• Keine Ergebnisse gefunden

A two-factor protection scheme for MCC fingerprint templates

N/A
N/A
Protected

Academic year: 2022

Aktie "A two-factor protection scheme for MCC fingerprint templates"

Copied!
8
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)

A Two-Factor Protection Scheme for MCC Fingerprint Templates

Matteo Ferrara, Davide Maltoni, and Raffaele Cappelli

Department of Computer Science and Engineering Universityof Bologna

Via Sacchi, 3 - 47521 Cesena (FC), Italy

{matteo.ferrara, davide.maltoni, raffaele.cappelli}@unibo.it

1 Introd u ct i on

Among the three basic approaches touser authentication (knowledge factors, possession factors, biometrics), onlybiometric systems can guarantee theidentity of the user: the other two factors can simplyconfirmthat theuserknowsa giveninformation or that the userownsa given device or token. On the otherhand, the properties thatmake biometric traits sointeresting for automateduser authentication (uniqueness and permanence), also raise potentialprivacyproblems: forinstance, a biometric samplemaybe used tolink activities of the sameuser across different applications, or some biometric featuresmay allow medicalor other sensitive data to be revealed [RU11]. Moreover, a biometric trait, if compromised cannot be revoked and renewed: thisisin contrastwithpasswords and tokens that can be easily reissued. For these reasons it is very important to protect biometric templates,making them unusablewithout authorization, butwithoutlosing the capabilitytoverifytheuser’s identity [Si12]. It is desirable that aBiometric Template Protection (BTP) method satisfies the following requirements [Br09]: accuracy, irreversibility,diversityandunlinkability.

Since fingerprints are the most largely used biometric trait, developing effective fingerprint BTP methods is a crucial challenge and the research isvery active on this topic [RU11].

This paper introduces a novel fingerprint template protection scheme, evaluates its accuracyand securityaccording to well-defined criteria [Si12], and testsits robustness againstvarious types of attack. The proposed schemeis based on a combination of auser secret key and a non-invertibleminutiae representation (P-MCC [FMC12]): these two factors allow the BTP requirements to be met. In particular, as confirmed by the extensive experimentation performed on sixpublic databases, the new methodmarkedly outperformsmost of the state-of-the-art techniques andis robust against different attack

Abstract: Minutia Cylinder-Code (MCC) is an effective representation for robust and fast fingerprint matching. To avoid that MCC templates can disclose sensitive information about position and angle of minutiae, a protected MCC representation was recently introduced (called P-MCC).

Inspite of a satisfactory level of accuracy and irreversibility, P-MCC templates cannot be revoked. In this paper we propose a two factor protection scheme that makes P-MCC templates revocable.

(2)

scenarìos. Œãease refer to [¦u©ÖÓ] for an e¯tended report contaìnìng àore detaìãs aboýt ìÇ tïe state»of»tïe»art of fìngerprìnt teàpãate protectìon scïeàes (ìn partìcýãar focýsìng on t÷o»factor approacïesÇ, ììÇ Œ»u©© representatìon and ìììÇ e¯perìàent eúaãýatìon.

Tïe rest of tïìs paper ìs organì©ed as foãão÷s. ‰ectìon Õ descrìbes tïe noúeãt÷o»factor protectìon scïeàe. ‰ectìon Ô reports e¯perìàents on pýbãìc databases to eúaãýate accýrac¬and secýrìt¬of tïe ne÷approacï, to coàpareìt agaìnst tïe state»of»tïe»art, and to testìts robýstness agaìnst potentìaãattacæs. ¦ìnaãã¬, ‰ectìon Ó dra÷s soàe concãýdìng reàaræs.

Õ T÷o»factor protectìon scïeàe (Ռ»u©©Ç

As dìscýssedìn [¦u©ÖÕ], Œ»u©© representatìon gýaranteesìrreúersìbìãìt¬and accýrac¬

být not dìúersìt¬ and ýnãìnæabìãìt¬ [‰ìÖÕ]. In soàe preãìàìnar¬ stýdìes a randoà proéectìon transforà [TY0Ð] ÷as coàbìned to tïe Œ»u©© representatìon to fýãfìãã dìúersìt¬andýnãìnæabìãìt¬reqýìreàents› aãtïoýgïsýcïsoãýtìon sïo÷ed good resýãtsìn teràs of recognìtìon accýrac¬,ìt÷as not robýst enoýgïagaìnst toæen»stoãen attacæs. Tïe t÷o»factoràetïod proposedìn tïìs÷oræ(caããed Ռ»u©©Çìs sìàpãe být proúed to aãão÷

a good trade»off bet÷een accýrac¬and secýrìt¬› tïe basìcìdeaìs to seãect a sýbset of tïe orìgìnaãbìts and scraàbãìng tïeàaccordìng to a secretæe¬, as descrìbedìn detaìã ìn tïe foãão÷ìng sectìons.

Õ.Ö ¦roà Œ»u©© to Ռ»u©©

wet ̂ be a Œ»u©©±teàpãate (÷ïere denotes tïe aàoýnt of dìàensìonaãìt¬redýctìon, see [¦u©ÖÕ]Ç andãet be aýser»specìfìc secretæe¬. Tïen, for a gìúen , , ãet Y V Y V be a partìaã peràýtatìon […ìÖÓ] of set , randoà㬠generated ýsìng as seed for a cr¬ptograpïìcaã㬠secýre pseýdorandoà nýàber generator. Tïe fýnctìon Y V àaps a »dìàensìonaã bìt»úector ̂ ìnto a »dìàensìonaã bìnar¬ space, accordìng to tïe partìaã peràýtatìon obtaìned froà tïe secret æe¬ ›

Y VY ̂ V [ ̂ [ ] ̂ [ ] ̂ [ ]] Y V (ÖÇ Tïe Ռ»u©© teàpãate ̈ìs a set of bìt»úectors defìned as›

̈ { ̈ ̈ Y VY ̂ V ̂ ̂} (ÕÇ

Õ.Õ ‰ìàìãarìt¬ coàpýtatìon

Tïe transforàatìon proposed to conúert Œ»u©© teàpãatesìnto Ռ»u©© teàpãates does not aãter tïe sìàìãarìt¬ àetrìc bet÷een bìtúectors. As descrìbedìn [¦u©ÖÕ] for Œ»u©©, ãet ̈ and ̈ be tïe Ռ»u©© bìt»úectors™ tïeìr sìàìãarìt¬can be coàpýted as›

Y ̈ ̈ V ‖ ̈ ̈ ‖

(ÔÇ

÷ïere XR denotes tïe Ú³¼¶³¾×1הٰº¾³¸×1ÃÀ bet÷een t÷o bìt»úectors, ‖ ‖ represents tïe Ö»norà, and tïe ãengtï of tïe bìt»úectors. Žote tïat tïe Ö»norà of a bìt»úector can be sìàp㬠coàpýted as tïe popýãatìon coýnt (nýàber of bìts ÷ìtï úaãýe oneÇ. Tïe

(3)

sìàìãarìt¬ Y ̈ ̈ Vìs aã÷a¬s ìn tïe range [0,Ö], ÷ïere©eroàeans no sìàìãarìt¬and one àa¯ìàýàsìàìãarìt¬.

In order to coàpare t÷o protected teàpãates and , a sìngãeúaãýe denotìng tïeìr oúeraããsìàìãarìt¬ ïas to be obtaìned froàtïe t÷o sets of bìt»úectors. To tïìs pýrpose, tïe êÃÙÛ° GÀ××ؓ 󳯳°ÛÀ³¼“(wG‰Ç approacï, orìgìnaãã¬proposedìn [©aÖ0], can beýsed to caãcýãate tïe gãobaã àatcïscore as descrìbedìn [¦u©ÖÕ]. Žote tïat, tïìs approacïdoes not assýàe an¬a prìorìorderìng of tïe bìt»úectors› tïìs aãão÷s to randoàã¬sïýffãe tïeà ìnsìde eacïՌ»u©© teàpãate, toìncrease tïe robýstness agaìnstúarìoýs t¬pes of attacæs (e.g., correãatìon attacæs [KY0Ÿ]Ç.

Ô §¯perìàentatìon

Tïìs sectìon descrìbes seúeraãe¯perìàents carrìed oýt to eúaãýate tïe proposedàetïod and to coàpareìt÷ìtïtïe state»of»tïe»art.

Ô.Ö uìnýtìae e¯tractìon and creatìon of Ռ»u©© descrìptors

A state»of»tïe»art àìnýtìae e¯tractìon aãgorìtïà (aãread¬ ýsed ìn [¦u©ÖÕ]Ç ïas been eàpão¬ed to e¯tractàìnýtìae teàpãates froàaããfìngerprìntsìn aããdata sets.

Ռ»u©© descrìptors ïaúe been derìúed froà tïe àìnýtìae teàpãates as descrìbed ìn

‰ectìon Õ. To stýd¬ tïe trade»off bet÷een accýrac¬ and secýrìt¬, foýr dìfferent coàbìnatìons of paraàeters Y V ïaúe been ýsed› Y V, Y V, Y V and Y V.

Ô.Õ Verìfìcatìon accýrac¬

¦or a fýããcoàparìson ÷ìtï tïe state»of»tïe»art, tïe eúaãýatìon of bìoàetrìcúerìfìcatìon accýrac¬ ïas been carrìed oýt on ¦V©Õ00Õ [ua0Õ], ¦V©Õ00Ó [ua0Ó], and ¦V©Õ00Ñ [©a0Ð] datasets (see Tabãe I ìn [¦u©ÖÓ]Ç ýsìng tïe FðC ÂÀüÃÙð [¦u©ÖÓ]. Tïe foãão÷ìng perforàance ìndìcators are consìdered› Eqýaã»Error»Rate (EERÇ, ão÷est FNMR for FMR≤0.1% (FMRÖ000Ç, and ão÷est ¦ŽuR for ¦uR•0% (Z¦uRÇ. To aúoìd ýnfaìr coàparìson ÷ìtï sìngãe»factor tecïnìqýes, tïe accýrac¬ ìn tïe ¼Ã±×Ä1¾¼Ã°×Ä

¾Ù×ÄÛÀ³Ã[YaÖ0]ìs aãso reported. To sìàýãate tïìs scenarìo, aãã tïe protected teàpãates are generatedýsìng tïe saàe secretæe¬ .

Tabães I coàpares tïe accýrac¬ of tïe proposed protectìon scïeàe agaìnst otïer t÷o»

factor approacïes. Itìs÷ortïnotìng tïat›

 Ռ»u©©ÑÓ,ÑÓ ìs àore accýrate tïan àost of tïe e¯ìstìng approacïes, e¯cept for [u¨ÖÔ]™

 as e¯pected, decreasìng andØor redýces tïe accýrac¬.

Tabães II coàpares tïe accýrac¬of tïe proposed protectìon scïeàe agaìnst otïer t÷o»

factor approacïes, ýnder toæen»stoãen scenarìo. nã¬t÷o»factor approacïes for ÷ïìcï aýtïors proúìde resýãtsýnder tïe toæen»stoãen scenarìo are ïere consìdered. Itìs÷ortï notìng tïat›

 Ռ»u©©ÑÓ,ÑÓ oúercoàes aãã e¯ìstìng approacïes, být one case (EER on ¦V©Õ00Õ

¨ªÖìn Tabãe IIǙ

 Ռ»u©©ÑÓ,ӟand Ռ»u©©ÔÕ,ÔÕare oftenàore accýrate tïan e¯ìstìng approacïes™

 Ռ»u©©ÔÕ,ÕÓìn soàe cases oýtperforàs otïer approacïes.

(4)

TAªwE I

VERI¦I©ATIŽA©©‡RA©YER©EŽTAGEVAw‡E‰Ç.

¦V©Õ00Õ ¦V©Õ00Ó ¦V©Õ00Ñ

¨ªÖ ¨ªÕ ¨ªÔ ¨ªÓ ¨ªÖ ¨ªÕ

EER ¦uRÖ000 Z¦uR EER ¦uRÖ000 Z¦uR EER ¦uRÖ000 Z¦uR EER ¦uRÖ000 Z¦uR EER ¦uRÖ000 Z¦uR EER ¦uRÖ000 Z¦uR

Ռ»u©©ÑÓ,ÑÓ Õ.0 Ô.Ö Ó.Ô Ö.Ö Ö.Ô Ö.Ó Ó.Ó Ÿ.Ó ÖÖ.Ÿ Ô.Ö Ò.0 Ñ.Ñ Ô.0 Ñ.Ÿ .Ö 0.Ö 0.Ö 0.Õ ÕŒ»u©©ÑÓ,ӟ Õ. Ñ.Ó Ð.Õ Ö.Ð Õ.Ð Ó.Õ Ñ.Ð ÖÓ.Ó ÖÑ.Ñ Ó.Õ Ð.Ó ÖÖ.Õ Ó. ÖÔ.Ö ÕÓ.Ñ 0.Õ 0.Ô 0.Ó ÕŒ»u©©ÔÕ,ÔÕ Ó.Ò Ð.Ó Ö0.Ÿ Õ.Ð Ó.Ð Ñ.Ÿ Ð.Ÿ ֟.Ó Õ0.0 Ò.Ö ÖÔ.Ñ ÖÒ.Õ Ñ.Ö ÖÑ.Ò Ö.Ð 0.Ô 0.Ñ 0.

Ռ»u©©ÔÕ,ÕÓ Ñ.Ÿ ÖÓ.0 ÖÓ. Ó.Ó ÖÖ.Ö ÖÔ.Õ ÖÖ.Õ ÕŸ.0 Ô0. Ð.Ÿ ÕÖ.Ñ ÕÑ.Ô Ÿ.Ÿ Ô0.Ÿ Ó0.Ö 0. Õ.Ò Ó.

[ª‰…0Ð] Õ.Ö » » Ö.Õ » » » » » » » » Ÿ.Ñ » » » » »

[u¨ÖÔ] 0.Ð » » 0.Ó » » Ô.Ÿ » » Ö.Ó » » Ö. » » » » »

TAªwE II

VERI¦I©ATIŽA©©‡RA©Y IŽ TETKEŽ»‰TwEŽ‰©EŽARIER©EŽTAGEVAw‡E‰Ç.

¦V©Õ00Õ ¦V©Õ00Ó ¦V©Õ00Ñ

¨ªÖ ¨ªÕ ¨ªÔ ¨ªÓ ¨ªÖ ¨ªÕ

EER ¦uRÖ000 Z¦uR EER ¦uRÖ000 Z¦uR EER ¦uRÖ000 Z¦uR EER ¦uRÖ000 Z¦uR EER ¦uRÖ000 Z¦uR EER ¦uRÖ000 Z¦uR

Ռ»u©©ÑÓ,ÑÓ Ô.Ô Ñ.Ò Ÿ.Ö Ö.Ÿ Ô.Ò Ò.Ò Ð.Ÿ ֟.Õ Õ0.Ð Ñ.Ñ ÖŸ.Ò ÕÖ.Õ Ñ.Ô ÖŸ.Ô ÕÕ.Õ 0.Ô 0.Ò Ö.Ö ÕŒ»u©©ÑÓ,ӟ Ó.Ñ Ÿ.Ñ .Ö Õ.Ò Ò.Ñ Ñ.Ö . ÕÖ. ÕÐ.Ó Ð.Ÿ ֝.Ô ÕŸ.Ô Ÿ.Ó ÕÕ.Ö ÕÔ.Ñ 0.Ñ Ö.Õ Õ.Õ ÕŒ»u©©ÔÕ,ÔÕ Ñ.Ñ ÖÓ.Ÿ ֝.Ò Ó.Ô ÖÖ.Ò ÖÑ.Ó ÖÕ.Õ Õ.Ñ ÔÓ.Ò ÖÖ.Õ ÔÔ.Ò ÔÐ.Ö .Ò Õ.Ó ÔÖ.0 Ö.0 Õ.Ô Ô.Ò ÕŒ»u©©ÔÕ,ÕÓ Ÿ.Ñ ÕÔ.Ÿ ՝. Ñ.Ÿ ÖÑ. ֝. ÖÒ.Ð ÔÐ.Ô Ò0.Ö ÖÕ.Ò Ô. ÓÒ.Ô ÖÖ.Ò ÔŸ.Ö ÓŸ.Ÿ Ö. Ó. .Ô

[Tý0Ð] Ô.0 » » » » » » » » » » » » » » » » »

[Aï0Ÿ] Ð.Õ » » Ô.Ñ » » ÖÖ.Ÿ » » ÖÖ.Ò » » » » » » » »

[KTGÖ0] » » » Ò.0 » » » » » » » » » » » » » »

[wìÖ0] » ÕÔ.Ð ÔÖ.Õ » ÖÒ.Ð ÕÐ.Ð » » » » » » » » » » » »

Ô.Ô ‰ecýrìt¬ anaã¬sìs

In tïe foãão÷ìng paragrapïs, specìfìc e¯perìàents are reported to eúaãýateïo÷Ռ»u©©

ìàproúes Œ»u©© ìrreúersìbìãìt¬ and proúìdes ýnãìnæabìãìt¬, ÷ïìcï are tïe t÷o fýndaàentaãsecýrìt¬reqýìreàents for an¬ªTŒàetïod [‰ìÖÕ] [ªr0].

íÀÀ׸×À¾³Ú³°³¼“

To àeet tïe ìrreúersìbìãìt¬ reqýìreàent, tïe protected teàpãate sïoýãd not aãão÷ tïe orìgìnaã àìnýtìae teàpãate to be retrìeúed. Tïeìrreúersìbìãìt¬of Ռ»u©© descrìptorsìs based on tïree eãeàents› ìÇ tïe ìrreúersìbìãìt¬ of tïe Œ»u©© representatìon, aãread¬

÷ìde㬠dìscýssed ìn [¦u©ÖÕ], ììÇ tïe secrec¬ of tïe ýser»specìfìc æe¬, and ìììÇ tïe ìnforàatìonãoss dýe to tïe redýctìon of tïe bìt»úectorãengtï ÷ïen .

If a Ռ»u©© teàpãateìs stoãen b¬an attacæer, and tïe attacæer does notæno÷tïeýser»

specìfìcæe¬ , reúersìng tïe protect teàpãateìs practìcaã㬠ýnfeasìbãe, sìnce tïe attacæer ïas no cãýe aboýt tïe partìaãperàýtatìon Y Výsed to createìt. In fact, tïe nýàber of » peràýtatìons of obéectsìs eqýaãto Y V […ìÖÓ],÷ïìcï corresponds to

possìbìãìtìes for Ռ»u©©ÔÕ,ÕÓ, and to possìbìãìtìes for Ռ»u©©ÑÓ,ÑÓ. If tïe ýser»specìfìc secretæe¬ ïas been stoãen as÷eãã, tïe partìaãperàýtatìon Y V, ýsed to create tïe stoãen teàpãate ̈, can be derìúed. Tïen,ýsìng Y V,ìtìs possìbãe to

(5)

recoúer a Œ»u©© teàpãate ̃ froà ̈. Žote tïat ìf , tïen ̃ ̂, ÷ïere ̂ ìs tïe orìgìnaã teàpãate froà ÷ïìcï tïe Ռ»u©© teàpãate ÷as generated. tïer÷ìse, ÷ïen , tïe bìt»úectors ̃ ̃can be onã¬partìaãã¬recoúered (ì.e., bìtsìn ̃ are sìnce tïeìr correspondìngúaãýes÷ere not storedìn ̈ dýrìng tïe protectìon stepÇ.

In concãýsìon, tïe foãão÷ìng obserúatìons can be dra÷n›

 In tïe÷orst scenarìo,÷ïen botïprotected teàpãate and secretæe¬ ïaúe been stoãen and , tïeìrreúersìbìãìt¬ ãeúeã ìs tïe saàe of Œ»u©©› ïence ìt ìs stìãã qýìte ïard to retrìeúe soàe ìnforàatìon aboýt tïe orìgìnaã àìnýtìae. As an e¯aàpãe, for , a sopïìstìcated attacæ strateg¬ ìs abãe to reconstrýct ÕÑ.Ò% of tïe orìgìnaã àìnýtìae, být on tïe otïer ïand, ìt ìs ýnabãe to reconstrýct ÐÔ.Ò% of tïe àìnýtìae and creates ѝ.Ò%faãseàìnýtìae[¦u©ÖÕ].

 If tïe attacæer stoãe tïe protected teàpãate být does not æno÷ tïe æe¬, tïe ìrreúersìbìãìt¬ ãeúeã ìs àýcï ïìgïer, sìnce tïe attacæer ÷oýãd ïaúe to fìnd tïe rìgït partìaã peràýtatìon before tr¬ìng to reconstrýct tïe àìnýtìae teàpãate froà tïe Œ»

u©© representatìon as dìscýssed aboúe. ¦or ìnstance, for Ռ»u©©ÑÓ,ÑÓtïere are possìbãe peràýtatìons, ÷ïìcï àaæes a brýte»force attacæ ýnfeasìbãe.

 ¦ìnaãã¬, ÷ïen , Ռ»u©© offers a fýrtïer protectìon sìnce a portìon of tïe Œ»

u©© ìnforàatìon ìs not stored ìn tïe teàpãate.

ñÄ°³Ä±ÛÚ³°³¼“

To àeet tïe ýnãìnæabìãìt¬ reqýìreàent, protected teàpãates generated froà tïe saàe bìoàetrìc traìt ýsìng dìfferent secret æe¬s sïoýãd be as dìfferent as protected teàpãates generated froà dìfferent bìoàetrìc traìts. To cïecæ tïìs reqýìreàent, tïe foãão÷ìng score dìstrìbýtìons are ana㬩ed›

óÛ¯× óۯ°כ àatcï scores aàong teàpãates generated froà tïe saàe fìngerprìnt saàpãeýsìng dìfferentæe¬s™

óÛ¯× F³ÄÕ×À›àatcïscores aàong teàpãates generated froàdìfferentìàpressìons of tïe saàe fìngerýsìng dìfferentæe¬s™

D³ÖÖ×À×ļ F³ÄÕ×À› àatcïscores aàong teàpãates generated froàtïe fìrst saàpãe of dìfferent fìngerprìntsýsìng dìfferentæe¬s.

¦ìgýre Ö sïo÷s tïe aboúe score dìstrìbýtìons coàpýted on ¦V©Õ00Ñ ¨ªÕ dataset for dìfferentúaãýes of and . It can be noted tïat tïe tïree cýrúes are aãàost oúerãappedìn aããgrapïs› tïìsàeans tïat tïe dìssìàìãarìt¬bet÷een protected teàpãates generated froà tïe saàe saàpãeØfìnger ìs coàparabãe to tïat of protected teàpãates generated froà dìfferent fìngers.

Ô.Ó Robýstness agaìnst attacæs

Tïìs sectìon descrìbes e¯perìàents aìàed at assessìng tïe robýstness of Ռ»u©©

agaìnst t÷o dìfferent attacæs› tïe foràer based on reúoæed teàpãates, and tïeãatter on coàproàìsed secýrìt¬ æe¬s.

ô׸ñ×Ø ¼×¯Â°Û¼× Û¼¼ÛÙ±

As dìscýssedìn tïe preúìoýs sectìons, Ռ»u©© proúìdes dìúersìt¬andýnãìnæabìãìt¬, tïýs aãão÷ìng teàpãates to be reúoæed and rene÷ed. ‰¬steàatìc e¯perìàents ïaúe been

(6)

perforàed to eúaãýate ìf ìt ìs possìbãe to ýse reúoæed teàpãates to attacæ a s¬steà based on Ռ»u©©. In partìcýãar, t÷o attacæ scenarìos ïaúe been consìdered›

 T¬pe»I attacæ, ÷ïere a reúoæed teàpãate ìs ýsed to attacæ a s¬steà contaìnìng a rene÷ed teàpãate created froà tïe saàe ìàpressìon™

 T¬pe»II attacæ, ÷ïere a reúoæed teàpãate ìs ýsed to attacæ a s¬steà contaìnìng a rene÷ed teàpãate created froà anotïer ìàpressìon of tïe saàe fìnger.

ªotï attacæ scenarìos ïaúe been eúaãýated ýnder t÷o dìfferent secýrìt¬ ãeúeãs› àedìýà»

secýrìt¬ (àatcïìng tïresïoãd set to 0.Ö% ¦uRÇ, and ïìgï»secýrìt¬ (àatcïìng»tïresïoãd set to 0% ¦uRÇ [¦u©ÖÕ]. Tïe attacæ sìàýãatìons ïaúe been perforàed on tïe

¦V©Õ00Ñ ¨ªÕ dataset, prodýcìng Öџ0 and ÕÓ0 t¬pe»I and t¬pe»II attacæs, respectìúeã¬. Tabãe III reports tïe percentage of sýccessfýã attacæsýnder botï secýrìt¬

ãeúeãs.

¦ìgýre ֛ ‰core dìstrìbýtìon grapïs for tïe proposed protectìonàetïod to eúaãýateýnãìnæabìãìt¬

reqýìreàent on ¦V©Õ00Ñ ¨ªÕ dataset› (aÇY V, (bÇY V, (cÇY Vand (dÇY V.

TAªwE III

ŒER©EŽTAGE ¦‰‡©©E‰‰¦‡wATTA©K‰(‡‰IŽG AREVKE¨ÕŒ»u©© TEuŒwATEǍŽ¦V©Õ00Ñ ¨ªÕAT

uE¨I‡u»AŽ¨IG»‰E©‡RITYwEVEw.

uetïod uedìýà»secýrìt¬ ìgï»secýrìt¬

T¬pe»} «ttacæ T¬pe»}} «ttacæ T¬pe»} «ttacæ T¬pe»}} «ttacæ

Ռ»u©©ÑÓ,ÑÓ 0.ÐÖ% 0.0Õ% 0.00% 0.00%

Ռ»u©©ÑÓ,ӟ 0.ÐÐ% 0.ÖÐ% 0.ÕÓ% 0.0Ÿ%

Ռ»u©©ÔÕ,ÔÕ 0.ÑÒ% 0.ÕÖ% 0.ÕÓ% 0.0%

Ռ»u©©ÔÕ,ÕÓ 0.ÐÐ% 0.0% 0.0Ñ% 0.0Õ%

òñ×Ä1¾¼Ã°×Ä Û¼¼ÛÙ±

Tïe accýrac¬ofàan¬t÷o»factoràetïods strongã¬depends on tïe secrec¬ of tïeýser»

specìfìcæe¬s. In tïese cases, tïeæno÷ãedge of aæe¬aãão÷s to easìã¬fìnd coããìsìons (ì.e., prodýce faãse àatcïesÇ eúenìf tïe attacæer does not possess tïe bìoàetrìc saàpãe. ¦or

܊›e ܊›p}e ܊›e «³™Öer ijffere™t «³™Öer ܊›e ܊›p}e

܊›e «³™Öer ijffere™t «³™Öer

܊›e ܊›p}e ܊›e «³™Öer ijffere™t «³™Öer ܊›e ܊›p}e

܊›e «³™Öer ijffere™t «³™Öer

(aÇ (bÇ

(cÇ (dÇ

(7)

tïìs reason, as aãread¬ dìscýssed ìn ‰ectìon Ô.Õ, tïe robýstness of a t÷o»factor s¬steà àýst be aãso reported ìn tïe toæen»stoãen scenarìo.

Tïìs sectìon reports tïe resýãts of e¯perìàents aìàed at eúaãýatìng tïe robýstness of Ռ»

u©© agaìnst toæen»stoãen attacæs™ ìn partìcýãar, ìt ìs assýàed tïat tïe attacæer æno÷s tïe secret æe¬ of eacï ýser and tïe percentage of sýccessfýã attacæs ìs reported for tïe saàe t÷o secýrìt¬ ãeúeãs defìned ìn tïe preúìoýs sectìon› ìÇ àedìýà» and ììÇ ïìgï»secýrìt¬. Tïe attacæ sìàýãatìon ïas been perforàed on tïe ¦V©Õ00Ñ ¨ªÕ dataset, prodýcìngÐÔ0 attacæatteàpts. Tabãe IV reports tïe percentage of sýccessfýãattacæs› tïe robýstness of Ռ»u©© ìs confìràed, especìaã㬠at tïe ïìgï»secýrìt¬ ãeúeã.

TAªwE IV

ŒER©EŽTAGE¦‰‡©©E‰‰¦‡wATTA©K‰(‡Ž¨ER TETKEŽ»‰TwEŽ‰©EŽARIÇŽ¦V©Õ00Ñ ¨ªÕAT

uE¨I‡u»AŽ¨IG»‰E©‡RITYwEVEw.

uetïod uedìýà»secýrìt¬ ìgï»secýrìt¬

Ռ»u©©ÑÓ,ÑÓ Ó.ÑÕ% 0.ŸÑ%

Ռ»u©©ÑÓ,ӟ Ö.ÒÔ% 0.ÒÔ%

Ռ»u©©ÔÕ,ÔÕ Õ.Ò0% Ö.ÕÔ%

Ռ»u©©ÔÕ,ÕÓ Ö.ÖÓ% 0.0Ÿ%

Ó ©oncãýsìons

In tïìs paper÷e propose Ռ»u©©, a ne÷t÷o»factor teàpãate protectìon approacï tïat confers to Œ»u©© tïe desìrabãe propertìes of dìúersìt¬andýnãìnæabìãìt¬. …e eúaãýated dìfferent paraàeterì©atìons of Ռ»u©© and s¬steàatìcaãã¬coàpared tïeàagaìnst state»

of»tïe»art approacïes on seúeraã bencïàaræs and scenarìos. A tïoroýgï secýrìt¬

anaã¬sìs, ìn ãìne ÷ìtï recent gýìdeãìnes and recoààendatìons [‰ìÖÕ] [ªr0], ÷as aãso carrìed oýt. Tïe e¯perìàentaã resýãts sïo÷tïatìnàost of tïe cases Ռ»u©© perforàs better tïan e¯ìstìng tecïnìqýes andìs qýìte robýst agaìnst toæen»stoãen scenarìo,÷ïìcï ìs æno÷n to be tïeàaìn pìtfaããof t÷o»factors scïeàes.

Týrnìng a Œ»u©© teàpãate ìnto a Ռ»u©© one ìs straìgïtfor÷ard and coàpýtatìonaãã¬

ãìgït™÷ïìãeìn tïìs paper÷e proposed a sìàpãe peràýtatìon»basedàetïod,ìn prìncìpãe otïeràore sopïìstìcateïaààìng»dìstance preserúìng transforàs coýãd beýsed› tïìsìs

÷ïat÷eìntend toìnúestìgateìn oýr fýtýre researcï.

«cæno÷ãedgàent

Tïe÷oræ ãeadìng to tïese resýãtsïas receìúed fýndìng froàtïe Eýropean ©oààýnìt¬ûs

¦raàe÷oræŒrograààe (¦ŒÐØÕ00лÕ0ÖÔÇýnder grant agreeàent n°ÕŸÓŸÑÕ.

References

[Aï0Ÿ] ¨. Aïn, ‰. G. Kong, Y. ‰. ©ïýng, and K. Y. uoon,'uatcïìng÷ìtï‰ecýre ¦ìngerprìnt Teàpãatesýsìng Žon»ìnúertìbãe Transforà,'ìnÂÀÃÙE ÃÄ í¯ÛÕ× ÛÄØ ó³ÕÄÛ° öÀÃÙ×¾¾³ÄÕ, Õ00Ÿ.

[ªr0] {. ªreebaart, ª. Yang, I. ªýïan»¨ýãàan, and ©. ªýscï,'ªìoàetrìc teàpãate protectìon » Tïe need for open standards,'DÛ¼×ľٴº¼’ ºÄØ DÛ¼×ľ³Ù´×À´×³¼,úoã. ÔÔ, no. Ò, Õ00.

(8)

[ª‰…0Ð] T. E. ªoýãt, …. {. ‰cïeìrer, and R. …ood÷ortï, 'Reúocabãe ¦ìngerprìnt ªìotoæens›

Accýrac¬and ‰ecýrìt¬Anaã¬sìs,' ìn³Ä ÂÀÃÃÙ×سÄÕ¾ ÃÖ íEEE CÃÄÖ×À×ÄÙ× ÃÄ Cﺼ×À ð³¾³ÃÄ ÛÄØ öÛ¼¼×ÀÄ ô×ÙÃÕij¼³ÃÄ ;Cðöô9, Õ00Ð, pp. Ö»Ÿ.

[©a0Ð] R. ©appeããì, u. ¦errara, A. ¦ranco, and ¨. uaãtonì, '¦ìngerprìnt úerìfìcatìon coàpetìtìon Õ00Ñ,'B³Ã¯×¼À³Ù ò×Ù´ÄðÃՓ òÃØۓ, úoã. ÖÒ, no. лŸ, pp. л, Aýgýst Õ00Ð.

[©aÖ0] R. ©appeããì, u. ¦errara, ¨. uaãtonì, and u. Tìstareããì, 'u©©› a ªaseãìne Aãgorìtïà for

¦ìngerprìntVerìfìcatìonìn ¦V©»onGoìng,' ìnÂÀÃÙ××سÄÕ¾ 11¼´ íļ×ÀÄÛ¼³ÃÄÛ° CÃÄÖ×À×ÄÙ×

ÃÄ CÃļÀð3 Aº¼Ã¯Û¼³ÃÄ3 ôÃÚü³Ù¾ ÛÄØ ð³¾³ÃÄ ;íCAôCð9, ‰ìngapore, Õ0Ö0.

[¦u©ÖÕ] u. ¦errara, ¨. uaãtonì, and R. ©appeããì, 'Žonìnúertìbãe uìnýtìa ©¬ãìnder»©ode Representatìon,'íEEE òÀÛľÛÙ¼³Ãľ ÃÄ íÄÖÃÀ¯Û¼³ÃÄ FÃÀ׾³Ù¾ ÛÄØ ó×ÙºÀ³¼“,úoã. Ð, no. Ñ, pp. ÖÐÕлÖÐÔÐ, ¨eceàber Õ0ÖÕ.

[¦u©ÖÓ] u. ¦errara, ¨. uaãtonì, and R. ©appeããì,'A ‰ìàpãe and Effectìúe T÷o»¦actor Œrotectìon

‰cïeàe for u©© ¦ìngerprìnt Teàpãates,'ªìoàetrìc ‰¬steàwaborator¬» ‡nìúersìt¬of ªoãogna, TecïnìcaãReport, Õ0ÖÓ.

[KTGÖ0] G. Kýàar, ‰. Týã¬aæoú, and V. Goúìndaraéý, '©oàbìnatìon of ‰¬ààetrìc asï

¦ýnctìons for ‰ecýre ¦ìngerprìnt uatcïìng,' ìnÂÀÃÙE AC¼´ íļ×ÀÄÛ¼³ÃÄÛ° CÃÄÖ×À×ÄÙ× ÃÄ öÛ¼¼×ÀÄ ô×ÙÃÕij¼³ÃÄ, Õ0Ö0.

[KY0Ÿ] A. Kïoãàatoúand ª. Yanìæogãý, 'Reaãì©atìon of ©orreãatìon AttacæAgaìnst tïe ¦ý©©¬

Vaýãt ‰cïeàe,' ìn ÂÀÃÙ××سÄÕ¾ ÃÖ óöíE ó“¯Âþ³º¯ ÃÄ ó×ÙºÀ³¼“3 FÃÀ׾³Ù¾3 ó¼×ÕÛÄÃÕÀÛ´“3 ÛÄØ ïÛ¼×À¯ÛÀ±³ÄÕ ÃÖ éº°¼³¯×Ø³Û CÃļ×ļ¾ Ô, úoã. џ֝, ‰an {ose (‡‰AÇ, Õ00Ÿ.

[wìÖ0] Œ. wì et aã., 'An Aãìgnàent»¦ree ¦ìngerprìnt ©r¬ptos¬steà ªased on ¦ý©©¬ Vaýãt

‰cïeàe,'ìúÀÄÛ° ÃÖ ø×¼¶ÃÀ± ÛÄØ Cﺼ×À A°³ÙÛ¼³Ãľ,úoã. ÔÔ, no. Ô, ua¬Õ0Ö0.

[ua0Õ] ¨. uaìo, ¨. uaãtonì, R. ©appeããì, {.w. …a¬àan, and A.K. {aìn, '¦V©Õ00՛ ‰econd fìngerprìntúerìfìcatìon coàpetìtìon,'ìníļE CÃÄÖE ÃÄ öÛ¼¼×ÀÄ ô×ÙÃÕij¼³ÃÄ,úoã. ÖÑ, Õ00Õ.

[ua0Ó] ¨. uaìo, ¨. uaãtonì, R. ©appeããì, {. w. …a¬àan, and A. K. {aìn, '¦V©Õ00ӛ Tïìrd

¦ìngerprìnt Verìfìcatìon ©oàpetìtìon,' ìn ÂÀÃÙ××سÄÕ¾ íļ×ÀÄÛ¼³ÃÄÛ° CÃÄÖ×À×ÄÙ× ÃÄ B³Ã¯×¼À³Ù Aº¼´×ļ³ÙÛ¼³ÃÄ ;íCBAC?9, ong Kong, Õ00Ó, pp. Ö»Ð.

[u¨ÖÔ] w. uìràoïaàadsadegïìand A. ¨r¬gaéão, 'A teàpãate prìúac¬ protectìon scïeàe for fìngerprìntàìnýtìae descrìptors,'ìnÂÀÃÙ××سÄÕ¾ ÃÖ 1A¼´ íļ×ÀÄÛ¼³ÃÄÛ° CÃÄÖ×À×ÄÙ× ÃÖ ¼´×

B³Ã¯×¼À³Ù¾ óÂ×Ù³Û° íļ×À×¾¼ GÀúÂ3 Bí÷óíG, ¨aràstadt, Õ0ÖÔ, pp. ֟һ֝Õ.

[R‡ÖÖ] ©. Ratïgeb and A. ‡ïã, 'A ‰ýrúe¬ on ªìoàetrìc ©r¬ptos¬steàs and ©anceãabãe ªìoàetrìcs,'EñôAóíö ìúÀÄÛ° ÃÄ íÄÖÃÀ¯Û¼³ÃÄ ó×ÙºÀ³¼“, Õ0ÖÖ.

[‰ìÖÕ] K. ‰ìàoens et aã., '©rìterìa To÷ards uetrìcs for ªencïàaræìng Teàpãate Œrotectìon Aãgorìtïàs,'ìnÂÀÃÙE ÃÖ ¼´× >¼´ íEEEDíAöô íļE CÃÄÖ×À×ÄÙ× ÃÄ B³Ã¯×¼À³Ù¾, Õ0ÖÕ.

[Tý0Ð] ‰. Týã¬aæoú, ¦. ¦arooq, Œ. uansýæïanì, and V. Goúìndaraéý, '‰¬ààetrìc asï

¦ýnctìons for ‰ecýre ¦ìngerprìnt ªìoàetrìc ‰¬steàs,'öÛ¼¼×ÀÄ ô×ÙÃÕij¼³ÃÄ ê×¼¼×À¾,úoã.

՟, no. ÖÑ, pp. ÕÓÕлÕÓÔÑ, ¨eceàber Õ00Ð.

[TY0Ð] A. Teoïand ©. T. Yýang,'©anceãabãe ªìoàetrìcs Reaãì©atìon …ìtïuýãtìspace Randoà

Œroéectìons,'íEEE òÀÛľÛÙ¼³Ãľ ÃÄ ó“¾¼×¯¾3 éÛÄ3 ÛÄØ C“Ú×ÀÄ×¼³Ù¾3 öÛÀ¼ B,úoã. ÔÐ, no.

Ò, pp. Ö0Ñ»ÖÖ0Ñ, ctober Õ00Ð.

[…ìÖÓ] …ìæìpedìa. (Õ0ÖÓ, {ýã¬Ç Œeràýtatìon. [nãìne].ïttp›ØØen.÷ìæìpedìa.orgØ÷ìæì،eràýtatìon [YaÖ0] ª. Yang, ¨. artýng, K. ‰ìàoens, and ©. ªýscï, '¨¬naàìc Randoà Œroéectìon for

ªìoàetrìc Teàpãate Œrotectìon,'ìnÂÀÃÙ××سÄÕ¾ FúÀ¼´ íEEE íļ×ÀÄÛ¼³ÃÄÛ° CÃÄÖ×À×ÄÙ×

ÃÄ B³Ã¯×¼À³Ù¾ü ò´×ÃÀ“ A°³ÙÛ¼³Ãľ ÛÄØ ó“¾¼×¯¾ ;BòAó9, Õ0Ö0, pp. Ö»Ð.

Referenzen

ÄHNLICHE DOKUMENTE

Major contributions and thesis organization This thesis addresses the effects of delay caused by the available low transmission rate of the communication link between the TOP and OP

Given are model predictions for temporal changes of community averages of temperature indices (ΔCTIi, upper panels) and of community variation in temperature indices ( ΔCTV i ,

Damit wird eindrücklich verdeutlicht: Gewalt kann nicht als ein rein unmittelbares Phänomen verstanden werden, denn sie beinhaltet immer auch, dass ein Vorkommnis von den

Using the FVC 2002 DB1 [MMC + 02] we established quantization systems for the three alignment-free feature types minutia orientation descriptors OD, minutia frequency de- scriptors

A fingerprint indexing is designed by combining this binary template and Locality Sensitive Hashing indexing algorithm developed in a state-of-the-art fingerprint index- ing

In APUF–DIES-IoT architecture, the DIES using SBI is used to generate the random values of AID, challenge, device nonce and server nonce at each clock cycle that increases

The optical properties of the surface control the surface energy balance, which determines the energy available for the release of sensible and latent heat; the surface

INTERNATIONAL INSTITUTE FOR APPLIED SYSTEMS ANALYSIS A-2361 Laxenburg,