Three Factor Scheme for Biometric-Based Cryptographic Key Regeneration Using Iris
|
|
- Noah Thompson
- 8 years ago
- Views:
Transcription
1 Three Factor Scheme for Biometric-Based Cryptographic Key Regeneration Using Iris Sanjay KANADE, Danielle CAMARA, Emine KRICHEN, Dijana PETROVSKA-DELACRÉTAZ, and Bernadette DORIZZI TELECOM & Management SudParis Evry, France Last Updated 17th September, 2008 This work was funded by the French Agence Nationale de la Recherche project BIOTYFUL
2 Outline Why Combine Biometrics with Cryptography State of the art Existing works based on iris Iris Code Matching as Error Correction Problem Iris Code Shuffling Increasing Error Correction Capability of Hadamard Code Experimental Results Security Analysis Conclusions and Discussions 2
3 Why Combine Biometrics with Cryptography Shortcomings of Biometrics: Biometric data is noisy Lack of revocability: - Biometric templates once stolen/compromised cannot be replaced and new template cannot be issued No template diversity Shortcomings of Cryptography: Easy to guess and can be stolen No strong link between authenticator & user identity 3
4 State of the Art Three main categories: Protecting biometrics and adding revocability to biometrics e.g. cancelable biometrics, etc. Cryptographic key generation from biometrics e.g. Hardened password, Fuzzy extractors, etc. Cryptographic key regeneration using biometrics e.g. fuzzy vault, fuzzy commitment, etc. 4
5 Existing Works on Key Regeneration Using Iris Hao et al. scheme Uses Reed-Solomon and Hadamard codes for correcting errors in iris codes 25% error correction is possible Cannot change error correction capability of Hadamard codes For comparatively noisy databases (like ICE), this scheme cannot work because many genuine comparisons have Hamming distance greater than 25% Bringer et al. scheme Reed-Muller and Product codes are used The keys generated by this scheme are small (42 bits) 5
6 Iris Code Matching as Error Correction Problem K K Noisy Data Encoder Data Decoder Communication Channel Noise causing elements Iris Code 1 Iris Code 2 Variations in iris codes are treated as errors and are corrected by the decoder. Error correcting capacity of the decoder should be such that it can separate genuine users from impostors On successful error correction, K=K which is used as cryptographic key 6
7 Schematic Diagram of the Key Regeneration Scheme 7
8 Iris Code Shuffling A shuffling key is generated using a password Iris code is divided into blocks; number of blocks = number of bits in shuffling key If a bit in the key is 1, corresponding iris code block is moved to the beginning; otherwise it is moved to the end This scheme increases Hamming distance for impostors, but for genuine users Hamming distance is unchanged 8
9 Iris Code Shuffling Schematic Diagram 9
10 Hamming Distance Distributions Before and After Shuffling Overlap between genuine and impostor users Hamming distance is decreased because of shuffling 10
11 Error Correcting Codes Iris codes have two types of errors: Background errors:- Due to camera noise, iris distortion, image-capture effects, etc. These are uniformly distributed Burst errors:- Due to eye-lids, eye-lashes, and specular reflections. These occur as bursts. We use Hadamard code to correct background errors and Reed-Solomon Codes to correct burst errors 11
12 Increasing Error Correction Capability of Hadamard Code Hadamard code s inherent error correction capacity is 25% which cannot be changed. Large number of genuine users comparisons where the hamming distance is more 25%. Adding similarity to the data can change the error distribution by decreasing the number of errors in a block Let there be p errors in n bits Adding q zeros uniformly to n will change the error ratio to R=p/(q+n); if R < 25%, p errors can be corrected Thus by changing q we can change (increase) the error correction capacity of Hadamard code 12
13 Database Used for System NIST-ICE Database Evaluation Exp-1-1,425 images of right irises of 124 users 12,214 genuine and 1,002,386 impostor comparisons Exp-2-1,528 images of left irises of 120 users 14,653 genuine and 1,151,975 impostor comparisons 13
14 Experimental Results Experimental parameters m = 6, Number of bits in each Reed-Solomon code block n s = 61, Number of blocks after Reed-Solomon encoding 8 zeros added to every 12 bits in the iris code; modified iris code length = 1,980, which is truncated to 1,952 bits. t s Error correction capability of Reed-Solomon Code ICE-Exp-1 ICE-Exp-2 t s Key Length FAR FRR FAR FRR t s acts as threshold by adjusting which we can fine tune the system performance 14
15 Security Analysis Entropy H = log 2 N 2 N w N is the number of degrees of freedom which can be calculated as 2 N = p(1 p) / σ where p = mean of the binomial distribution, and σ = standard deviation of the distribution w = number of bits corresponding to the error correction capacity (which is 35%) In our experiments, N = 1,172, w = 410 corresponding to 35% error correction capacity, thus Entropy of the key, H 83 bits 15
16 Comparison With Other Iris Based Systems Authors ECC Key Bits FRR in % FAR in % Entropy Database in bits Hao et al.[2] RSH proprietary Bringer et al.[1] RMP ICE - RSH ICE-Exp-1 - RSH ICE-Exp-1 RSH Reed-Solomon and Hadamard codes RMP Reed-Muller and Product codes [1] J. Bringer, H. Chabanne, G. Cohen, B. Kindarji, and G. Zémor, "Optimal iris fuzzy sketches," in IEEE Conference on Biometrics: Theory, Applications and Systems, [2] F. Hao, R. Anderson, and J. Daugman, "Combining crypto with biometrics effectively," IEEE Transactions on Computers, vol. 55, no. 9, pp ,
17 Conclusions and Discussions Shuffling makes the iris codes more random, which helps in increasing the entropy; also it acts as interleaver and helps in error correction by distributing the error bursts The zero insertion scheme increases the error correction capability of Hadamard code which is otherwise fixed Longer keys compared to other schemes can be obtained with the proposed scheme which will have nearly 83 bit entropy The keys obtained with this scheme can be used in cryptographic systems; otherwise Hash values of the original and regenerated keys can be compared to securely verify the user The locked iris template does not reveal any biometric information thereby protecting the biometric data In case of compromise detection, the cryptographic key, smart card, and password can be changed and a new template can be issued; thus the templates are revocable 17
18 Contacts For further questions, please contact 18
19 Thank You!
Application of Biometrics to Obtain High Entropy Cryptographic Keys
1 Application of Biometrics to Obtain High Entropy Cryptographic Keys Sanjay Kanade, Danielle Camara, Dijana Petrovska-Delacrétaz, and Bernadette Dorizzi Abstract In this paper, a two factor scheme is
More informationAnalysis of Multimodal Biometric Fusion Based Authentication Techniques for Network Security
, pp. 239-246 http://dx.doi.org/10.14257/ijsia.2015.9.4.22 Analysis of Multimodal Biometric Fusion Based Authentication Techniques for Network Security R.Divya #1 and V.Vijayalakshmi #2 #1 Research Scholar,
More informationBiometric Based Cryptographic Key Generation from Faces
Biometric Based Cryptographic Key Generation from Faces B. Chen and V. Chandran Queensland University of Technology, Brisbane, Qld 4001 AUSTRALIA brenden_chen@msn.com, v.chandran@qut.edu.au Abstract Existing
More informationERROR TOLERANCE TECHNIQUES FOR BINDING CRYPTOGRAPHIC KEY WITH BIOMETRICS
ERROR TOLERANCE TECHNIQUES FOR BINDING CRYPTOGRAPHIC KEY WITH BIOMETRICS Qinghai Gao GaoQJ@farmingdale.edu Department of Security Systems, Farmingdale State College, SUNY 2350 Broadhollow Road, Farmingdale,
More informationIntegrating Cancellable Biometrics with Geographical Location for Effective Unattended Authentication of Users of Mobile Devices
Integrating Cancellable Biometrics with Geographical Location for Effective Unattended Authentication of Users of Mobile Devices Hisham Al-Assam, Ihsan A. Lami, and Torben Kuseler Applied Computing Department,
More informationTemplate and Database Security in Biometrics Systems: A Challenging Task
Template and Database Security in Biometrics Systems: A Challenging Task Manvjeet Kaur Lecturer CSE Deptt. Dr. Sanjeev Sofat Prof. and Head CSE Deptt. Deepak Saraswat ME (CSE) Student ABSTRACT Security
More informationAccuracy and Security Evaluation of Multi-Factor Biometric Authentication
Accuracy and Security Evaluation of Multi-Factor Biometric Authentication Hisham Al-Assam, Harin Sellahewa, Sabah Jassim Department of Applied Computing University of Buckingham Buckingham, MK18 1EG, United
More informationApplication-Specific Biometric Templates
Application-Specific Biometric s Michael Braithwaite, Ulf Cahn von Seelen, James Cambier, John Daugman, Randy Glass, Russ Moore, Ian Scott, Iridian Technologies Inc. Introduction Biometric technologies
More informationMultimedia Document Authentication using On-line Signatures as Watermarks
Multimedia Document Authentication using On-line Signatures as Watermarks Anoop M Namboodiri and Anil K Jain Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824
More informationDr.R.Venkatesan Professor and Head, Department of CSE, PSG College of Technology Coimbatore, Tamilnadu, India
A Survey on Biometrics based Cryptographic Key Generation Schemes Mr.P.Balakumar Associate Professor, Department of CSE, Selvam College of Technology, Namakkal, Tamilnadu, India Abstract - Need for information
More informationSecure Biometric Key Generation Scheme for Cryptography using Combined Biometric Features of Fingerprint and Iris
www.ijcsi.org 349 Secure Biometric Key Generation Scheme for Cryptography using Combined Biometric Features of Fingerprint and Iris Mr.P.Balakumar 1 and Dr.R.Venkatesan 2 1 Associate Professor, Department
More informationBiometric Authentication using Online Signature
University of Trento Department of Mathematics Outline Introduction An example of authentication scheme Performance analysis and possible improvements Outline Introduction An example of authentication
More informationFingerprint-based crypto-biometric system for network security
Barman et al. EURASIP Journal on Information Security (2015) 2015:3 DOI 10.1186/s13635-015-0020-1 RESEARCH Open Access Fingerprint-based crypto-biometric system for network security Subhas Barman 1, Debasis
More information956 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 4, NO. 4, DECEMBER 2009
956 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 4, NO. 4, DECEMBER 2009 Biometric Systems: Privacy and Secrecy Aspects Tanya Ignatenko, Member, IEEE, and Frans M. J. Willems, Fellow,
More informationTwo-Factor Authentication or How to Potentially Counterfeit Experimental Results in Biometric Systems
Two-Factor Authentication or How to Potentially Counterfeit Experimental Results in Biometric Systems Christian Rathgeb and Andreas Uhl University of Salzburg, Department of Computer Sciences, A-5020 Salzburg,
More informationMathematical Model Based Total Security System with Qualitative and Quantitative Data of Human
Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative
More informationAn Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication
The 12th Australasian Conference on Information Security and Privacy (ACISP 07). (2 4 july 2007, Townsville, Queensland, Australia) J. Pieprzyk Ed. Springer-Verlag, LNCS????, pages??????. An Application
More informationI. INTRODUCTION. of the biometric measurements is stored in the database
122 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL 6, NO 1, MARCH 2011 Privacy Security Trade-Offs in Biometric Security Systems Part I: Single Use Case Lifeng Lai, Member, IEEE, Siu-Wai
More informationOn Enabling Secure Applications Through Off-line Biometric Identification
On Enabling Secure Applications Through Off-line Biometric Identification George I. Davida Yair Frankel Brian J. Matt Univ. of Wisconsin-Milwaukee CertCo LLC Sandia National Laboratories Milwaukee, WI
More informationCSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity
CSC 474 -- Network Security Topic 6.2 User Authentication CSC 474 Dr. Peng Ning 1 User Authentication Basics CSC 474 Dr. Peng Ning 2 Authentication and Identity What is identity? which characteristics
More informationA Framework for Secure Cloud- Empowered Mobile Biometrics
A Framework for Secure Cloud- Empowered Mobile Biometrics A. Bommagani 1, M. C. ValenA 1, and A. Ross 2 1 West Virginia University, Morgantown, WV, USA 2 Michigan State University, East Lansing, MI, USA
More informationFUNDAMENTALS of INFORMATION THEORY and CODING DESIGN
DISCRETE "ICS AND ITS APPLICATIONS Series Editor KENNETH H. ROSEN FUNDAMENTALS of INFORMATION THEORY and CODING DESIGN Roberto Togneri Christopher J.S. desilva CHAPMAN & HALL/CRC A CRC Press Company Boca
More informationReview Article Biometric Template Security
Hindawi Publishing Corporation EURASIP Journal on Advances in Signal Processing Volume 2008, Article ID 579416, 17 pages doi:10.1155/2008/579416 Review Article Biometric Template Security Anil K. Jain,
More informationIdentity theft is a growing concern
IDENTITY SCIENCES Authentication: System Security and User Privacy Anil K. Jain Michigan State University Karthik Nandakumar Institute for Infocomm Research, Singapore While biometric systems aren t foolproof,
More informationKey Agreement from Close Secrets over Unsecured Channels Winter 2010
Key Agreement from Close Secrets over Unsecured Channels Winter 2010 Andreas Keller Contens 1. Motivation 2. Introduction 3. Building Blocks 4. Protocol Extractor Secure Sketches (MAC) message authentication
More informationA Generic Framework for Three-Factor Authentication
A Generic Framework for Three-Factor Authentication Jiangshan Yu 1 Guilin Wang 2 Yi Mu 2 Wei Gao 3 1 School of Computer Science University of Birmingham, UK 2 School of Computer Science and Software Engineering
More informationCryptographic key generation using handwritten signature
Cryptographic key generation using handwritten signature M. Freire-Santos a, J. Fierrez-Aguilar a, J. Ortega-Garcia a a ATVS-Biometrics Research Lab., Escuela Politecnica Superior, Universidad Autonoma
More informationImage Authentication Scheme using Digital Signature and Digital Watermarking
www..org 59 Image Authentication Scheme using Digital Signature and Digital Watermarking Seyed Mohammad Mousavi Industrial Management Institute, Tehran, Iran Abstract Usual digital signature schemes for
More informationINVESTIGATIVE STUDY FOR ENHANCING SECURITY, PRIVACY USING AMBIENT INTELLIGENCE IN CONTEXT SENSITIVE SYSTEMS
INVESTIGATIVE STUDY FOR ENHANCING SECURITY, PRIVACY USING AMBIENT INTELLIGENCE IN CONTEXT SENSITIVE SYSTEMS Vijayakranthi Chinthala 1, Manas Kumar Yogi 2 1 M.Tech Scholar Department of Computer Science
More informationComplying with PCI Data Security
Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring
More informationSecurity Analysis of a Multi-Factor Authenticated Key Exchange Protocol. Feng Hao, Dylan Clarke Newcastle University, UK ACNS 12, Singapore
Security Analysis of a Multi-Factor Authenticated Key Exchange Protocol Feng Hao, Dylan Clarke Newcastle University, UK ACNS 12, Singapore Authentication factors Password Token Biometrics Authenticated
More informationA Stubborn Security Model Based on Three-factor Authentication and Modified Public Key
International Journal of Network Security, Vol.18, No.6, PP.1060-1070, Nov. 2016 1060 A Stubborn Security Model Based on Three-factor Authentication and Modified Public Key Trung Thanh Ngo and Tae-Young
More informationPerformance Evaluation of Biometric Template Update
Performance Evaluation of Biometric Template Update Romain Giot and Christophe Rosenberger Université de Caen, UMR 6072 GREYC ENSICAEN, UMR 6072 GREYC CNRS, UMR 6072 GREYC Email: romain.giot@ensicaen.fr
More informationCoding and decoding with convolutional codes. The Viterbi Algor
Coding and decoding with convolutional codes. The Viterbi Algorithm. 8 Block codes: main ideas Principles st point of view: infinite length block code nd point of view: convolutions Some examples Repetition
More informationNIST Test Personal Identity Verification (PIV) Cards
NISTIR 7870 NIST Test Personal Identity Verification (PIV) Cards David A. Cooper http://dx.doi.org/10.6028/nist.ir.7870 NISTIR 7870 NIST Text Personal Identity Verification (PIV) Cards David A. Cooper
More informationBiometric Authentication Platform for a Safe, Secure, and Convenient Society
472 Hitachi Review Vol. 64 (2015), No. 8 Featured Articles Platform for a Safe, Secure, and Convenient Society Public s Infrastructure Yosuke Kaga Yusuke Matsuda Kenta Takahashi, Ph.D. Akio Nagasaka, Ph.D.
More informationEfficient on-line Signature Verification System
International Journal of Engineering & Technology IJET-IJENS Vol:10 No:04 42 Efficient on-line Signature Verification System Dr. S.A Daramola 1 and Prof. T.S Ibiyemi 2 1 Department of Electrical and Information
More informationSecond Level Authentication Using QR Codes
International Journal of Computer and Internet Security. ISSN 0974-2247 Volume 5, Number 2 (2013), pp. 43-50 International Research Publication House http://www.irphouse.com Second Level Authentication
More informationBiometric For Authentication, Do we need it? Christophe Rosenberger GREYC Research Lab - France
Biometric For Authentication, Do we need it? Christophe Rosenberger GREYC Research Lab - France OUTLINE Le pôle TES et le sans-contact Introduction User authentication GREYC - E-payment & Biometrics Introduction
More informationMulti-factor Authentication in Banking Sector
Multi-factor Authentication in Banking Sector Tushar Bhivgade, Mithilesh Bhusari, Ajay Kuthe, Bhavna Jiddewar,Prof. Pooja Dubey Department of Computer Science & Engineering, Rajiv Gandhi College of Engineering
More informationAbstract. A Biometric system provides automatic identification of an individual, based on a unique possessed feature or characteristic.
U N I V E R S I T Y I N N I Š FACULTY OF ELECTRONIC ENGINEERING S E M I N A R Recognition of human Iris Patterns for Biometric Identification Mentor: Prof. dr Dragan Radenković by Marko Milovanović Abstract
More informationOnline teaching: Do you know who is taking the final exam?
Online teaching: Do you know who is taking the final exam? Qinghai Gao Department of Criminal Justice & Security Systems, Farmingdale State College Abstract: In recent years Distance Learning has been
More informationAuthentication Scheme for ATM Based On Biometric K. Kavitha, II-MCA IFET COLLEGE OF ENGINEERING DEPARTMENT OF COMPUTER APPLICATIONS
Authentication Scheme for ATM Based On Biometric K. Kavitha, II-MCA IFET COLLEGE OF ENGINEERING DEPARTMENT OF COMPUTER APPLICATIONS ABSTRACT: Biometrics based authentication is a potential candidate to
More informationApplication of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card
Application of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card C. Koner, Member, IACSIT, C. T. Bhunia, Sr. Member, IEEE and U. Maulik, Sr. Member, IEEE
More informationSecurity Analysis of a Multi-Factor Authenticated Key Exchange Protocol
Security Analysis of a Multi-Factor Authenticated Key Exchange Protocol Feng Hao, Dylan Clarke School of Computing Science Newcastle University {feng.hao, dylan.clarke}@ncl.ac.uk Abstract. This paper shows
More informationSecurity by Politics - Why it will never work. Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA
Security by Politics - Why it will never work Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA Agenda Motivation Some basics Brief overview epassport (MRTD) Why cloning? How to attack the
More informationPersonal Identification Techniques Based on Operational Habit of Cellular Phone
Proceedings of the International Multiconference on Computer Science and Information Technology pp. 459 465 ISSN 1896-7094 c 2006 PIPS Personal Identification Techniques Based on Operational Habit of Cellular
More informationIntegration of Sound Signature in 3D Password Authentication System
Integration of Sound Signature in 3D Password Authentication System Mr.Jaywant N. Khedkar 1, Ms.Pragati P. Katalkar 2, Ms.Shalini V. Pathak 3, Mrs.Rohini V.Agawane 4 1, 2, 3 Student, Dept. of Computer
More informationBiometrics & Authentication Technologies: security issues. Andy Adler Systems and Computer Engineering Carleton University, Ottawa
Biometrics & Authentication Technologies: security issues Andy Adler Systems and Computer Engineering Carleton University, Ottawa 1 What are Biometrics Automatic identification of an individual based on
More informationDesign and Analysis of Methods for Signing Electronic Documents Using Mobile Phones
Design and Analysis of Methods for Signing Electronic Documents Using Mobile Phones Pramote Kuacharoen School of Applied Statistics National Institute of Development Administration 118 Serithai Rd. Bangkapi,
More informationSectra Communications ensuring security with flexibility
Panthon Sectra Communications ensuring security with flexibility Sectra has more than 30 years of experience in developing secure communications. We know what is required to meet the toughest demands.
More informationSecurity in Near Field Communication (NFC)
Security in Near Field Communication (NFC) Strengths and Weaknesses Ernst Haselsteiner and Klemens Breitfuß Philips Semiconductors Mikronweg 1, 8101 Gratkorn, Austria ernst.haselsteiner@philips.com klemens.breitfuss@philips.com
More informationAdvanced Authentication
White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is
More informationLezione 6 Communications Blockset
Corso di Tecniche CAD per le Telecomunicazioni A.A. 2007-2008 Lezione 6 Communications Blockset Ing. Marco GALEAZZI 1 What Is Communications Blockset? Communications Blockset extends Simulink with a comprehensive
More informationROBUST TECHNIQUES FOR EVALUATING BIOMETRIC CRYPTOGRAPHIC KEY GENERATORS. Lucas Kevin Ballard
ROBUST TECHNIQUES FOR EVALUATING BIOMETRIC CRYPTOGRAPHIC KEY GENERATORS by Lucas Kevin Ballard A dissertation submitted to The Johns Hopkins University in conformity with the requirements for the degree
More informationChapter 1 Introduction
Chapter 1 Introduction 1. Shannon s Information Theory 2. Source Coding theorem 3. Channel Coding Theory 4. Information Capacity Theorem 5. Introduction to Error Control Coding Appendix A : Historical
More informationDesigning a Secure Client-Server System Master of Science Thesis in the Programme Software Engineering & Technology
Designing a Secure Client-Server System Master of Science Thesis in the Programme Software Engineering & Technology FREDRIK ANDERSSON Department of Computer Science and Engineering CHALMERS UNIVERSITY
More informationEncryption VIDEO COMMUNICATION SYSTEM-TECHNICAL DOCUMENTATION
Encryption PCS-1/1P Ver.3.20 or later PCS-11/11P Ver.3.20 or later PCS-HG90 Ver.2.00 or later PCS-G50/G50P Ver.2.21 or later PCS-G70/G70P Ver.2.21 or later PCS-TL30 Ver.1.04 or later PCS-TL33 All PCS-TL50
More informationAbout Sectra Communications
Panthon About Sectra Communications We provide secure communication solutions for European government authorities, defence departments and other critical functions of society. We have a solid core expertise
More informationSecure Personal Recognition System based on Hashes Keys
Secure Personal Recognition System based on Hashes Keys Deepak Sharma 1 and Sonakshi Khurana 2 1 KITM, Kurukshetra, 2 HCTM, Kaithal Haryana, India sharmadeepak2k4@gmail.com, er.sonakshi@gmail.com Abstract
More informationAn Application of Visual Cryptography To Financial Documents
An Application of Visual Cryptography To Financial Documents L. W. Hawkes, A. Yasinsac, C. Cline Security and Assurance in Information Technology Laboratory Computer Science Department Florida State University
More informationCyberSource Payment Security. with PCI DSS Tokenization Guidelines
CyberSource Payment Security Compliance The PCI Security Standards Council has published guidelines on tokenization, providing all merchants who store, process, or transmit cardholder data with guidance
More informationSENSE Security overview 2014
SENSE Security overview 2014 Abstract... 3 Overview... 4 Installation... 6 Device Control... 7 Enrolment Process... 8 Authentication... 9 Network Protection... 12 Local Storage... 13 Conclusion... 15 2
More informationARMORVOX IMPOSTORMAPS HOW TO BUILD AN EFFECTIVE VOICE BIOMETRIC SOLUTION IN THREE EASY STEPS
ARMORVOX IMPOSTORMAPS HOW TO BUILD AN EFFECTIVE VOICE BIOMETRIC SOLUTION IN THREE EASY STEPS ImpostorMaps is a methodology developed by Auraya and available from Auraya resellers worldwide to configure,
More informationSecurity Enhanced Anonymous Multi-Server Authenticated Key Agreement Scheme using Smart Card and Biometrics
Security Enhanced Anonymous Multi-Server Authenticated Key Agreement Scheme using Smart Card and Biometrics Younsung Choi College of Information and Communication Engineering, Sungkyunkwan University,
More informationCryptographic Key Generation from Finger Vein
Cryptographic Key Generation from Finger Vein Algimantas Venckauskas Department of Computers Kaunas University of Technology Kaunas, Lithuania algimantas.venckauskas@ktu.lt Abstract Bio-cryptography is
More informationSide Channel Analysis and Embedded Systems Impact and Countermeasures
Side Channel Analysis and Embedded Systems Impact and Countermeasures Job de Haas Agenda Advances in Embedded Systems Security From USB stick to game console Current attacks Cryptographic devices Side
More informationOn the Effectiveness of Secret Key Extraction from Wireless Signal Strength in Real Environments
On the Effectiveness of Secret Key Extraction from Wireless Signal Strength in Real Environments Suman Jana, Sriram Nandha Premnath Mike Clark, Sneha K. Kasera, Neal Patwari University of Utah Srikanth
More informationThe Development of a Pressure-based Typing Biometrics User Authentication System
The Development of a Pressure-based Typing Biometrics User Authentication System Chen Change Loy Adv. Informatics Research Group MIMOS Berhad by Assoc. Prof. Dr. Chee Peng Lim Associate Professor Sch.
More informationPractical Multi-factor Biometric Remote Authentication
NEYIRE DENIZ SARIER (2010) Practical Multi-factor Biometric Remote Authentication In Fourth IEEE International Conference on Biometrics : Theory Applications and Systems (BTAS), 1 6 ing any of these documents
More informationTrue Identity solution
Identify yourself securely. True Identity solution True Identity authentication and authorization for groundbreaking security across multiple applications including all online transactions Biogy Inc. Copyright
More informationIDRBT Working Paper No. 11 Authentication factors for Internet banking
IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased
More informationLightweight and Secure PUF Key Storage Using Limits of Machine Learning
Lightweight and Secure PUF Key Storage Using Limits of Machine Learning Meng-Day (Mandel) Yu 1, David M Raïhi 1, Richard Sowell 1, Srinivas Devadas 2 1 Verayo, Inc., San Jose, CA, USA 2 MIT, Cambridge,
More informationThis method looks at the patterns found on a fingertip. Patterns are made by the lines on the tip of the finger.
According to the SysAdmin, Audit, Network, Security Institute (SANS), authentication problems are among the top twenty critical Internet security vulnerabilities. These problems arise from the use of basic
More informationWhite Paper: Multi-Factor Authentication Platform
White Paper: Multi-Factor Authentication Platform Version: 1.4 Updated: 29/10/13 Contents: About zero knowledge proof authentication protocols: 3 About Pairing-Based Cryptography (PBC) 4 Putting it all
More informationInformation Fusion in Low-Resolution Iris Videos using Principal Components Transform
Information Fusion in Low-Resolution Iris Videos using Principal Components Transform Raghavender Jillela, Arun Ross West Virginia University {Raghavender.Jillela, Arun.Ross}@mail.wvu.edu Patrick J. Flynn
More informationJPEG compression of monochrome 2D-barcode images using DCT coefficient distributions
Edith Cowan University Research Online ECU Publications Pre. JPEG compression of monochrome D-barcode images using DCT coefficient distributions Keng Teong Tan Hong Kong Baptist University Douglas Chai
More informationAN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY
AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY Chandan Mohapatra 1, Manajusha Pandey 2 1 PG Student in Computer Science Dept., KIIT University, Bhubaneswar,
More informationA Study on Secure Electronic Medical DB System in Hospital Environment
A Study on Secure Electronic Medical DB System in Hospital Environment Yvette E. Gelogo 1 and Sungwon Park 2 * 1 Catholic University of Daegu, Daegu, Korea 2 Department of Nursing, Hannam University, 133
More informationPredictive Models for Min-Entropy Estimation
Predictive Models for Min-Entropy Estimation John Kelsey Kerry A. McKay Meltem Sönmez Turan National Institute of Standards and Technology meltem.turan@nist.gov September 15, 2015 Overview Cryptographic
More informationCryptanalysis of the Fuzzy Vault for Fingerprints: Vulnerabilities and Countermeasures
Cryptanalysis of the Fuzzy Vault for Fingerprints: Vulnerabilities and Countermeasures Dissertation zur Erlangung des mathematisch-naturwissenschaftlichen Doktorgrades Doctor rerum naturalium der Georg-August-Universität
More informationaddressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from
Preface In the last decade biometrics has emerged as a valuable means to automatically recognize people, on the base is of their either physiological or behavioral characteristics, due to several inherent
More informationA Generic Framework to Enhance Two- Factor Authentication in Cryptographic Smart-card Applications
A Generic Framework to Enhance Two- Factor Authentication in Cryptographic Smart-card Applications G.Prakash #1, M.Kannan *2 # Research Scholar, Information and Communication Engineering, Anna University
More informationCurriculum Vitae. Claude Barral. 1984 1988 Baccalaureat (E-level) : Mathematics and Technologies Lycée polyvalent Antonin Artaud, Marseille, France
Curriculum Vitae Address n o 6 La Bastide Samat 13119 Saint Savournin, France Phone: +33.4.42.32.36.92 Mobile Phone: +33.6.86.83.19.55 Email: claude.barral@gmail.com Homepage: http://www.linkedin.com/in/cbarral
More informationPart I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
More informationA Modular Framework for Multi-Factor Authentication & Key Exchange
A Modular Framework for Multi-Factor Authentication & Key Exchange Nils Fleischhacker, Mark Manulis, Amir Azodi SSR 2014@RHUL December 17, 2014 Multi-Factor Authentication MFA (client) authentication by
More informationCrypho Security Whitepaper
Crypho Security Whitepaper Crypho AS Crypho is an end-to-end encrypted enterprise messenger and file-sharing application. It achieves strong privacy and security using well-known, battle-tested encryption
More informationMasao KASAHARA. Public Key Cryptosystem, Error-Correcting Code, Reed-Solomon code, CBPKC, McEliece PKC.
A New Class of Public Key Cryptosystems Constructed Based on Reed-Solomon Codes, K(XII)SEPKC. Along with a presentation of K(XII)SEPKC over the extension field F 2 8 extensively used for present day various
More informationBit-Level Encryption and Decryption of Images Using Genetic Algorithm: A New Approach
Bit-Level Encryption and Decryption of Images Using Genetic Algorithm: A New Approach Gamil R. S. Qaid 1, Sanjay N. Talbar 2 1 Research Student, Electronics & Telecommunications Dept.,S.G.G.S. institute
More informationAuthentication Types. Password-based Authentication. Off-Line Password Guessing
Authentication Types Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4:
More informationRecap: Tracking Anonymous Peer-to- Peer VoIP Calls on the Internet. Scott E. Coull and Amos Wetherbee April 7, 2006
Recap: Tracking Anonymous Peer-to- Peer VoIP Calls on the Internet Scott E. Coull and Amos Wetherbee April 7, 2006 Encoding a bit 1. Packet flow of n bits 2. Select 2r packets from the first n-d packets
More informationMULTIMEDIA CONTENT PROTECTION VIA BIOMETRICS-BASED ENCRYPTION. Umut Uludag and Anil K. Jain
Copyright 22 IEEE. Published in the 23 International Conference on Multimedia and Expo (ICME 23), scheduled for July 6-9, 23 in Baltimore, Maryland, SA. Personal use of this material is permitted. However,
More informationAuthentication System for Smart Homes Based on ARM7TDMI-S and IRIS-Fingerprint Recognition Technologies
Authentication System for Smart Homes Based on ARM7TDMI-S and IRIS-Fingerprint Recognition Technologies Fredrick R. Ishengoma Abstract With the rapid advancement in technology, smart homes have become
More informationOnline Voting System Using Three Factor Authentication
ISSN(Online): 232-98 Vol. 3, Issue 3, March 25 Online Voting System Using Three Factor Authentication Rashmi Nade, Monali Raut, Punam Agawane, Jayshree Shinde Student, Dept. of I.T., BVCOEW, Savitribai
More informationAn Improved Authentication Framework using Steganography along with Biometrics for Network Security
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 10, October 2013,
More informationMANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS Kanchupati Kondaiah 1, B.Sudhakar 2 1 M.Tech Student, Dept of CSE,
More informationEnsuring Privacy of Biometric Factors in Multi-Factor Authentication Systems
Ensuring Privacy of Biometric Factors in Multi-Factor Authentication Systems Kikelomo Maria Apampa, Tian Zhang, Gary B Wills, David Argles School of Electronics and Computer Science, University of Southampton,
More informationA Security Flaw in the X.509 Standard Santosh Chokhani CygnaCom Solutions, Inc. Abstract
A Security Flaw in the X509 Standard Santosh Chokhani CygnaCom Solutions, Inc Abstract The CCITT X509 standard for public key certificates is used to for public key management, including distributing them
More informationAchieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER
with Convenience and Personal Privacy version 0.2 Aug.18, 2007 WHITE PAPER CONTENT Introduction... 3 Identity verification and multi-factor authentication..... 4 Market adoption... 4 Making biometrics
More information