Shannon Information theory, coding and biometrics. Han Vinck June 2013

Similar documents
Info theory and big data

BIOMETRICS BY- VARTIKA PAUL 4IT55

Biometrics 2/23/17. the last category for authentication methods is. this is the realm of biometrics

Introduction to Biometrics 1

ZKTECO COLLEGE- FUNDAMENTAL OF FINGER VEIN RECOGNITION

Biometrics - A Tool in Fraud Prevention

Finger print Recognization. By M R Rahul Raj K Muralidhar A Papi Reddy

An Overview of Biometrics. Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University

Vein and Fingerprint Identification Multi Biometric System: A Novel Approach

About user acceptance in hand, face and signature biometric systems

An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression

IRIS Biometric for Person Identification. By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology

Biometrics and Fingerprint Authentication Technical White Paper

Biometric Recognition Techniques

BIOMETRICS: AN INTRODUCTION TO NEW MODE OF SECURITY

User Awareness of Biometrics

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER

User Authentication. Goals for Today. My goals with the blog. What You Have. Tadayoshi Kohno

Research on Friction Ridge Pattern Analysis

Biometric Recognition: How Do I Know Who You Are?

The Role of Biometrics in Virtual Communities. and Digital Governments

Abstract Terminologies. Ridges: Ridges are the lines that show a pattern on a fingerprint image.

Quantitative Assessment of the Individuality of Friction Ridge Patterns

Secure communication based on noisy input data Fuzzy Commitment schemes. Stephan Sigg

Feature Extraction Techniques for Dorsal Hand Vein Pattern

Second Symposium & Workshop on ICAO-Standard MRTDs, Biometrics and Security

International Journal of Scientific & Engineering Research, Volume 5, Issue 1, January ISSN

ISO/IEC TR TECHNICAL REPORT. Information technology Biometrics tutorial. Technologies de l'information Tutoriel biométrique

COMBINING FINGERPRINTS FOR SECURITY PURPOSE: ENROLLMENT PROCESS MISS.RATHOD LEENA ANIL

Objectives. You will understand: Fingerprints Fingerprints

Information hiding in fingerprint image

Authenticated Document Management System

Authentication using Iris

An Introduction to Multimodal Biometric System: An Overview Mamta Ahlawat 1 Dr. Chander Kant 2

Fingerprint Combination for Privacy Protection

Biometrics in Law Enforcement and Corrections. Presenters: Orlando Martinez & Lt. Pat McCosh

CHAPTER 4 MINUTIAE EXTRACTION

Modern Biometric Technologies: Technical Issues and Research Opportunities

INTERNATIONAL RESEARCH JOURNAL IN ADVANCED ENGINEERING AND TECHNOLOGY (IRJAET)

Fingerprints. Fingerprints. Dusan Po/Shutterstock.com

Topic: Birth registration as an opportunity to integrate civil registration and identity management systems

Iris Recognition using Hamming Distance and Fragile Bit Distance

Image Compression Algorithms for Fingerprint System Preeti Pathak CSE Department, Faculty of Engineering, JBKP, Faridabad, Haryana,121001, India

Investigation of Recognition Methods in Biometrics

ISSN Vol.02,Issue.17, November-2013, Pages:

Title Goes Here Algorithms for Biometric Authentication

Unit 5- Fingerprints and Other Prints (palm, lip, shoe, tire)

ENHANCHED PALM PRINT IMAGES FOR PERSONAL ACCURATE IDENTIFICATION

EFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION

Biometrical verification based on infrared heat vein patterns

3 Department of Computer science and Application, Kurukshetra University, Kurukshetra, India

On-Line, Low-Cost and Pc-Based Fingerprint Verification System Based on Solid- State Capacitance Sensor

Noise Elimination in Fingerprint Image Using Median Filter

Iris Recognition-based Security System with Canny Filter

Iris Recognition using Histogram Analysis

Feature Extraction Technique Based On Circular Strip for Palmprint Recognition

IRIS RECOGNITION USING GABOR

Authentication Using Pulse-Response Biometrics

Nikhil Gupta *1, Dr Rakesh Dhiman 2 ABSTRACT I. INTRODUCTION

An Algorithm for Fingerprint Image Postprocessing

MATLAB DIGITAL IMAGE/SIGNAL PROCESSING TITLES

Personal Identification Using Different Biometrics : A Review

c IET Digital Library. The copyright for this contribution is held by IET Digital Library. The original publication is available at

A Survey of Multibiometric Systems

OUTLINES: ABSTRACT INTRODUCTION PALM VEIN AUTHENTICATION IMPLEMENTATION OF CONTACTLESS PALM VEIN AUTHENTICATIONSAPPLICATIONS

Chapter 10 Error Detection and Correction 10.1

PALM VEIN TECHNOLOGY

Human Recognition Using Biometrics: An Overview

Preprocessing and postprocessing for skeleton-based fingerprint minutiae extraction

Effective and Efficient Fingerprint Image Postprocessing

Face Recognition Based Attendance System with Student Monitoring Using RFID Technology

Fingerprint Feature Extraction Dileep Sharma (Assistant Professor) Electronics and communication Eternal University Baru Sahib, HP India

Performance Analysis of Multimodal Biometric System Authentication

RECOGNITION OF A PERSON BASED ON THE CHARACTERISTICS OF THE IRIS AND RETINA

LabVIEW based Intelligent Frontal & Non- Frontal Face Recognition System

Biometric-based Two-level Secure Access Control for Implantable Medical Devices during Emergencies

Study and Analysis on Biometrics and Face Recognition Methods

Design and Implementation of a Fingerprint Lock System

Selection of Authentication Systems for Hungarian Health Care, Based on Physiological Study Part I. The Biometric Systems

Fingerprint Recognition using Minutiae Extraction

Chen, Ph.D.) Visual Information Processing & CyberCommunications Lab. (VIP-CCL) 視覺資訊處理暨信息通訊實驗室.

ABSTRACT I. INTRODUCTION II. LITERATURE SURVEY

Evaluation of Biometric Systems. Christophe Rosenberger

Touchless Fingerprint Recognization System

ABSTRACT INTRODUCTION. Technical University, LATVIA 2 Head of the Division of Software Engineering, Riga Technical University, LATVIA

On The Correlation of Image Size to System Accuracy in Automatic Fingerprint Identification Systems

Feature Level Two Dimensional Arrays Based Fusion in the Personal Authentication system using Physiological Biometric traits

Real time verification of Offline handwritten signatures using K-means clustering

BIOMETRIC IDENTIFICATION

Punjabi Offline Signature Verification System Using Neural Network

Fingerprint Analysis. Bud & Patti Bertino

Algorithm for Detection and Elimination of False Minutiae in Fingerprint Images

International Conference on Innovative Applications in Engineering and Information Technology(ICIAEIT-2017)

Palm Vein Recognition System using Directional Coding and Back-propagation Neural Network

A Review on Different Biometric Techniques: Single and Combinational

Egronomic Fingerprint Scanner Design for People with Motor Neuron Diseases

Privacy & Biometrics Building a Conceptual Foundation

Non-Contact Vein Recognition Biometrics

Security System Using Biometric Technology: Design and Implementation of Voice Recognition System (VRS)

Fingerprint Segmentation using the Phase of Multiscale Gabor Wavelets

Transcription:

Shannon Information theory, coding and biometrics Han Vinck June 2013

We consider The password problem using biometrics Shannon s view on security Connection to Biometrics han Vinck April 2013 2

Goal: use biometrical features as passwords 6/17/2013 A.J. Han Vinck 3

Illustration of the password problem Enrollment: password hash(pwd) compare verification: password hash(pwd) 4

Illustration of the problem Enrollment: hash( ) compare verification: hash( ) 5

hash functions of biometrics can not be used as passwords for a vector c and a noisy version c c noise hash property: hash( c c ) hash(c) single error => n/2 differences may be we can use Error correction: dec ( c c ) = dec ( c) equality for 2t < d min 6

This is what we want lock Key = b secret unlock Key = b secret 7

Problem: secure storage and biometric authentication secure storage Bio key/password b f(b) Authentication try to find b Bio key/password b* secret 6/17/2013 A.J. Han Vinck 8

biometrics Definition: Methodology for recognizing and identifying people based on individual and distinct physiological or behavioral characteristics Han Vinck, Univ. Duisburg Essen

Authentication through biometrics learned skils: - such as recognition of speech, - dynamics of signature, - keystroke patterns Natural properties such as - Fingerprints - Iris pattern - Retina, hand geometry - Facial scan - etc. http://www.youtube.com/watch?v=bufsl0vurho&feature=related Han Vinck, Univ. Duisburg Essen

Hand Geometry Popular form of biometric Measures shape of hand Width of hand, fingers Length of fingers, etc. Human hands not unique Hand geometry sufficient for many situations Suitable for authentication Han Vinck, Univ. Duisburg Essen

Iris Patterns Iris pattern development is chaotic Little or no genetic influence Different even for identical twins Pattern is stable through lifetime Han Vinck, Univ. Duisburg Essen

biometrics Why? - it is a key connected to a person: are always with you - universal - easy to collect data for enrollment - no memorization of voice, face, eyes, or fingerprints - are personal: Cannot be given to somebody else Problems? - sensors needed without medical risk - reference values may be not actual (ageing) - failure rate rather high - passwords are exact, biometrics only approximately system requirements: accuracy, speed, complexity user requirements: harmless, accepted, robust to attacks Han Vinck, Univ. Duisburg Essen

biometrics IDENTIFICATION: compare one to many Who goes there? AUTHENTICATION: compare one to one Is that really you? Han Vinck, Univ. Duisburg Essen

Identification Search a sample against a database of templates. Typical application: identifying fingerprints? 15

Authentication Compare a sample against a single stored template Typical application: voice lock? 16

Biometric Fingerprint Extracted minutia are compared with user s minutia stored in a database Is it a statistical match? Han Vinck, Univ. Duisburg Essen

Matching problem For example: rotation and translation 18

classification 19

Minutiae (Pavel Margolin) 20

Minutiae Example Minutiae Example ridge ending bridge bifurcation double bifurcation dot trifurcation island (short ridge) opposed bifurcations lake (enclosure) ridge crossing hook (spur) 21 opposed bifurcation/ridge ending

2 examples of Minutiae Minutiae can be represented by the location (x,y) and the ridge direction 22 Figure taken from Nandakumar, et al. http://www.cse.msu.edu/~nandakum/fingerprintmatching.ppt

Problem: biometrics do change Example 1 Example 2 6/17/2013 A.J. Han Vinck 23

Basic problem: aging introduces (permanent) errors b process c enrollment Data Base Security? b b is b a noisy version of b Y/N verification problem: how to do the processing and verification 6/17/2013 A.J. Han Vinck 24 Han Vinck, Univ. Duisburg Essen

Biometrics, performance Performance measures: 1. False acceptance rate (FAR) (imposter accepted) 2. False rejection rate (FRR) ( legitimate match denied) 100% FAR/FRR 1 2 Quality of recognition Han Vinck, Univ. Duisburg Essen

User identity check: example C = e( iris, S i ) card C public key P i Check card owner: d(c, P i ) = iris? Secret key S i Han Vinck, Univ. Duisburg Essen

Template Size Biometric Approx Template Size Voice Face Signature 70k 80k 84 bytes 2k 500 bytes 1000 bytes Fingerprint 256 bytes 1.2k Hand Geometry Iris Retina 9 bytes 256 bytes 512 bytes 96 bytes 27

The connection with information theory For perfect secrecy: the number of messages #(M) = #(M C) System leakage: #(M)/#(M C) 1 han Vinck April 2013 28

Starting situation: intuitive analysis For perfect secrecy: #(M) = #(M C) = #(K C) #(K) C and M connected via unique key. Thus, M and C determine K han Vinck April 2013 29

Noisy key han Vinck April 2013 30

Noisy key #(k ) = number of noisy keys #(k k) = number of noisy keys given a key #(k c) = number of keys given a cipher Let every key gives rise to a set of keys k k => we assume the cardinality #(k k) is fixed Then, #(k c) x #(k k) #(k ). Necessary condition, because if not true, there exists a key k that originates from 2 or more different keysandthusincorrectdecryptionappears han Vinck April 2013 31

Noisy key #k #(k k) #(k k ) #k Let and Then #(k k) be the number of noisy keys given a particular key (the same for all keys) the average number of keys given a noisy key is denoted as av( #(k k )) #(k) #(k k) = #(k ) av(#(k k )) => the # of outgoing arrows = # incoming arrows and thus for perfect secrecy: #(M) = #(M c) = #(k c) #(k ) / #(k k) = #(k) /av(#(k k )) Conclusion: The noisy key gives a reduction in the maximum number of messages han Vinck April 2013 32

idea: Use redundancy to correct errors in the Bio Properties of a linear code: length n, k information digits odd minimum distance d min G H T k I k P P = 0 n I n-k n property: rg = c ch T = 0 n-k Property: let e 1 H T = s 1 and e 2 H T = s 2 ; e 1 e 2 then s 1 s 2 for e 1 and e 2 < d min /2 because 6/17/2013 A.J. Han Vinck 33

Maximum Aposteriori Probability (MAP) receiver (minimum error probability) Given a channel b H T s Data base Attacker of DB: for every s, guess a particular b i the best guess is the b i for which P(b i stored as s s) is maximum P(correct s) P(correct) s max P(b s) b P(s) max P(b s) b s max P(s b)p(b) b Bayes rule 34

performance Minimum error propability guess (MAP) Guess b P guess (correct) max P(b). B Guess b s P guess (correct s) P(s) maxp(b s) s S b B 2 n k maxp(b). B We pay a price by using redundancy! 6/17/2013 A.J. Han Vinck

construct b from a noisy version b and syndrome s enrollment b n H T n-k s = bh T Data Base Security: guess b s b e = b n verification H T n-k b H T bh T bh T b H T =e H T b e = b Conclusion: For k small: good reconstruction, bad security For k large: 6/17/2013 A.J. Han Vinck bad reconstruction, good security

Example: BCH codes (bits) test for a valid syndrome For binary BCH codes: n = 256, k = 224 bits, d min = 7 False Rejection Rate = P(#errors 4) (100p) 4 ; too many differences False Acceptance Rate < 2 8 random vector insided decoding region Security: 2 224 6/17/2013 A.J. Han Vinck 37

As a picture Determines FRR 2 n 2 n Determines FAR Number of codewords and length stays the same 6/17/2013 A.J. Han Vinck 38

It is time for an application enrollment data b F(b) key E k (data) H T bh T DB DB b H T b H T eh T decode e b F(b) key D k (data) entrance data 39

Another application enrollment b F(b) key H T bh T DB DB b H T b H T eh T decode e b F(b) key Equal? Y/N entrance 40

Challenge response Enrollment: b + c = s; derive key K(c) b K(c) e(m,k(c)) compare challenge m e(m,k(c)) s = b+c b +s => c K(c) <= c server card 41

Another scheme: Enrollment Generate random codeword c(r) hash(r) Fingerprint b c b store c b hash(r) data base: DB Condition: given c b and hash(r) it is hard to estimate b or c(r) Han Vinck 42

Idea: Juels-Wattenberg Enrollment: b = fingerprint Secure sketch: input b b s b b s c(r) c 2 k Codewords c choose random r store s : s = c b decode c from s b calculate s c = b 43

authentication b = b e c e decode r c b hash(r) c b hash(r) hash(r) is b a noisy version of b? data base FRR: valid b rejected; FAR: invalid b accepted; Han Vinck 44r

attacker b = b e c e decode r c b hash(r) c b hash(r) hash(r) is b a noisy version of b? data base Guess find b from s c(r) = b r or b or find r from s b c(r) Han Vinck 45

Improved legal detector b = b e c e decode r c b hash(r) c b hash(r) hash(r) is b a noisy version of b? data base FRR: valid b rejected; FAR: invalid b accepted; Han Vinck 46