Biometrics based Cryptosystem Design. Cryptosystem A mechanism using which one can encode an information content to an incomprehensible form and also.

Slides:



Advertisements
Similar presentations
Relations, Functions, and Matrices Mathematical Structures for Computer Science Chapter 4 Copyright © 2006 W.H. Freeman & Co.MSCS SlidesThe Mighty Mod.
Advertisements

Hash Functions A hash function takes data of arbitrary size and returns a value in a fixed range. If you compute the hash of the same data at different.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Computer Science 101 Data Encryption And Computer Networks.
Securing Fingerprint Template - Fuzzy Vault with Helper Data
Fuzzy Stuff Lecture 24, Outline Motivation: Biometric Architectures Motivation: Biometric Architectures New Tool (for us): Error Correcting.
Mar 19, 2002Mårten Trolin1 This lecture On the assignment Certificates and key management SSL/TLS –Introduction –Phases –Commands.
Apr 2, 2002Mårten Trolin1 Previous lecture On the assignment Certificates and key management –Obtaining a certificate –Verifying a certificate –Certificate.
Content Based Image Clustering and Image Retrieval Using Multiple Instance Learning Using Multiple Instance Learning Xin Chen Advisor: Chengcui Zhang Department.
Session 4 Asymmetric ciphers.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 29 Cryptography and Network.
Security Chapters 14,15. The Security Environment Threats Security goals and threats.
Security Chapters 14,15. The Security Environment Threats Security goals and threats.
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.
Security Chapter The security environment 9.2 Basics of cryptography 9.3 User authentication 9.4 Attacks from inside the system 9.5 Attacks from.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Chapter 2 Basic Encryption and Decryption (part B)
BR1 Protection and Security B. Ramamurthy Chapters 18 and 19.
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Security using Encryption Security Features Message Origin Authentication - verifying that the sender is who he or she says they are Content Integrity.
Cryptography Week-6.
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
Chapter 10: Authentication Guide to Computer Network Security.
A Cryptography Education Tool Anna Yu Department of Computer Science College of Engineering North Carolina A&T State University June 18, 2009.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
MATH 224 – Discrete Mathematics
Computer Networks Ivan Marsic Rutgers University Chapter 7 – Network Security Chapter 8 – Network Monitoring Chapter 9 – Internet Protocols APPENDIX: Probability.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
Presented by Tienwei Tsai July, 2005
Security.  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Encryption, continued Public Key encryption and Digital Signatures.
Section 4.4: The RSA Cryptosystem Practice HW Handwritten and Maple Exercises p at end of class notes.
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
Encryption.
Some Number Theory Modulo Operation: Question: What is 12 mod 9?
Johann A. Briffa Mahesh Theru Manohar Das A Robust Method For Imperceptible High- Capacity Information Hiding in Images. INTRODUCTION  The art of Hidden.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
What is Digital Signature Building confidentiality and trust into networked transactions. Kishankant Yadav
Pretty Good Privacy (PGP) Security for Electronic .
CRYPTOGRAPHY. WHAT IS PUBLIC-KEY ENCRYPTION? Encryption is the key to information security The main idea- by using only public information, a sender can.
Mort Anvari Introduction to Encryption Technology To insert your company logo on this slide From the Insert Menu Select “Picture” Locate your logo file.
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 11 September 23, 2004.
Private key
Stable Biometric Features Description (not definition): Biometric features whose value change very infrequently among multiple prints of a finger Deformation.
DIGITAL SIGNATURE(DS) IN VIDEO. Contents  What is Digital Signature(DS)?  General Signature Vs. Digital Signatures  How DS is Different from Encryption?
Wired Equivalent Privacy (WEP) Chris Overcash. Contents What is WEP? What is WEP? How is it implemented? How is it implemented? Why is it insecure? Why.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 13.Message Authentication.
Information Systems Design and Development Security Precautions Computing Science.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Visual Cryptography Given By: Moni Naor Adi Shamir Presented By: Anil Vishnoi (2005H103017)
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Public Key Cryptography. Asymmetric encryption is a form of cryptosystem in which Encryption and decryption are performed using the different keys—one.
Cryptography By: Nick Belhumeur. Overview What is Cryptography? What is Cryptography? 2 types of cryptosystems 2 types of cryptosystems Example of Encryption.
Asymmetric-Key Cryptography
Coexistence Among Cryptography and Noisy Data Theory and Applications
Network Security Unit-VI
PART VII Security.
Image Coding and Compression
Generating QR Codes from Oracle Database - Appendix
Presentation transcript:

Biometrics based Cryptosystem Design

Cryptosystem A mechanism using which one can encode an information content to an incomprehensible form and also recover the original content when desired. Biometrics Biometrics is the science and technology of authentication (i.e. establishing the identity of an individual) by measuring the subject person's physiological or behavioral features.

Motivation Normally used cryptosystems have a number of associated inconveniences and problems such as  User needs to remember passwords could be forgotten.  User has to carry smart cards could be lost or stolen.  Problem of non-repudiation The user who generated the cryptic message can easily deny his involvement Biometrics is a solution to these problems

Difficulties in using Biometrics Non-repeatability  Every time one obtains a biometric, its value is not exactly the same as that obtained before. Limited Number Easily Accessible to public

Biometric used & Feature Extraction Fingerprints are used as a key to our cryptosystem Features are extracted using a set of gabor filters applied on all the elements of a tessellated fingerprint.

Gabor Feature Extraction Reference Point Location  Divide the fingerprint image, into non-overlapping blocks  Compute the intensity gradients using sobel operator  Estimate the local orientation as  Compute E, an image containing only the sine component of O

Initialize ’A’, a label image used to indicate the reference point Find the maximum value in ’A’ and assign its coordinate to the reference point. Repeat steps by using a window size of w’×w’, where w’<w to get a fine estimate  The different sizes taken are 5, 10 and 15 pixels

Sector-Wise Normalization Tessellate fingerprint image into sectors and normalize pixels in each sector as: Gabor Filters where f is the frequency, and are the space constants fig

Each sector is filtered using gabor filters for four different values of θ in {0,45,90,135} the feature value, V iθ, is the average absolute deviation from the mean defined as where n i is the number of pixels in S i and P iθ is the mean of pixel values of F iθ (x, y) Finally a feature vector is generated whose elements have value in the range 0-255

Addressing problems associated with using biometrics

Limited number & Open to public Transform the Biometric Features into a new set of features using a Secure Transformation  No. of bio-keys=No. of Transformations  Added security since transformation function is kept secret Secure Transformation should have some desirable qualities  Range of value of elements of feature vector should not vary non uniformly

Secure Transformation Transformation matrix is generated using a set of random numbers. Feature vector to be transformed is converted to matrix form and convolved with the Transformation matrix to get the Secure Features. Fingerprint Features in Matrix Form Random Kernel Secure Fingerprint Features

Non-Repeatability Usual cryptosystems fail with biometrics since each time one obtains a biometric, its value is not exactly the same as that obtained before.  There is a high probability that a person is not able to decipher the message encrypted using biometrics Modified Fuzzy Vault Scheme is used instead of usual cryptosystem.

Modified Fuzzy Vault Scheme Fuzzy Vault  A secret message ‘M’ is encrypted into a fuzzy vault ‘V’ using another data ‘A’  ‘M’ can be decrypted using a data ‘B’ sufficiently close to ‘A’ Creation of Fuzzy Vault  The secret message ‘M’ is the Document of length k.  Data ‘A’ is the biometric template.

 ‘M’ is encoded using the Reed-Solomon codes to ‘C’ of length n=2 t -1 RS codes have error correcting capacity of (n-k)/2 where k is the length of ‘M’  n triplets are formed such that a randomly chosen position(1,2or3) say Position (i) of the i th triplet is the i th number from code ‘C’ and the other two numbers are randomly chosen. Call the triplet Locking Set 1  Another n triplets are formed such that i th triplet contains i th biometric element at Position(i) The other two elements are such that they form an arithmetic progression with distance=FV_tolerance Call it Locking Set 2

Unlocking the Fuzzy Vault  Using the biometric, find the Position(i) Position(i) is the position of the element in i th triplet in Locking Set 2 which is closest to i th biometric element  Find value at Position(i) in the Locking Set 1, this should be the i th value of the Reed-Solomon code.  Decode the Reed-Solomon code to obtain the message.

Non-Repudiability Since Fuzzy Vault is Symmetric Cryptosystem, the encryption key is same as decryption key.  Causes a set-back in terms of non-repudiability Solution  Encryption module has its own set of encryption and decryption keys.  Created Fuzzy Vault is encrypted by the module whose decryption key is made public. No possibility of creation of fuzzy vault outside Encryption Module using the key.

Invariant Features Invariant feature I of data d for a transformation T is the feature such that: Invariant features are used instead of biometrics.  Transformed biometric is sent Actual biometric is secure  Same key serves for different cryptosystems by changing the set of Invariants.  Key to hierarchical security

Permutation used as Transformation  Values of elements are not changed Invariant Feature is the increasing order of the feature elements Hierarchical Security  Message can be encoded with different security levels  Receivers with a key for security level higher than the encryption security are able to decode.  Implemented by doing binary subdivision of the Secure Feature and evaluating Invariant Features for each division. Increasing order of first 2k permuted elements is same as increasing order of join of first k permuted elements and next k permuted elements.

Complete System Design The complete system is implemented in MATLAB. SERVER -RSA Field & Decr. Key for Each module MODULE1 -Encr. Key -Secure Tr. For Each user USER1USER2 MODULE2 -Encr. Key -Secure Tr. For Each user USER1 MODULE3 -Encr. Key -Secure Tr. For Each user USER1USER2

System Initialization Each Module is initialized with its RSA keys and Field and is added to the Server.  Decryption key and Field are registered with server Each user is added to a module  User’s Secure Transformation and Identity are registered with the module.

Document Sending  Calculate Gabor Features of the fingerprint  Transform the Fingerprint Features to get Secure Fingerprint Features  Generate and RSA cryptosystem(32 bit in our case) randomly having Field n Encryption Key e Decryption Key d  Divide the document into chunks of appropriate length(2 in our case) such that the numeric equivalent of each chunk is less than n for the encryption to work properly. Pad the message if required.  Encrypt the document using e

 Each digit of the number d is considered as an 8-bit character to be secured in the fuzzy vault  Append random digits to d such that its length becomes 255-2*Permissible_Error  Find the invariant features corresponding to the desired security level to create Modified Fuzzy Vault  Encrypt Modified Fuzzy Vault using Module Encryption Key  Send the Encrypted Modified Fuzzy Vault, the Encrypted Document, Security Level, Module Id, User identity, the padded values, n and the length of d

Encryption Biometric Features Secure Transformation Secure Features Invariant Extraction Invariant Feature Invariant Feature Document Key Fuzzy Vault Modified Fuzzy Vault Encryption Algorithm Fuzzy Vault Module Encryption Encrypted Fuzzy Vault

Document Receiving  Find the invariant features corresponding to the Security Level  Decrypt the Modified Fuzzy Vault using module Decryption Key  Open the Modified Fuzzy Vault using the invariant features to get d  Obtain the actual d taking only the first desired digits  Decrypt the Document using n and d to get the Document

Decryption KEY Document key Invariant Extraction Invariant Feature Modified Fuzzy Vault Decryption Algorithm Encrypted Fuzzy Vault Module Encryption Fuzzy Vault

Results obtained using this cryptosystem FAR and FRR for Modified Fuzzy Vault FV_tol. FAR (%) FRR (%) FV_tol. FAR (%) FRR (%)