Channel

6 Possible Constructions: - Encryption (implies a decryption key at verifier site) - One-Way Function Idea: Build a scheme similar to the one used for password protection Solution Secure Storage of Biometric Templates, Against Outside and Inside Attacks Secure Communication over the Channel (prevent eavesdropping)

7 CHALLENGE: Integration of Cryptographic Techniques with Noisy Inputs One-Way Functions are very sensitive to small changes in the input data database matching F F

8 Literature - Schneier - Davida, Frankel and Matt, (Private biometrics) - Juels and Wattenberg (Fuzzy Commitment) - Ratha, Connell, Bolle (Cancelable Biometrics) - Juels, Sudan (fuzzy vault) - Linnartz, Tuyls (Shielding functions, AVBPA 2003) - Verbitskiy, Tuyls, Denteneer and Linnartz (Benelux 2003) - Goseling, Tuyls submitted to ISIT2004 Related Topic - Biometric Key Generation (Soutar)

9 Information Theoretic Model Biometrics X n are modeled as random variables with distribution(enrollment) Authentication measurements Y n, modeled as observations through a noisy channel

10 Generate Common Secret S from X n and Y n (Common Randomness) Helper data W Secrecy Extractor Database: ID, W, F(S) matching F F G G ’)? EXACT MATCH: F(S)=F(S’)? Enrollment Authentication F(S)

11 Terminology A functionis called a  -contracting function: if for all X there exist a W s.t probabilistic norm Versatile function: for all S  0,1  k and all X  R n, there exists a vector W  R m such that:  -Revealing function: 

12 Requirements A reliable biometric authentication system that protects privacy has to satisfy the following requirements:  -contracting Versatile  -revealing: Correctness: Protection against a dishonest verifier who has Access to the database (compare with passwords)

13 Implications Proposition 1: If W is constant, i.e. G(Y,W)=C(Y) then either  =0, or G(Y,W) is a constant independent of Y. Corollary: In order to have a robust, versatile function G=G(X,W), W must depend on X

14 Implications Proposition 2 : Let S be a binary string derived from X and Y by communicating helper data W as described in the protocol: Extends also to the continuous case! (Approximation argument)

15 EXAMPLES Three kinds of proposed schemes: Based on Quantized Index Modulation Error Correcting Code-scheme Significant Components

16 Example: Significant Components Assumption: Orthogonal Transformation (Fisher, PCA): Define: where  i are orthonormal vectors Theorem (Fisher, PCA): The  i can be constructed such that they are independent, normally distributed random variables with zero mean

17 The Scheme I: Robustness Idea: Select  -components with large absolute values to guarantee robustness to noise Choose a small positive number  and define Theorem: Let  be the fraction of average number of large comps then, if there is a sufficient amount of energy in the system,  is “large”, moreover

18 The Scheme II: Versatility Versatility: Given s i, search for index i j such that: (feasibility) The set of feasible secrets: Theorem: If k=  1 n with  1 =  /10, then with large probability is a large set

19 The Scheme III: Helper Data Given a secret S=(s 1,…,s k ) the helper data W is determined. W picks up the correct components of X in  -basis Helper data: W(X) is a k  n matrix, its j-th row is given by  -contracting function:

20 Information Revealing Theorem: The proposed scheme is zero-revealing: Moreover,

21 General Construction SEC: Tuple of encoding regions (SEC: Secure Extraction Code) such that, is the collection of SECs s.t.

22 Secure Biometric Authentication Scheme (SBA) 1.Enrollment measurement X n 2.Select a code in W indicates the selected code 3.The Secret S is index of that coding region where X n belongs to 4. A One-Way Function F is applied to S. 5.W and F(S) are stored in the database together with the Id. ENCDEC 1 2 3

23 Authentication: 1. An individual makes an Id claim 2. W and is sent to the decoder 3. The SEC C(W) is used to derive the secret as follows, F(S’) is computed 6. Check: F(S’)=F(S) This construction achieves the earlier mentioned capacities at the same time (Asymptotically)!

24 Experiments - Biometric: Measuring the headphone-to-ear-canal-Transfer Functions - First dataset: 45 Individuals, 8 Measurements per person - Second dataset: 65 Individuals, 8 Measurements per person - 6 Measurements for training, 2 for authentication - Tested scheme: significant components - FRR decreases as  increases - FAR decreases as secret length increases - Secret length decreases as  increases

25 “Ear canal” Biometrics = Headphone-to-Ear Transfer Function White noiseError H(z) W(z) +

26 Headphone-to-Ear Transfer Function: 1 ear, population (45x8)

27 Results: Principal Component Transform First dataset

28 Second dataset Combination of schemes

29 Summary We have described a general set-up and examples for biometric authentication/key generation schemes that satisfy the following properties: - Robust to noise - Versatile - Zero-revealing - Privacy protection