BioCryptosystems for Authentication and Network Security-A Survey
#1

BioCryptosystems for Authentication and Network Security-A Survey


I. INTRODUCTION
iometrics deals with identification of individuals based on their biological and behavioral characteristics. Autonomously, both biometrics and cryptography play a critical role in providing security to user information [1]. In a cryptographic system the user authentication is tenure based. In this type of system the cryptographic keys used for encryption and decryption are long and random, hence cannot be memorized. This has led to store the cryptographic key in some other position and release it based on some alternative authentication like password. This password can be easily compromised based on social engineering techniques. Most of the users have same passwords for many applications. Upon compromising a single password can open up many doors to illegitimate users. So passwords alone can no longer ensure user authentication and security. The biometrics and cryptographic systems can be combined together using two different ways. The binding of cryptographic key along with biometric template _______________________________
About 1-Asst.Proffessor, Department of Computer Science, Govt Arts College, Udumalpet, Tirupur, India. About 2-Dean Academic Affairs, PPG Institute of Technology, Coimbatore, India
.ensures user privacy and security as the biological and behavioral characteristics of a user cannot be revealed by another unauthorized user. In the first approach, cryptographic key generation is decoupled with biometric matching. Therefore, the cryptographic key is released when there occurs biometric matching (e.g. Smart card). This approach is known as Biometric based key Release. The second method is the biometric key generation in which both the biometric template and the cryptographic key are combined together. This combination does not need any matching operation to extract the key. The BioCryptosystems produce higher level of security since it assists the cryptographic systems to encrypt and decrypt the messages using biometric templates.
The cryptographic algorithms require their keys to be of 128 bits in length for Advanced Encryption Standards (AES) [2], [3]. The limitations of traditional passwords that are used for generation of cryptographic keys can be eliminated by BioCryptosystems. This method requires the person being authenticated to be present at the time of authentication where duplication is not possible. But because of noise, the biometric template produces only fuzzy data whereas a Digital signature requires crisp keys. Also fuzziness can be introduced due to variability in biometric data. To overcome this limitation the cryptographic system must accept some fuzziness. Therefore, fuzzy vault is such a construction used to store the secret key based on the biometric template. This paper presents an analysis of repercussion of the existing biometric techniques to the containment process.
II. RELATED WORKS
Traditional algorithms implemented using cryptosystems use long and random keys which are difficult to memorize and hence it required additional database to store the key. The release of the key is dependent on an alternate authentication approach (i.e. password) which may fail to identify the authorized user. The current BioCryptosystems alleviates this limitation by binding together cryptographic framework and the biometric features. This section describes some of the general approaches presented by various researchers towards BioCryptosystems.
A Key binding algorithm in an optical correlation based fingerprint matching system was proposed by Soutar et al. in [4], [5], and [6]. This is an algorithm developed to securely page link and retrieve the digital key using the interaction of a biometric image, such as fingerprint, with a secure block of data, popularly known as Bioscrypt. The key can be used as an encryption and decryption key. This Bioscrypt comprises a filter function, which are calculated using image processing algorithm and other information which is
B
Global Journal of Computer Science and Technology Vol. 10 Issue 2 (Ver 1.0), April 2010 P a g e | 13
required to first retrieve and then verify the validity of the key. The information from the output pattern formed via the interaction of the biometric image with the filter function is effectively utilized to retrieve the key. Therefore the design of the filter should be in such a manner that it produces consistent output patterns. Moreover, the security of the filter function should also be considered. The reported work in [4] by Soutar et al. also discusses on consistency of the output patterns and the security of the filter function. The major drawback of this approach is that the loss of entropy at each stage of algorithm has not been discussed. Davida et al. present an algorithm in [7], where the secure off-line authenticated user identification schemes based on the biometric system that can measure a user‘s biometric accurately (up to certain Hamming distance). The schemes presented in [7] by Davida et al., enhance identification and authorization in secure applications by binding a biometric template with authorization information on a token such as magnetic strip. This paper also discusses certain methods that are specially developed to minimize the compromise of a user‘s private biometric data which has been encapsulated in the authorized information. This eliminates the need of secure hardware tokens. Monrose et al. prescribe in [8] a novel approach to enhance the security of the user password by Password Hardening based on Key stroke Dynamics. This approach efficiently hides information about which of the user‘s features are relevant to generating the user password, even for an attacker it is more tedious to capture all system information. This proposed scheme automatically adapts to gradual changes in a user‘s typing patterns while maintaining the same user hardened password across multiple logins, for use in file encryption or other type of application that requires a long term secret key. This model first combines the legitimate user‘s typing patterns with the password to generate a hardened authentication pattern. This hardened password seems to be highly secure. The main drawback of this approach is that a user whose typing patterns change substantially between consecutive instances of typing the password may be unable to generate the user hardened password and this led to error in login.
Juels and Wattenberg in [9] presented an improved approach of that put forth by Davida et al. in [7]. In their contribution, ―Fuzzy commitment‖ scheme Juels and Wattenberg described more generalized and considerably improved method that can tolerate more variations in the biometric characteristics and hence determines to provide stronger security and privacy to user. In this approach the user is allowed to select a secret message at the time of enrollment. This approach utilizes the advantages of some error correcting methods to retrieve the original message. Juels and Sudan [10] prove the security of the fuzzy vault scheme in an information-theoretic sense by enhancing the previous work in [9] proposed by Juels and Wattenberg. But their algorithm fails to highlight on robustness of the algorithm to typical variations in the biometric signals. The comparison of different algorithm proposed in literature by researchers is summarized in Table 1. A non-invertible transformation function based approach was put forth by Ratha et al. in [11], which discusses the potential security holes in a biometrics based authentication scheme, quantify the numerical strength of one method of fingerprint matching, and includes discussion on combating some of the weakness. This method employs a one way function to transform the biometric features. Their method does not involve redesigning of biometric matcher since the transformation takes place in same feature space. The main flaw of this algorithm is that it leads to increased False Rejection Rate.
Clancy et al. [12] implemented Juels and Sudan‘s fuzzy vault algorithm for key generation based on the fingerprint minutiae representation. Their experimental results suggested that the performance of biometric matcher described by Jain et al. [13] is not as good as those reported in current authentication systems by Maio et al. [14]. The biometric matcher is used on the authentication side, to match the user‘s biometric characteristics with those of the biometric templates that are stored in database to identify user longevity. The techniques proposed by Dodis et al. in [15], apply not just too biometric information but it can be adopted for any keying material that unlike traditional cryptographic keys, cannot be reproduced precisely, and not distributed uniformly. The fuzzy extractor employed in this approach extracts nearly uniform randomness R from its biometric input. The randomness R obtained will be the same even if there is change in the input, until there remains reasonable close relationship with the original, hence this extraction is said to be error-tolerant. This R can be utilized as cryptographic key for any kind of application. This approach also provides an optimal construction of primitives for various measures of closeness of input data, such as Hamming distance, Edit distance, and Set difference.
The approach put forth by Teoh et al. in [16] involves adding user specific external randomness to biometric features. This increases the entropy of biometric features resulting in low False Accept Rate. At the same time, if the user compromises on their random information then the entropy gain decreases. Their previous work describes the integration of external randomness with user-specific biometrics, resulting in bitstring outputs with security characteristics; which is comparable to cryptographic ciphers or hashes. The technique of BioHashing introduced in their work, furthermore increases recognition effectiveness through Random Multispace Quantization (RMQ) of biometrics and external random inputs. The key generation algorithm however, suffers from many limitations such as requiring pre-aligned representations, having a limited choice of flexible operating points, and hence the implementation results in higher complexity in overall system, and requires more intensive computation


III. BIOCRYPTOSYSTEM
The biometric characteristics that have been widely used in various applications are human face, iris, retina, hand geometry, signature, voice etc [17]. Each biometric characteristic have its merits and demerits, and the choice of implementation is based on the type of application. No single biometric is expected to meet all the essential requirements. Some important requirements of biometrics are acceptability, performance, and accuracy. The properties of biometric characteristics and the requirements of applications determine the match between the specific biometric and an application.
The Biometric Key Cryptography (BKC) is an emerging reliable alternative that can resolve key management problem, larger key computational process and address the non-repudiation problem. The major properties of biometric identifiers are universality, distinctiveness, permanence, and collectability. Similarly, attributes of biometric systems are acceptability, performance and circumvention [18]. Use of many biometric characteristics such as retina, odor, ear, and DNA in commercial authentication systems are also being examined [17]. Depending on the operational situation, different biometric characteristics are used for different Digital Rights Management (DRM) applications. A brief comparison of some of the biometric identifiers based on seven factors is summarized in the Table 2.
The BioCryptosystems utilizes the merits of biometrics and the cryptographic framework. This approach enhances user authenticity. Therefore experiments are conducted in this area to determine the efficiency of the algorithms implemented to measure the accuracy and privacy of the user information. Moreover, biocryptosystem analyzes various properties and attributes of biometric identifier in determining the efficiency of the proposed algorithms.
Fuzzy vault [10] is a cryptographic framework designed using biometric features that defined as unordered set of genuine points and chaff points. One of the major of fuzzy vault is dealing the intra class variations in the biometric data and working with unordered sets. Hardening of fuzzy vault using biometrics enhances the security and the privacy of the user. Fuzzy vault hardened with biometrics utilizes the advantages of both cryptographic frame work and the biometric template. The randomness in the biometric data can be eliminated. Moreover, this fuzzy vault scheme provides improves user authentication.
Global Journal of Computer Science and Technology Vol. 10 Issue 2 (Ver 1.0), April 2010 P a g e | 15
TABLE 2 Comparison of Various Biometric Identifiers based on Properties and Attributes of Biometric Identifiers. High, Medium and Low are represented by H, M and L respectively
Biometric Identifier
Universality
Uniqueness
Permanence
Collectability
Performance
Acceptability
Circumvention
Face
The Biocryptosystem is created by binding the cryptographic key generation algorithm along with biometric features to enhance the security and privacy of user. This approach cannot be broken by an imposter as the security level of this approach is upgraded by password and biometric features of the user. The compromising of user password anyhow will not affect the performance of fuzzy vault scheme, since the security provided by fuzzy vault will be the same and therefore the addition of password just acts as an additional layer of security.
IV. FUTURE WORK
The necessary of implementation of BioCryptosystems for real world applications increases day by day. Therefore, the security and privacy of user is the major concern. In future one of the following approaches may be adopted to authenticate user. Many cryptographic techniques are available to ensure user authentication. Use of crypto biometrics which is a blend of cryptography and soft biometrics ensures security. The soft biometrics used may be behavioral characteristics of user which cannot be provoked by attackers. Biomapping is another approach which can be employed to increase the user authentication. Biomapping is a blend of feature extraction, non-invertible transform and anonymous query as a whole. Iris biometrics can be combined with custom cryptographic schemes to obtain an efficient BioCryptosystems. Such BioCryptosystems prove to show development especially in the field of generating longer cryptographic key strings while keeping the system quality. Another interesting approach can be given by combining Biometrics, cryptography and data hiding. This combination may provide an effective and often complementary solution to
information security from different perspectives. Moreover, this approach of combining biometrics, cryptography and data hiding mainly focus on the problems of cryptographic key management and biometric template protection. Future enhancement concentrates on developing an economical and advanced BioCryptosystem that improves the network security and user authentication.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: methods for image authentication a survey, biocryptosystems for authentication and network securitya survey, certification for authentication in network security ppt, securitya, ratha, saminar for biocryptosystem, ratha yarra bampar,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Authentication Schemes for Session Passwords using Color and Images full report seminar details 1 2,852 29-07-2015, 02:27 PM
Last Post: Guest
  Wireless LAN Security FULL REPORT seminar details 3 5,141 06-11-2014, 09:23 PM
Last Post: seminar report asees
  virtual network computing seminar addict 1 1,373 12-12-2012, 02:07 PM
Last Post: seminar details
  GSM Based Home Security System details seminar paper 1 1,975 14-11-2012, 12:29 PM
Last Post: seminar details
  DC Network Theorems seminar details 1 1,319 12-11-2012, 04:20 PM
Last Post: seminar details
  Network Theorems seminar addict 1 1,671 12-11-2012, 04:19 PM
Last Post: seminar details
  EE-201 NETWORK ANALYSIS AND SYNTHESIS seminar paper 1 1,686 09-11-2012, 12:02 PM
Last Post: seminar details
  Types and Functions of Jigs and Fixtures project uploader 1 3,236 27-10-2012, 04:11 PM
Last Post: seminar details
  DESIGN AND IMPLEMENTATION OF LASER BASED HOME SECURITY SYSTEM seminar addict 1 2,378 22-10-2012, 02:29 PM
Last Post: seminar details
  Image Steganography Schemes For Image Authentication And Verification seminar details 1 2,793 15-10-2012, 03:25 PM
Last Post: seminar details

Forum Jump: