scholarly journals Towards Better Performance for Protected Iris Biometric System with Confidence Matrix

Symmetry ◽  
2021 ◽  
Vol 13 (5) ◽  
pp. 910
Author(s):  
Tong-Yuen Chai ◽  
Bok-Min Goi ◽  
Wun-She Yap

Biometric template protection (BTP) schemes are implemented to increase public confidence in biometric systems regarding data privacy and security in recent years. The introduction of BTP has naturally incurred loss of information for security, which leads to performance degradation at the matching stage. Although efforts are shown in the extended work of some iris BTP schemes to improve their recognition performance, there is still a lack of a generalized solution for this problem. In this paper, a trainable approach that requires no further modification on the protected iris biometric templates has been proposed. This approach consists of two strategies to generate a confidence matrix to reduce the performance degradation of iris BTP schemes. The proposed binary confidence matrix showed better performance in noisy iris data, whereas the probability confidence matrix showed better performance in iris databases with better image quality. In addition, our proposed scheme has also taken into consideration the potential effects in recognition performance, which are caused by the database-associated noise masks and the variation in biometric data types produced by different iris BTP schemes. The proposed scheme has reported remarkable improvement in our experiments with various publicly available iris research databases being tested.

Symmetry ◽  
2019 ◽  
Vol 11 (2) ◽  
pp. 164
Author(s):  
Tong-Yuen Chai ◽  
Bok-Min Goi ◽  
Yong-Haur Tay ◽  
and Zhe Jin

Iris has been found to be unique and consistent over time despite its random nature. Unprotected biometric (iris) template raises concerns in security and privacy, as numerous large-scale iris recognition projects have been deployed worldwide—for instance, susceptibility to attacks, cumbersome renewability, and cross-matching. Template protection schemes from biometric cryptosystems and cancelable biometrics are expected to restore the confidence in biometrics regarding data privacy, given the great advancement in recent years. However, a majority of the biometric template protection schemes have uncertainties in guaranteeing criteria such as unlinkability, irreversibility, and revocability, while maintaining significant performance. Fuzzy commitment, a theoretically secure biometric key binding scheme, is vulnerable due to the inherent dependency of the biometric features and its reliance on error correction code (ECC). In this paper, an alignment-free and cancelable iris key binding scheme without ECC is proposed. The proposed system protects the binary biometric data, i.e., IrisCodes, from security and privacy attacks through a strong and size varying non-invertible cancelable transform. The proposed scheme provides flexibility in system storage and authentication speed via controllable hashed code length. We also proposed a fast key regeneration without either re-enrollment or constant storage of seeds. The experimental results and security analysis show the validity of the proposed scheme.


Author(s):  
Sheetal Chaudhary ◽  
Rajender Nath ◽  
Chander Kant ◽  
Surya Kant

Background and Objective: The most important issue concerning the security of biometric authentication systems is protection of biometric templates. This is because once the biometric template being attacked, it cannot be canceled and reissued. Thus, the intruder could avail the facilities that are meant only for the genuine user just bypassing the enrollment phase. Methods: To protect the biometric templates from attacks, it is advantageous to modify them before storing in the databases through some cancelable and non-invertible transformations. Hence, an approach based on cancelable biometrics is proposed in this paper for providing security and privacy to biometric templates. It uses left iris and right iris as input biometric traits. Different experiments are carried out to authenticate the proposed approach. Results and Conclusion: It satisfies all template protection requirements and expected to show good recognition performance without degrading it.


2018 ◽  
Vol 2018 ◽  
pp. 1-9 ◽  
Author(s):  
Dongdong Zhao ◽  
Shu Fang ◽  
Jianwen Xiang ◽  
Jing Tian ◽  
Shengwu Xiong

Biometrics have been widely studied in recent years, and they are increasingly employed in real-world applications. Meanwhile, a number of potential threats to the privacy of biometric data arise. Iris template protection demands that the privacy of iris data should be protected when performing iris recognition. According to the international standard ISO/IEC 24745, iris template protection should satisfy the irreversibility, revocability, and unlinkability. However, existing works about iris template protection demonstrate that it is difficult to satisfy the three privacy requirements simultaneously while supporting effective iris recognition. In this paper, we propose an iris template protection method based on local ranking. Specifically, the iris data are first XORed (Exclusive OR operation) with an application-specific string; next, we divide the results into blocks and then partition the blocks into groups. The blocks in each group are ranked according to their decimal values, and original blocks are transformed to their rank values for storage. We also extend the basic method to support the shifting strategy and masking strategy, which are two important strategies for iris recognition. We demonstrate that the proposed method satisfies the irreversibility, revocability, and unlinkability. Experimental results on typical iris datasets (i.e., CASIA-IrisV3-Interval, CASIA-IrisV4-Lamp, UBIRIS-V1-S1, and MMU-V1) show that the proposed method could maintain the recognition performance while protecting the privacy of iris data.


2020 ◽  
Vol 17 (6) ◽  
pp. 926-934
Author(s):  
Reza Mehmood ◽  
Arvind Selwal

In recent years the security breaches and fraud transactions are increasing day by day. So there is a necessity for highly secure authentication technologies. The security of an authentication system can be strengthened by using Biometric system rather than the traditional method of authentication like Identity Cards (ID) and password which can be stolen easily. A biometric system works on biometric traits and fingerprint has the maximum share in market for providing biometric authentication as it is reliable, consistent and easy to capture. Although the biometric system is used to provide security to many applications but it is susceptible to different types of assaults too. Among all the modules of the biometric system which needs security, biometric template protection has received great consideration in the past years from the research community due to sensitivity of the biometric data stored in the form of template. A number of methods have been devised for providing template protection. Fuzzy vault is one of the cryptosystem based method of template security. The aim of fuzzy vault technique is to protect the precarious data with the biometric template in a way that only certified user can access the secret by providing valid biometric. In this paper, a modified version of fuzzy vault is presented to increase the level of security to the template and the secret key. The polynomial whose coefficients represent the key is transformed using an integral operator to hide the key where the key can no longer be derived if the polynomial is known to the attacker. The proposed fuzzy vault scheme also prevents the system from stolen key inversion attack. The results are achieved in terms of False Accept Rate (FAR), False Reject Rate (FRR), Genuine Acceptance Rate (GAR) by varying the degree of polynomial and number of biometric samples. It was calculated that for 40 users GAR was found to be 92%, 90%, 85% for degree of polynomial to be 3, 4 and 5 respectively. It was observed that increasing the degree of polynomial decreased the FAR rate, thus increasing the security


2021 ◽  
Vol 22 (1) ◽  
pp. 53-68
Author(s):  
Guenter Knieps

5G attains the role of a GPT for an open set of downstream IoT applications in various network industries and within the app economy more generally. Traditionally, sector coupling has been a rather narrow concept focusing on the horizontal synergies of urban system integration in terms of transport, energy, and waste systems, or else the creation of new intermodal markets. The transition toward 5G has fundamentally changed the framing of sector coupling in network industries by underscoring the relevance of differentiating between horizontal and vertical sector coupling. Due to the fixed mobile convergence and the large open set of complementary use cases, 5G has taken on the characteristics of a generalized purpose technology (GPT) in its role as the enabler of a large variety of smart network applications. Due to this vertical relationship, characterized by pervasiveness and innovational complementarities between upstream 5G networks and downstream application sectors, vertical sector coupling between the provider of an upstream GPT and different downstream application industries has acquired particular relevance. In contrast to horizontal sector coupling among different application sectors, the driver of vertical sector coupling is that each of the heterogeneous application sectors requires a critical input from the upstream 5G network provider and combines this with its own downstream technology. Of particular relevance for vertical sector coupling are the innovational complementarities between upstream GPT and downstream application sectors. The focus on vertical sector coupling also has important policy implications. Although the evolution of 5G networks strongly depends on the entrepreneurial, market-driven activities of broadband network operators and application service providers, the future of 5G as a GPT is heavily contingent on the role of frequency management authorities and European regulatory policy with regard to data privacy and security regulations.


2021 ◽  
pp. 192536212110224
Author(s):  
Melissa C. Mercado ◽  
Deborah M. Stone ◽  
Caroline W. Kokubun ◽  
Aimée-Rika T. Trudeau ◽  
Elizabeth Gaylor ◽  
...  

Introduction: It is widely accepted that suicides—which account for more than 47 500 deaths per year in the United States—are undercounted by 10% to 30%, partially due to incomplete death scene investigations (DSI) and varying burden-of-proof standards across jurisdictions. This may result in the misclassification of overdose-related suicides as accidents or undetermined intent. Methods: Virtual and in-person meetings were held with suicidologists and DSI experts from five states (Spring-Summer 2017) to explore how features of a hypothetical electronic DSI tool may help address these challenges. Results: Participants envisioned a mobile DSI application for cell phones, tablets, or laptop computers. Features for systematic information collection, scene description, and guiding key informant interviews were perceived as useful for less-experienced investigators. Discussion: Wide adoption may be challenging due to differences in DSI standards, practices, costs, data privacy and security, and system integration needs. However, technological tools that support consistent and complete DSIs could strengthen the information needed to accurately identify overdose suicides.


Sign in / Sign up

Export Citation Format

Share Document