Techniques for Privacy Preservation
Journal Title: GRD Journal for Engineering - Year 2016, Vol 2, Issue 1
Abstract
A form of biometrics, also called Biometric Encryption or BioCryptics, in which the proves is protected against the misuse of template data by a dishonest verifier. Biometric identification requires that a verifier searches for matches in a data base that contains data about the entire population. This introduces the security and privacy threat that the verifier who steals biometric templates from some (or even all) persons in the data base can perform impersonation attacks. When a private verification system is used on a large scale, the reference data base has to be made available to many different verifiers, who, in general, cannot be trusted. Information stolen from a data base can be misused to construct artificial biometrics to impersonate people. Creation of artificial biometrics is possible even if only part of the template is available. To develop an insight in the security aspects of biometrics, one can distinguish between verification and private verification. In a typical verification situation, access to the reference template allows a malicious verifier to artificially construct measurement data that will pass the verification test, even if the prover has never exposed herself to a biometric measurement after the enrollment. In private verification, the reference data should not leak relevant information to allow the verifier to (effectively) construct valid measurement data. Such protection is common practice for storage of computer passwords. When a computer verifies a password, it does not compare the password typed by the user with a stored reference copy. Instead, the password is processed by a cryptographic one-way function F and the outcome is compared against a locally stored reference string F(y ). So y is only temporarily available on the system hardware, and no stored data allows calculation of y. This prevents attacks from the inside by stealing unencrypted or decrypt able secrets. Biometric verification is defined as the verification of a individual based on the physical, chemical or behavioural attributes of the person. To protect the biometric data containing privacy information, a number of privacy-preserving biometric schemes (PPBSs).These PPBSs can be classified into Biometric encryption based schemes, Cancel able biometric based schemes, Multi-modal and hybrid based schemes, secure computation (SC) based schemes. There is a comparative study of PPBS and select the best one .On the bases of comparisons select the best PPBS is Biometric encryption based schemes.
Authors and Affiliations
Aswini Prasad
An Efficient Extreme Learning Machine Based Intrusion Detection System
This paper presents an intrusion detection technique based on online sequential extreme learning machine. For performance evaluation, KDDCUP99 dataset is used. In this paper, we use three feature selection techniques – f...
Fatigue Analysis of Bearing
The development of the technology of rolling bearings has as one of its objectives constitute a set of mechanical components that combine mechanical strength and stiffness, designed to support the loads, speeds and life...
Security and Privacy Enhancing in Multi-Cloud Architecture with Data De-duplication
Cloud computing makes IT more efficient and cost effective in today’s world. Cloud computing act as a virtual server that the user can access via internet on a needed basis and this eliminates the need for the companies...
Robotic Bird
Now-a-days robots have taken its remarkable position in the development of a nation. Robot has changed the structure of society and made available different devices for safer and comfortable condition. Various robots are...
Blind Zone Alert System using ZigBee based Wireless Sensor Network
The main purpose of this project is to detect and monitor objects within a predetermined distance from the vehicle that may be approaching its blind-spot. Moreover, the invention is particularly designed to be used for a...