This presentation gives the detail information about the error handling methods used in bio-cryptography. and also tells about bio - cryptography.
Size: 753.04 KB
Language: en
Added: Aug 26, 2017
Slides: 15 pages
Slide Content
Seminar On Error Handling Methods Used in Bio-Cryptography Presented by: Kanchan P. Nawkar (18) Guided By: Prof. A. K. Shahade
Contents 1. Introduction to Biometrics Biometrics Processing Biometrics errors Performance Of Biometrics 2. Introduction To Cryptography Processing Of Cryptography 3. Problem statement 4. Error Handling Methods Quantization Subsetting Error correction Coding 5. Conclusion
1. Introduction To Biometrics: Biometrics refers to the automatic identification of a person based on his or her physiological or behavioral characteristics .
1.1 Biometrics Processing:
1.3 Performance Of Biometrics: False acceptance rate (FAR) False recognition rate (FRR) 1.2 Biometric devices can make two kinds of errors: The false accept The false reject
2.Introduction To Cryptography: Cryptography is an important feature of computer security. It is dependent on the private key. The user chooses an easily remembered pass code that is used to encrypt the cryptographic key and this key is then stored in a database. Security of the cryptographic key is weak due to practical problems of remembering pass codes.
2.1 Processing Of Cryptography: There are various types of algorithms for encryption, some common algorithms include: Secret Key Cryptography (SKC) Public Key Cryptography (PKC) Hash Functions
3. Problem Statement: Biometric system works with two steps: Registration: For registration a person provide a live biometric for measurements and the results will be stored. Verification: For verification, the person must provide the same biometric for new measurements. The output of the new measurements will be compared to the previously stored results. Biometric measurements generate noisy data and it is a challenging problem to achieve security with noisy data . So, to solve the problem of noisy data combine the cryptographic key with Biometrics.
A few biometrics, including keystroke dynamics, voice, handwritten signatures, face, iris, and fingerprint, have been proposed for cryptographic key binding. For different biometrics, different techniques have to be chosen to solve the fuzzy measurement problems. Biometrics-exemplified error tolerance techniques are as follows: Quantization Subsetting Error correction Coding 4. Error Handling Methods:
4.1 Quantization Individual biometric image will be quantized into a number of small units. Delaunay Triangulation is used to generate feature vector, for each minutiae mi the set of triangles shares the vertex mi. This is denoted as local structure centered on mi, TSi. To tolerate the deformation each segment of feature vector is quantized.
The matching between a saved template and a query is being done on the transformed domain by considering number of matched triangles in each local structure. In this method error tolerance is handled by quantization as well as the properties of Delaunay triangles. 4.2 Subsetting : Fuzzy Vault Scheme Fuzzy vault is a bio-cryptographic construction. The security of this method depends completely upon the polynomial reconstruction problem.
Let, consider a secret K, during vault construction it is encoded into coefficients of a polynomial P of degree D Then improved the method by introducing CRC (Cyclic Redundancy Check) in the polynomial .. CRC: A code added to data which is used to detect errors occurring during transmission, storage, or retrieval.
4.3 Error Correction Codes (ECCs): Overviews of ECCs used in Bio-Cryptography are as follows: • Reed Solomon: RS codes are a set of algebraic codes which are used for error correction at block level. Let, consider m blocks of information [x1, x2,..., xm] and during encoding these blocks are embedded in coefficients of a polynomial P of degree (m−1). P(y) = x m y (m−1) + x(m−1)y (m−2) + ... +1 ------- (1) Then, it is possible to generate n codewords from P(y) by substituting values y € Z. From a corrupted codeword, RS decoding can reconstruct the original polynomial given that n = m+2t. Afterwards, by extracting the coefficients of the reconstructed polynomial, the original message can be unravelled.
• Hadamard Codes: Hadamard codes are constructed from the Hadamard matrix which is a square matrix with elements 1 or−1. If H c (k) and H(k) denote a set of Hadamard codes and a Hadamard matrix; then, H c (k) = (H(k) -H(k)) Therefore, if we consider a Hadamard code of size n =2 k bits, then there are 2 n codewords generated in total. Furthermore, the code is having a minimum distance of 2 k−1 which suggests that it can correct up to 2 k−2 -1 error.
Conclusion: Biometric Encryption and Bios-crypt are high security means of protecting the critical data of government, police departments, army and big firms. The current generation of biometric identification devices offer cost and performance advantages over manual security procedures. All these methods have shown that, using biometrics for identification or verification-based security systems and cryptosystems, is a promising technology