• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations | Disambiguate

Multibiometric systems: Fusion strategies and template security (2008)

by Karthik Nandakumar
Add To MetaCart

Tools

Sorted by:
Results 1 - 10 of 23
Next 10 →

A hybrid biometric cryptosystem for securing fingerprint minutiae templates

by A. Nagar, et al. - PATTERN RECOGNITION LETTERS , 2009
"... ..."
Abstract - Cited by 15 (0 self) - Add to MetaCart
Abstract not found

Securing biometric data

by Anthony Vetro, Stark Draper, Shantanu Rane, Jonathan Yedidia, Anthony Vetro, Stark C. Draper, Shantanu Rane, Jonathan S. Yedidia - in Distributed Source Coding
"... This chapter discusses the application of distributed source coding techniques to biometric security. A Slepian-Wolf coding system is used to provide a secure means of storing biometric data that provides robust biometric authentication for genuine users and guards against attacks from imposters. A ..."
Abstract - Cited by 12 (3 self) - Add to MetaCart
This chapter discusses the application of distributed source coding techniques to biometric security. A Slepian-Wolf coding system is used to provide a secure means of storing biometric data that provides robust biometric authentication for genuine users and guards against attacks from imposters. A formal quantification of the trade off between security and robustness is provided as a function of the Slepian-Wolf coding rate. Prototype secure biometric designs are presented for both iris and fingerprint modalities. These designs demonstrate that it is feasible to achieve information-theoretic security while not significantly compromising authentication performance (measured in terms of false-rejection and false-acceptance rates) when compared to conventional biometric systems. The methods described in this chapter can be applied to various architectures, including secure biometric authentication for access control and biometric-based key generation for encryption.
(Show Context)

Citation Context

...ion – such as both iris and fingerprint. The measurements are fused to improve overall robustness and security. This particular combination and some encouraging results are presented by Nandakumar in =-=[31]-=-. However, the topic has yet to be studied in the context of a Slepian-Wolf coding system. As the use of biometrics become more widespread, the incentive to attack biometric systems will grow. Assumin...

Multibiometric cryptosystem: Model structure and performance analysis

by Bo Fu , Senior Member, IEEE Simon X Yang , Jianping Li , Dekun Hu - IEEE Transactions on Information Forensics and Security, December 2009
"... Abstract-Single biometric cryptosystems were developed to obtain win-win scenarios for security and privacy. They are seriously threatened by spoof attacks, in which a forged biometric copy or artificially recreated biometric data of a legitimate user may be used to spoof a system. Meanwhile, featu ..."
Abstract - Cited by 11 (0 self) - Add to MetaCart
Abstract-Single biometric cryptosystems were developed to obtain win-win scenarios for security and privacy. They are seriously threatened by spoof attacks, in which a forged biometric copy or artificially recreated biometric data of a legitimate user may be used to spoof a system. Meanwhile, feature alignment and quantization greatly degrade the accuracy of single biometric cryptosystems. In this paper, by trying to bind multiple biometrics to cryptography, a cryptosystem named multibiometric cryptosystem (MBC), is demonstrated from the theoretical point of view. First, an MBC with two fusion levels: fusion at the biometric level, and fusion at the cryptographic level, is formally defined. Then four models, namely biometric fusion model, MN-split model, nonsplit model, and package model, adopted at those two levels for fusion are presented. Shannon entropy analysis shows that even if the biometric ciphertexts and some biometric traits are disclosed, the new constructions still can achieve consistently data security and biometric privacy. In addition, the achievable accuracy is analyzed in terms of false acceptance rate/false rejection rate at each model. Finally, a comparison on the relative advantages and disadvantages of the proposed models is discussed.

Fingerprint – Iris Fusion based Identification System using a Single Hamming

by Asim Baig, Ahmed Bouridane, Fatih Kurugollu, Gang Qu - Distance Matcher”, International Journal of Bio- Science and Bio- Technology , 2009
"... Conventional multimodal biometric identification systems tend to have larger memory footprint, slower processing speeds and a higher implementation and operational cost. In this paper we propose a state of the art framework for multimodal biometric identification system which can be adapted for any ..."
Abstract - Cited by 9 (0 self) - Add to MetaCart
Conventional multimodal biometric identification systems tend to have larger memory footprint, slower processing speeds and a higher implementation and operational cost. In this paper we propose a state of the art framework for multimodal biometric identification system which can be adapted for any type of biometrics to provide smaller memory footprint and faster implementation than the conventional multimodal biometrics systems. The proposed framework is verified by development of a fingerprint and iris based fusion system which utilizes a single Hamming Distance matcher. Extensive testing is performed on the system running in identification mode and the results show that the system not only provides higher accuracy than the individual unimodal system but also the results are comparable to the conventional system. 1.
(Show Context)

Citation Context

...om the FVC2004 competition andsthe phase code using Gabor filters based Iris Recognition approach for fusion to show thatsmultimodal approach reduces the EER and FAR errors.sIn his PhD thesis Karthik =-=[11]-=- proposes a fusion strategy based likelihood ratio used in thesNeyman-Pearson theorem for combination of match score. He shows that this approachsconsistently achieves high recognition rates over mult...

An Algorithm for Improved Accuracy in unimodal Biometric Systems Through Fusion of Multiple Feature Sets

by C. Lakshmi Deepika A. Kandaswamy - 2009), 33–40. Anika Pflug, Daniel Hartung and Christoph Busch
"... The major concern in a Biometric Identification System is its accuracy. In spite of the improvements in image acquisition and image processing techniques, the amount of research still being carried out in person verification and identification show that a recognition system which gives 0 % FAR (Fals ..."
Abstract - Cited by 4 (0 self) - Add to MetaCart
The major concern in a Biometric Identification System is its accuracy. In spite of the improvements in image acquisition and image processing techniques, the amount of research still being carried out in person verification and identification show that a recognition system which gives 0 % FAR (False Acceptance Rate) and FRR (False Rejection Rate) is still not a reality. Multibiometric systems which combine two different biometric modalities or two different representations of the same biometric, to verify a person’s identity are a means of improving the accuracy of a biometric system. The former case however requires the user to produce his biometric identity two times to two different sensors. The image processing and pattern matching activities also increase nearly twofold compared to unimodal systems. In this paper we propose a fusion of two different feature sets, one extracted from the morphological features and the other from statistical features, of the same biometric template, namely the hand vein biometric. The proposed system gives the accuracy of a multimodal system at the speed and cost of a unimodal system.
(Show Context)

Citation Context

...e Face and Fingerprint [3]sof the same person, Lip movements and Voice [4], Handsgeometry and palm print [5] are fused. The fusion is doneseither at the sensor level [6], feature level or score levels=-=[7]-=-. In general, fusion of two feature sets yields moresaccuracy only when the two feature sets are independentsof each other [8]. In this paper we propose asmultibiometric system in which two different ...

Improving Performance and Security of Biometrics Using Efficient and Stable Random Projection Techniques*

by Sabah Jassim, Hisham Al-assam, Harin Sellahewa
"... The challenges in biometrics research activities have expanded recently to include the maintenance of security and privacy of biometric templates beside the traditional work to improve accuracy, speed, and robustness. Revocable biometric templates and biometric cryptosystems have been developed as t ..."
Abstract - Cited by 4 (0 self) - Add to MetaCart
The challenges in biometrics research activities have expanded recently to include the maintenance of security and privacy of biometric templates beside the traditional work to improve accuracy, speed, and robustness. Revocable biometric templates and biometric cryptosystems have been developed as template protection measures. Revocability means that biometric templates could be revoked in the same way as lost or stolen credit cards are, while biometric cryptosystems aim to generate biometric keys and hashes to be used as proof of identity. Recently developed biometric protection schemes involve the use of random projections (RP) onto secret personalised domains. In this paper, we propose a novel and efficient orthonormal RP scheme to be used for the generation of revocable biometrics. We shall demonstrate the result of applying our RP transforms on face biometrics and compare its efficiency with that of the widely used RP technique based on the Gram-Schmidt process. We shall also present the results of experimental work on recognition accuracy before and after applying the proposed transform on feature vectors that are generated by wavelet transformed face images. Some security analysis of our scheme will also be presented. 1.
(Show Context)

Citation Context

...tication schemes, the security of biometric systems can be undermined in a number of ways. A biometric template can be replaced by an imposer’s template in a system database or be stolen and replayed =-=[3]-=-. As a result, the imposter will gain unauthorized access to a place or a system. Moreover, it has been shown that it is possible to create a physical spoof starting from biometric templates [3,4]. An...

Securing Revocable Iris and Retinal Templates using Combined User and Soft Biometric based Password Hardened Multimodal Fuzzy Vault

by V. S. Meenakshi, Dr G. Padmavathi
"... Biometric systems are subjected to a variety of attacks. Stored biometric template attack is very severe compared to all other attacks. Providing security to biometric templates is an important issue in building a reliable personal identification system. Multi biometric systems are more resistive to ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
Biometric systems are subjected to a variety of attacks. Stored biometric template attack is very severe compared to all other attacks. Providing security to biometric templates is an important issue in building a reliable personal identification system. Multi biometric systems are more resistive towards spoof attacks compared to unibiometric counterpart. Soft biometric are ancillary information about a person. This work provides security and revocability to iris and retinal templates using combined user and soft biometric based password hardened multimodal biometric fuzzy vault. Password hardening provides security and revocability to biometric templates. Eye biometrics namely iris and retina have certain merits compared to fingerprint. Iris and retina capturing cameras can be mounted on a single device to improve user convenience. Security of the vault is measured in terms of min-entropy.
(Show Context)

Citation Context

...evocable iris templates and secured them using password hardened fuzzy vault. The basic idea of generating cancelable iris is based on the idea derived from the work done by karthick Nandakumar et al =-=[5,6,7]-=- and Srinivasa Reddy[3]. Sharat Chikkarur[8] work on fingerprint provided a general understanding on feature extraction steps, Iris based hard fuzzy vault proposed by Srinivasa Reddy [3] applies a seq...

Security Analysis of Password Hardened Multimodal Biometric Fuzzy Vault

by V. S. Meenakshi, G. Padmavathi
"... Abstract—Biometric techniques are gaining importance for personal authentication and identification as compared to the traditional authentication methods. Biometric templates are vulnerable to variety of attacks due to their inherent nature. When a person’s biometric is compromised his identity is l ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
Abstract—Biometric techniques are gaining importance for personal authentication and identification as compared to the traditional authentication methods. Biometric templates are vulnerable to variety of attacks due to their inherent nature. When a person’s biometric is compromised his identity is lost. In contrast to password, biometric is not revocable. Therefore, providing security to the stored biometric template is very crucial. Crypto biometric systems are authentication systems, which blends the idea of cryptography and biometrics. Fuzzy vault is a proven crypto biometric construct which is used to secure the biometric templates. However fuzzy vault suffer from certain limitations like nonrevocability, cross matching. Security of the fuzzy vault is affected by the non-uniform nature of the biometric data. Fuzzy vault when hardened with password overcomes these limitations. Password provides an additional layer of security and enhances user privacy. Retina has certain advantages over other biometric traits. Retinal scans are used in high-end security applications like access control to areas or rooms in military installations, power plants, and other high risk security areas. This work applies the idea of fuzzy vault for retinal biometric template. Multimodal biometric system performance is well compared to single modal biometric systems. The proposed multi modal biometric fuzzy vault includes combined feature points from retina and fingerprint. The combined vault is hardened with user password for achieving high level of security. The security of the combined vault is measured using min-entropy. The proposed password hardened multi biometric fuzzy vault is robust towards stored biometric template attacks.
(Show Context)

Citation Context

...different applications to avoid cross matching. In the proposed method the security of the fuzzy vault is measured by min-entropy which is expressed in terms of security bits. According to NandaKumar =-=[7]-=- the min-entropy of the feature template M T given the vault V can be calculated as IV. EXPERIMENTAL RESULTS AND SECURITY ANALYSIS The vertical and horizontal distances of the retinal bifurcation feat...

Extended Feature Set and Touchless Imaging For Fingerprint Matching By

by Yi Chen, Yi Chen
"... In recent decades, fingerprint matching has undertaken a tremendous transition from a tedious manual procedure for criminal investigation to the most widely deployed biometric technology for government and civilians applications. In this thesis, we address two critical issues related to this transit ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
In recent decades, fingerprint matching has undertaken a tremendous transition from a tedious manual procedure for criminal investigation to the most widely deployed biometric technology for government and civilians applications. In this thesis, we address two critical issues related to this transition: i) automatic systems have not fully utilized the knowledge gained by forensic experts in manual fingerprint matching (e.g., extended features, matching with distortion); ii) interoperability between advanced sensing technology and legacy fingerprint databases has not been fully achieved in automatic systems. To address the first issue, we investigate the use of extended features, often utilized in manual fingerprint matching, in automatic systems. These extended features include ridge skeletons, pores, dots and incipients. We propose methods to automatically extract and compare these extended features in a hierarchical fashion. Our experiments show performance improvement from each of the proposed extended features in live-scan matching on MSU database (full vs. full and partial vs. full). We
(Show Context)

Citation Context

...s, which need to be broken randomly to reach a strict ranking order. As a result, the accuracy from rank 1 to ...

Improving Performance by combining Fingerprint

by Iris In Multimodal Biometric, Sakshi Kalra, Anil Lamba
"... Abstract — Multibiometric systems imitate the unification of two or more unimodal biometric systems. Such systems are predicted to be more sound due to the residence of multiple independent pieces of evidence. Hence they sign in at unparallel levels of security.This study proposes a blending of mult ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Abstract — Multibiometric systems imitate the unification of two or more unimodal biometric systems. Such systems are predicted to be more sound due to the residence of multiple independent pieces of evidence. Hence they sign in at unparallel levels of security.This study proposes a blending of multimodal fingerprint and Iris recognition technique. Our task is two section composition first is feature extraction from both the modalities and then feature level fusion of the extracted features and finally applying a encryption technique to the fused output.
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University