GRD Journals- Global Research and Development Journal for Engineering | Volume 2 | Issue 1 | December 2016 ISSN: 2455-5703
Techniques for Privacy Preservation Aswini Prasad PG Student Department of Communication Engineering Mount Zion college of engineering
Abstract A form of biometrics, also called Biometric Encryption or BioCryptics, in which the proves is protected against the misuse of template data by a dishonest verifier. Biometric identification requires that a verifier searches for matches in a data base that contains data about the entire population. This introduces the security and privacy threat that the verifier who steals biometric templates from some (or even all) persons in the data base can perform impersonation attacks. When a private verification system is used on a large scale, the reference data base has to be made available to many different verifiers, who, in general, cannot be trusted. Information stolen from a data base can be misused to construct artificial biometrics to impersonate people. Creation of artificial biometrics is possible even if only part of the template is available. To develop an insight in the security aspects of biometrics, one can distinguish between verification and private verification. In a typical verification situation, access to the reference template allows a malicious verifier to artificially construct measurement data that will pass the verification test, even if the prover has never exposed herself to a biometric measurement after the enrollment. In private verification, the reference data should not leak relevant information to allow the verifier to (effectively) construct valid measurement data. Such protection is common practice for storage of computer passwords. When a computer verifies a password, it does not compare the password typed by the user with a stored reference copy. Instead, the password is processed by a cryptographic one-way function F and the outcome is compared against a locally stored reference string F(y ). So y is only temporarily available on the system hardware, and no stored data allows calculation of y. This prevents attacks from the inside by stealing unencrypted or decrypt able secrets. Biometric verification is defined as the verification of a individual based on the physical, chemical or behavioural attributes of the person. To protect the biometric data containing privacy information, a number of privacy-preserving biometric schemes (PPBSs).These PPBSs can be classified into Biometric encryption based schemes, Cancelable biometric based schemes, Multimodal and hybrid based schemes, secure computation (SC) based schemes. There is a comparative study of PPBS and select the best one .On the bases of comparisons select the best PPBS is Biometric encryption based schemes. Keywords- Bio Cryptic, privacy-preserving biometric schemes, biometric encryption, cancellable biometric, hybrid based, multimode, secure computation
I. INTRODUCTION Biometrics refers to metrics related to human characteristics. Biometrics authentication (or realistic authentication is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance .Biometric identifiers are the distinctive, measurable characteristics used to label and describe individuals. Biometric identifiers are often categorized as physiological versus behavioral characteristics. Physiological characteristics are related to the shape of the body. Examples include, but are not limited to fingerprint, palm veins, face recognition, DNA, palm print hand geometry, iris recognition, retina and odour/scent. Behavioral characteristics are related to the pattern of behavior of a person, including but not limited to typing rhythm, gait, and voice ,Some researchers have coined the term behavior metrics to describe the latter class of biometrics. More traditional means of access control include token-based identification systems, such as a driver's license or passport and knowledge-based identification systems, such as a password or personal identification number. Since biometric identifiers are unique to individuals, they are more reliable in verifying identity than token and knowledge-based methods; however, the collection of biometric identifiers raises privacy concerns about the ultimate use of this information Exponential growth of the internet, identity verification becomes an essential part in web-based applications. Traditionally, passwords, identity cards and pin numbers are used for the verification of individuals. But attackers can get access to a system by guessing passwords and pin numbers. Overcome the disadvantages uses biometric verification system. Biometric verification is defined as the verification of a individual based on the physical, chemical or behavioral attributes of the person. To protect the biometric data containing privacy information, a number of privacy-preserving biometric schemes (PPBSs)[1].These PPBSs can be classified into Biometric encryption based schemes, Cancelable biometric based schemes, Multi-modal and hybrid based schemes, secure computation (SC) based schemes. There is a comparative study of PPBS and select the best one.
All rights reserved by www.grdjournals.com
66