A Survey on Secure Crypto-Biometric System using Blind Authentication Technique
Keywords:
Biometrics, Cryptosystems, Privacy, Public Key Cryptography, Security, AuthenticationAbstract
Reliable user authentication is becoming an increasingly important task in the Web-enabled world. Biometrics-based authentication systems offer obvious usability advantages over traditional password and token-based authentication schemes. However, biometrics also raises some issues in lack of privacy, template security, and revocability. The use of cryptographic primitives to bolster the biometric authentication system can solve the issues in biometric system.The combination of biometrics over cryptography may lead to a problem of lack of accuracy in biometric verification. In this paper, We propose a cryptographic protocol for biometrics authentication without revealing personal biometrical data against malicious verifier the protocol is termed as blind biometric authentication protocol, which addresses the concerns of user�s privacy, template protection, trust issue. The accuracy problem can be solved by designing a classifier. The protocol is blind in the sense that it reveals only the identity, and no additional information about the user or the biometric to the authenticating server or vice-versa. The proposed protocol is secure to different attacks.
References
A. K. Jain, A. Ross, and S. Prabhakar, “An introduction to biometric recognition,” IEEE Trans. Circuits Syst. Video Technol., vol. 14, no. 1, pp. 4–20, Jan. 2004.
N. K. Ratha, J. H. Connell, and R. M. Bolle, “Enhancing security and privacy in biometrics-based authentication systems,” IBM Syst. J., vol. 40, no. 3, pp. 614–634, Mar. 2001.
R. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Commun. ACM, vol. 21, no. 2, pp. 120–126, 1978.
C. Fontaine and F. Galand, “A survey of homomorphic encryption for nonspecialists,” EURASIP, vol. 1, pp. 1–15, 2007.
C. Gentry, “Fully homomorphic encryption using ideal lattices,” STOC, pp. 169–178, 2009.
F. Farooq, R. M. Bolle, T.-Y. Jea, and N. Ratha, “Anonymous and revocable fingerprint recognition,” in CVPR Biometrics Worshop, Jun. 2007, pp. 1–7.
A. Teoh, D. Ngo, and A. Goh, “Biohashing: Two factor authentication featuring fingerprint data and tokenised random number,” Pattern Recognit., vol. 37, no. 11, pp. 2245–2255, Nov. 2004.
A. K. Jain, K. Nandakumar, and A. Nagar, “Biometric template security,” EURASIP, vol. 8, no. 2, pp. 1–17, 2008.
M. Upmanyu, A. M. Namboodiri, K. Srinathan, and C. V. Jawahar, “Efficient biometric verification in the encrypted domain,” in 3rd Int. Conf. Biometrics, Jun. 2009, pp. 906–915.
Yogesh Badhe, Hafij Balbatti, Neelkanth Kaladagi , Kranti Kumar, “IRIS Recognition and Authentication System for Enhancing Data Security” , International Journal of Computer Sciences and Engineering, Volume-02, Issue-03, Page No (1-5), March 2014.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
