• Title/Summary/Keyword: Template protection

Search Result 31, Processing Time 0.043 seconds

A Revocable Fingerprint Template for Security and Privacy Preserving

  • Jin, Zhe;Teoh, Andrew Beng Jin;Ong, Thian Song;Tee, Connie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.6
    • /
    • pp.1327-1342
    • /
    • 2010
  • With the wide deployment of biometric authentication systems, several issues pertaining security and privacy of the biometric template have gained great attention from the research community. To resolve these issues, a number of biometric template protection methods have been proposed. However, the design of a template protection method to satisfy four criteria, namely diversity, revocability and non-invertibility is still a challenging task, especially performance degradation when template protection method is employed. In this paper, we propose a novel method to generate a revocable minutiae-based fingerprint template. The proposed method consists of feature extraction from fingerprint minutiae pairs, quantization, histogram binning, binarization and eventually binary bit-string generation. The contributions of our method are two fold: alignment-free and good performance. Various experiments on FVC2004 DB1 demonstrated the effectiveness of the proposed methods.

Authentication Template Protection Using Function Encryption (함수암호를 이용한 인증정보 Template 보호 기술)

  • Park, Dong Hee;Park, Young-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1319-1326
    • /
    • 2019
  • Recently, biometrics and location information are being used for authentication in many devices. However, these information are stored as plaintext in safe device or, stored as ciphertext in authentication server it is used for authentication in plaintext by decrypting. Therefore, the leakage of authentication information as well as hacking can cause fatal privacy problems. In this paper, we propose a technique that can be authenticated without exposing authentication information to ciphertext using function encryption.

Fingerprint Template Protection using Fuzzy Vault

  • Moon Dae-Sung;Lee Sung-Ju;Jung Seung-Hwan;Chung Yong-Wha;Moon Ki-Young
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.123-132
    • /
    • 2006
  • Biometric-based authentication can provide strong security guarantee about the identity of users. However, security of biometric data is particularly important as the compromise of the data will be permanent. To protect the biometric data, we need to store it in a non-invertible transformed version. Thus, even if the transformed version is compromised, the actual biometric data remains safe. In this paper, we propose an approach to protect finger-print templates by using the idea of the fuzzy vault. Fuzzy vault is a recently developed cryptographic construct to secure critical data with the fingerprint data in a way that only the authorized user can access the secret by providing the valid fingerprint. We modify the fuzzy vault to protect fingerprint templates and to perform fingerprint verification with the protected template at the same time. This is challenging because the fingerprint verification is performed in the domain of the protected form. Based on the experimental results, we confirm that the proposed approach can perform the fingerprint verification with the protected template.

  • PDF

Biometric Template Security for Personal Information Protection (개인정보 보호를 위한 바이오인식 템플릿 보안)

  • Shin, Yong-Nyuo;Lee, Yong-Jun;Chun, Myung-Geun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.4
    • /
    • pp.437-444
    • /
    • 2008
  • This paper deals with the biometric template protection in the biometric system which has been widely used for personal authentication. First, we consider the structure of the biometric system and the function of its sub-systems and define the biometric template and identification(ID) information. And then, we describe the biometric template attack points of a biometric system and attack examples and provide their countermeasures. From this, we classify the vulnerability which can be protected by encryption and hashing techniques. For more detail investigation of these at real operating situations, we analyze them and suggest several protection methods for the typical application scheme of biometric systems such as local model, download model, attached model, and center model. Finally, we also handle the privacy problem which is most controversy issue related to the biometric systems and suggest some guidances of safeguarding procedures on establishing privacy sympathy biometric systems.

DNA Binding Specificity of Proteus mirabilis Transcription Regulator (Proteus mirabilis 전사 조절 단백질의 DNA 결합 특성)

  • Gang, Jong-Back
    • Korean Journal of Microbiology
    • /
    • v.47 no.2
    • /
    • pp.158-162
    • /
    • 2011
  • Amino acid sequence alignment shows that $\underline{P}$roteus $\underline{m}$irabilis $\underline{t}$ranscription $\underline{r}$egulator (PMTR) has cystein sequence homology at metal binding domain to CueR (copper resistance) protein, which conserves two cysteins (Cys 112 and Cys 120 in PMTR). Gel shift assay revealed that PMTR protein bound to promoter region of Escherichia coli copA (copper-translocating P-type ATPase) and Proteus mirabilis atpase (putative copper-translocating P-type ATPase) genes except that of E. coli zntA (zinc-translocating P-type ATPase) gene. DNase I protection experiment indicated that PMTR protein protected the region over -35 box and close to -10 box. DNase I hypersensitive bases were shown at C and A bases of labeled template strand and at G and C bases of labeled non-template strand of DNA. These hypersensitive bases were appeared in other metalloregulatory proteins of MerR family, which suggests protein-induced DNA bending.

Fingerprint Template Protection Using One-Time Fuzzy Vault

  • Choi, Woo-Yong;Chung, Yong-Wha;Park, Jin-Won;Hong, Do-Won
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.11
    • /
    • pp.2221-2234
    • /
    • 2011
  • The fuzzy vault scheme has emerged as a promising solution to user privacy and fingerprint template security problems. Recently, however, the fuzzy vault scheme has been shown to be susceptible to a correlation attack. This paper proposes a novel scheme for one-time templates for fingerprint authentication based on the fuzzy vault scheme. As in one-time passwords, the suggested method changes templates after each completion of authentication, and thus the compromised templates cannot be reused. Furthermore, a huge number of chaff minutiae can be added by expanding the size of the fingerprint image. Therefore, the proposed method can protect a user's fingerprint minutiae against the correlation attack. In our experiments, the proposed approach can improve the security level of a typical approach against brute-force attack by the factor of $10^{34}$.

Template Recovery of DWT-DFT Composite Watermarking Scheme Using Collinear Cross-Ratio

  • Sepsirisuk, Kasemsuk;Atsuta, Kiyoaki;Kondo, Shozo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.225-228
    • /
    • 2005
  • According to a popularization of the Internet and digital lifestyle, digital watermarks have been proposed for protection of copyrighted multimedia content. In blind watermark detection, which an original image is not provided, robustness against geometric distortion and compression remains challenging. In this paper, we propose a new perceptual blind discrete wavelet transform - discrete Fourier transform (DWT-DFT) composite watermarking scheme that is robust against both general linear transform and JPEG compression. This algorithm constructs an image-dependent watermark in the most significant DWT coefficients, which is determined by using a hierarchical tree structure. Strength of watermark is determined from a just-noticeable difference (JND) profile of a perceptual model. Furthermore, a desired template is inserted into DFT domain of the watermarked image. In new manner, a cross-ratio of four collinear points is used for detecting the template. Experimental results have showed that the proposed scheme is robust against general linear distortion, JPEG compression and various general kinds of attacks in the Stirmark 3.1 watermark evaluation tool.

  • PDF

Over Current Protection Schemes for Active Filters with Series Compensators

  • Lee, Woo-Cheol;Lee, Taeck-Kie
    • KIEE International Transaction on Electrical Machinery and Energy Conversion Systems
    • /
    • v.4B no.3
    • /
    • pp.134-145
    • /
    • 2004
  • This paper presents and analyses protection schemes for a series active compensator, which consists of a Unified Power Quality Conditioner (UPQC) or a hybrid active power filter. The proposed series active compensator operates as a high impedance "k(D)" for the fundamental components of the power frequency during over current conditions in the distribution system. Two control strategies are proposed in this paper. The first strategy detects the fundamental source current using the p-q theory. The second strategy detects the fundamental component of the load current in the Synchronous Reference Frame (SRF). When over currents occur in the power distribution system momentarily, the proposed schemes protect the series active compensator without the need for additional protection circuits, and achieves excellent transient response. The validity of the proposed protection schemes is investigated through simulation and compared with experimental results using a hybrid active power filter systems.

A Study on Biometric Template Protection Procedures (생체정보보호를 위한 연구)

  • Shin, Yong-Nyuo;Lee, Dong-Gun;Choi, Jin-Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.11a
    • /
    • pp.913-916
    • /
    • 2005
  • 정부의 민원서비스등 다양한 용도로 개방 환경에 생체인식시스템이 구축될 수 있는 가능성이 많아졌다. 본 고에서는 생체인식시스템이 구축될 때 발생할 수 있는 취약점을 정의 해 보고 이를 해결하기 위한 기술적 가이드라인을 제시한다. 한번 유출된 생체정보에 대한 피해의 심각성이 크기 때문에, 가능한 모든 공격에 대해서 강인성(Robust)을 가져야 하는 반면에 생체정보 변형에 따른 복잡성은 성능에 현격한 저하가 없어야 한다.

  • PDF