Security evaluation of biometric keys

被引:16
作者
Al-Assam, Hisham [1 ]
Jassim, Sabah [1 ]
机构
[1] Univ Buckingham, Dept Appl Comp, Buckingham MK18 1EG, England
关键词
Biometric cryptosystems; Biometric keys; Biometric entropy; Security evaluation; Effective entropy; Face-based keys;
D O I
10.1016/j.cose.2012.01.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Biometric cryptosystems combine biometrics with cryptography by producing Biometric Cryptographic Keys (BCKs) to provide stronger security mechanisms while protecting against identity theft. The process of generating/binding biometric keys consists of a number of steps starting with a feature extraction procedure, the complexity of which depends on the specific biometric trait/scheme, followed often by user selected transformation to allow for revocability, and an error correction scheme to tolerate reasonable amount of intra-class variation. Each of these steps has its own effect on the security of the generated/bound key. Proper security evaluation must include thorough analysis of the security effect of each of these steps. We propose a comprehensive approach to BCK's security evaluation that takes into consideration each of the steps involved in their construction. We first review existing BCKs and highlight that the analysis of their security is either insufficient or not provided. In addition to evaluating the correctness (i.e. error rates), and the generated/bound key size, we evaluate the randomness of biometric features employed in the process of key generation. Our proposal combines the Kullback-Leibler divergence and the discrimination entropy to formulate a new measure of the Entropy of Biometric Features (EBF), defined as the average number of bits that distinguishes a user from a given population. Then we rigorously evaluate the impact of using error correcting scheme on the security of BCKs to calculate the Effective Entropy of Biometric Features (EEBF). Finally, inherent individual differences of the EBFs will be discussed. Here, we focus on face-based BCKs, but this does not restrict the use of the proposed evaluation. This paper argues that current face-based BCKs are not secure enough for high level security applications, and demonstrates that the average EEBF of BCKs using PCA-based facial features is less than 20-bit even when applying a user-based randomization on biometric features. (c) 2012 Elsevier Ltd. All rights reserved.
引用
收藏
页码:151 / 163
页数:13
相关论文
共 28 条
[1]  
Adler A, 2005, LECT NOTES COMPUT SC, V3546, P1100
[2]  
Al-Assam H., 2011, INT J INFORM SECURIT, V1/2, P11
[3]  
Al-Assam H, 2010, MM&SEC 2010: 2010 ACM SIGMM MULTIMEDIA AND SECURITY WORKSHOP, PROCEEDINGS, P81
[4]  
[Anonymous], 2006, Elements of Information Theory
[5]  
[Anonymous], P SPIE
[6]  
Ballard L, 2007, TRJHUSPARBKMR090707
[7]  
Chen B., 2007, 9th Biennial Conference of the Australian Pattern Recognition Society on Digital Image Computing Techniques and Applications, P394, DOI DOI 10.1109/DICTA.2007.4426824
[8]  
Daugman J, 2003, PATTERN RECOGN, V36, P279, DOI 10.1016/S0031-3203(02)00030-4
[9]   From few to many: Illumination cone models for face recognition under variable lighting and pose [J].
Georghiades, AS ;
Belhumeur, PN ;
Kriegman, DJ .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2001, 23 (06) :643-660
[10]   Entropy analysis and new constructions of biometric key generation systems [J].
Golic, Jovan Dj. ;
Baltatu, Madalina .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (05) :2026-2040