Abstract

The principal challenge in biometric authentication is to mitigate the effects of any noise while extracting biometric features for biometric template generation. Most biometric systems are developed under the assumption that the extracted biometrics and the nature of their associated interferences are linear, stationary, and homogeneous. When these assumptions are violated due to nonlinear, nonstationary, and heterogeneous noise, the authentication performance deteriorates. As well, demands for biometric templates are on the rise in the field of information technology, leading to an increase in the vulnerability of stored and dynamic information. Thus, the development of a sophisticated authentication and encryption method is necessary to address these challenges. This dissertation proposes a new Sequential Subspace Estimator (SSE) algorithm for biometric authentication. In the proposed method, a sequential estimator is being designed in the image subspace that addresses challenges arising from nonlinear, nonstationary, and heterogeneous noise. The proposed method includes a subspace technique that overcomes the computational complexity associated with the sequential estimator. In addition, it includes a novel MultiBiometrics encryption algorithm that protects the biometric templates against security, privacy, and unlinkability attacks. Unlike current biometric encryption, this method uses cryptographic keys in conjunction with extracted MultiBiometrics to create cryptographic bonds, called “BioCryptoBond”. To further enhance system security and improve authentication accuracy, the development of a biometric database management system is also being considered. The proposed method is being tested on images from three public databases: the “Put Face Database”, the “Indian Face Database”, and the “CASIA Fingerprint Image Database Version 5.1”. The performance of the proposed solution has been evaluated using the Equal Error Rate (EER) and Correct Recognition Rate (CRR). The experimental results demonstrate the superiority of the proposed method in comparison to its counterparts.

Highlights

  • The rapid evolution of information technology has rendered the traditional tokenbased authentication and security management system no longer be sophisticated enough to handle the challenges of the 21st century

  • The proposed MultiBiometrics authentication and encryption method is being developed based on these underlying noise assumptions and vulnerabilities

  • A MultiBiometrics encryption and management system have been presented that protect biometric features against security, privacy, and unlinkability attacks

Read more

Summary

Introduction

The rapid evolution of information technology has rendered the traditional tokenbased authentication and security management system no longer be sophisticated enough to handle the challenges of the 21st century. The principal challenge in biometric authentication is to mitigate the effects of any noise while extracting the biometric features for template generation. The features extracted from the biometric traits are stored in the database during enrollment in order to compare (match) and authenticate the legitimacy of the subject of interest This comparison performs in the unencrypted domain, since the authentication accuracy can be largely influenced by a small variation in the feature properties if it takes place in the encrypted domain. This integrated method is an ideal system for protecting, authenticating, and tracking a single individual in the surveillance zone

Objectives
Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.