Abstract

We introduce a novel method for secure computation of biometric hash on dynamic hand signatures using BioPhasor mixing and 2N discretization. The use of BioPhasor as the mixing process provides a one-way transformation that precludes exact recovery of the biometric vector from compromised hashes and stolen tokens. In addition, our user-specific 2N discretization acts both as an error correction step as well as a real-to-binary space converter. We also propose a new method of extracting compressed representation of dynamic hand signatures using discrete wavelet transform (DWT) and discrete fourier transform (DFT). Without the conventional use of dynamic time warping, the proposed method avoids storage of user's hand signature template. This is an important consideration for protecting the privacy of the biometric owner. Our results show that the proposed method could produce stable and distinguishable bit strings with equal error rates (EERs) of 0% and 9.4% for random and skilled forgeries for stolen token (worst case) scenario, and 0% for both forgeries in the genuine token (optimal) scenario.

Highlights

  • There is a growing interest in applying biometric for authentication, especially in deriving compact representation of the biometric for cryptographic uses or as encryption keys

  • From our experiments, we found that the Daubechies 6 (DB6) mother wavelet with decomposition level 2 and compression rate of

  • We believe that the proposed integration of BioPhasor random mixing and user-specific 2N discretization is a secure method for deriving biometric hashes from dynamic hand signatures without jeopardizing the privacy of the user

Read more

Summary

INTRODUCTION

There is a growing interest in applying biometric for authentication, especially in deriving compact representation of the biometric for cryptographic uses or as encryption keys. Existing methods of extractions typically require the storage of the template hand signature signals This is because a template signal is needed to adjust nonlinear variations in the input hand signature signals. A few variations exist for the storage of user templates: (1) use of tamper-proof cards and (2) centralized server. The former which normally requires some form of PIN or password for access permission to the template is not secure as the PIN is meant to be memorized and is short and easy to be guessed. In the event of key compromise, a new key would be reissued using another random token but not the biometric

LITERATURE REVIEW
PROPOSED SCHEME
DWT-DFT biometric feature extraction
Random extraction of biometric feature using BioPhasor
User-specific 2N discretization
EXPERIMENTS AND SECURITY ANALYSIS
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.