Types Of Biometric Systems

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

Assignment of :

Biometric system

LINA SAMI SAHER AL-CHALABI

literature review

The word "biometrics" is came from the Greek language, first "bio" means life and "metrics" means to measure.

Biometric technologies it is defined as automated methods of distinguishing or proving the identity of a living person based on a physiological or behavioral

Characteristic.

In general, Biometrics is a term used alternatively to describe a characteristic or a process.

As a characteristic: a biometric is a measurable biological (anatomical and physiological) and behavioral characteristic that can be used for automated recognition.

As a process: a biometric is an automated method of recognizing an individual based on measurable biological (anatomical and physiological) and behavioral characteristics.

Types of biometric systems

There are many types that being implemented or studied like fingerprint, face, iris, voice, signature and hand geometry.

Also there are many modalities are in various stages of search, development and assessment.

The attacks against biometric systems

In spite of numerous advantages of biometrics-based personal authentication systems over traditional security systems based on token or knowledge, they are vulnerable to attacks that can decrease their security considerably. In this paper, It being analyzed these attacks in the realm of a fingerprint biometric system. and propose an attack system that uses a hill climbing procedure to synthesize the target minutia templates and evaluate its feasibility with extensive experimental results conducted on a large fingerprint database. Several measures that can be utilized to decrease the probability of such attacks and their ramifications are also presented.

Biometrics-based personal authentication systems that use physiological (e.g., fingerprint, face) or behavioral (e.g., speech, handwriting) traits are becoming increasingly popular, compared to traditional systems that are based on tokens (e.g., key) or knowledge (e.g., password) [1]. Traditional authentication systems cannot discriminate between an impostor who fraudulently obtains the access privileges (e.g., key, password) of a genuine user and the genuine user herself. Furthermore, biometric authentication systems can be more convenient for the users since there is no password to be forgotten or key to be lost and a single biometric trait (e.g., fingerprint) can be used to access several accounts without the burden of remembering passwords.

In spite their numerous advantages, biometric systems are vulnerable to attacks, which can decrease their security. Ratha et al. [2] analyzed these attacks, and grouped them into eight classes. Fig. 1 shows these attacks along with the components of a typical biometric system that can be compromised. Type 1 attack involves presenting a fake biometric (e.g., synthetic fingerprint, face, iris) to the sensor. Submitting a previously intercepted biometric data constitutes the second type of attack (replay). In the third type of attack, the feature extractor module is compromised to produce feature values selected by the attacker. Genuine feature values are replaced with the ones selected by the attacker in the fourth type of attack. Matcher can be modified to output an artificially high matching score in the fifth type of attack.

The attack on the template database (e.g., adding a new template, modifying an existing template, removing templates, etc.) constitutes the sixth type of attack.

The transmission medium between the template database and matcher is attacked in the seventh type of attack, resulting in the alteration of the transmitted templates. Finally, the matcher result (accept or reject) can be overridden by the attacker.

Schneier [3] compares traditional security systems with biometric systems. The lack of secrecy (e.g., leaving fingerprint impressions on the surfaces we touch), and non-replaceability (e.g., once the biometric data is compromised, there is no way to return to a secure situation, unlike replacing a key or password) are identified as the main problems of biometric systems. Maltoni et al. [4] describe typical threats for a generic authentication application, which may result in quite different effects for traditional and biometrics-based systems. In Denial of Service (DoS), an attacker corrupts the authentication system so that legitimate users cannot use it. For a biometric authentication system, an online authentication server that processes access requests (via retrieving templates from a database and performing matching with the transferred biometric data) can be bombarded with many bogus access requests, to a point where the server�s computational resources cannot handle valid requests any more.

Fig. 1. Eight different attack points in a biometric authentication system (adapted from [2]).

In circumvention, an attacker gains access to the system protected by the authentication application. This threat can be cast as a privacy attack, where the attacker accesses the data that she was not authorized (e.g., accessing the medical records of another user) or, as a subversive attack, where the attacker manipulates the system (e.g., changing those records, submitting bogus insurance claims, etc.). In repudiation, the attacker denies accessing the system. For example, a corrupt bank clerk who modifies some financial records illegally may claim that her biometric data was �stolen�, or she can argue that the False Accept Rate (FAR) phenomenon associated with any biometric may have been the cause of the problem.

In contamination (covert acquisition), an attacker can surreptitiously obtain biometric data of legitimate users (e.g.,lifting a latent fingerprint and constructing a three-dimensional mold) and use it to access the system. Further, the biometric data associated with a specific application can be used in another unintended application (e.g., using a fingerprint for accessing medical records instead of the intended use of office door access control). This becomes especially important for biometric systems since we have a limited number of useful biometric traits, compared to practically unlimited number of traditional access identities (e.g., keys and passwords). Cross-application usage of biometric data becomes more probable with the growing number of applications using biometrics (e.g., opening car or office doors, accessing bank accounts, accessing medical records, locking computer screens, gaining travel authorization, etc.). In collusion, a legitimate user with wide access privileges (e.g., system administrator) is the attacker

who illegally modifies the system. In coercion, attackers force the legitimate users to access the system (e.g., using a fingerprint to access ATM accounts at a gunpoint) [4].

The problems that may arise from the above mentioned attacks on biometric systems are raising concerns as more and more biometric systems are being deployed both commercially and in government applications [5]. This, along with the increase in the size of the population using these systems and the expanding application areas (visa, border control,health care, welfare distribution, e-commerce, etc.) may lead to possible finance, privacy, and security related breaches.

several studies that show the vulnerability of biometric systems and provide solutions to some of the attacks that presented .

Fake biometric submission to the sensor (type 1 attack) is shown to be quite successful by several researchers. Note that this attack does not need anything more than a fake biometric; hence the feasibility of it compared to the other attacks can be high. For example, neither a knowledge of the matcher or template specifications nor template database access privileges (generally limited to system administrators) are necessary. Also, since it operates in the analog domain, outside the digital limits of the biometric system, the digital protection mechanisms such as encryption, digital

signature, hashing etc. are not applicable.

Putte and Keuning [6] tested several fingerprint sensors to check whether they accept an artificially created (dummy) finger instead of a real finger. The authors describe methods to create dummy fingers with and without the cooperation of the real owner of the biometric (say, Alice). When the owner cooperates (namely, Alice is helping the attackers), obviously, the quality of the produced dummy fingers can be higher than those produced without cooperation (namely, Alice is a victim of the attackers). In the former case, after creating the plaster cast of the finger, liquid silicon rubber is

filled inside the cast to create a wafer-thin dummy that can be attached to a finger, without being noticed at all. This operation is said to take only a few hours. In the latter case, more time (nearly eight hours) and more skill are needed :first, a fine powder is used to enhance the latent fingerprints left on a glass or scanner surface. Then, a photo of the print is taken which is used to transfer the print to a PCB (Printed Circuit Board). UV light exposure and acid etching leaves the profile of the print on the board, which is used for producing the silicon cement dummy. In both the cases, the authors used cheap and easily accessible material for the creation of the dummy finger. Five out of six sensors (that included both optical and solid state sensors) tested by the authors accepted a dummy finger created by the above methods as a real finger in the first attempt; the remaining sensor accepted the dummy finger in the second attempt. The authors argue that the properties (e.g., temperature, conductivity, heartbeat, dielectric constant, etc.) claimed to be used by the scanner manufacturers to distinguish a dummy finger from a real finger, may not perform well since the detection

margins of the system need to be adjusted to operate in different environments (e.g., indoor vs. outdoor), different environmental conditions (e.g., hot summer vs. cold winter), etc. Wafer thin silicon dummy fingers may lead to changes that are still within the detection margins of the systems. Matsumoto et al. [7] attacked 11 different fingerprint verification systems with artificially created gummy (gelatin) fingers. For a cooperative owner, her finger is pressed to a plastic mold, and gelatine leaf is used to create the gummy finger. The operation is said to take lass than an hour. It was found that the gummy fingers could be enrolled in all of the 11 systems, and they were accepted with a probability of 68-100%. When the owner does not cooperate, a residual fingerprint from a glass plate is enhanced with a cyanoacrylate adhesive. After capturing an image of the print, PCB based processing similar to the operation described above is used to create the gummy fingers. All of the 11 systems

enrolled the gummy fingers and they accepted the gummy fingers with more than 67% probability. To overcome such fake biometric attacks, Derakhshani et al. [8] proposed two software-based methods (not based on sensors that measure temperature, conductivity, etc.) for fingerprint liveness detection. They used a commercially available capacitive sensor and the sole input to the liveness detection module is a 5-second video of the fingerprints. In their static method, the periodicity of sweat pores along the ridges is used for liveness detection. In the dynamic method,

sweat diffusion pattern over time along the ridges is measured. Live fingers, fingers from cadavers, and dummy fingers made up of play dough are used in the experiments. A back propagation neural network (BPNN) based classifier is used

to distinguish live fingers from cadaver/dummy fingers. The static method leads to an EER of nearly 10%; the dynamic method leads to an EER in the range of 11-39%, where a false accept event is a cadaver/dummy finger being classified as live, and a false reject event is a live finger being classified as a cadaver/dummy.

It could be seen that fake biometric attacks can be quite successful in fooling the existing systems, and no perfect (either hardware or software) solution is currently available. As noted previously, this attack aims at a point in the biometric

system that is very close to the end user (in the sense that a physical replica is used) and this may hinder the utilization of some protection mechanisms. One other problem associated with this attack is that the means to detect an attack are limited.

The remaining attacks are feasible only if some knowledge about the biometric authentication system and/or some access privileges are available to the attacker. This fact may decrease their applicability compared to type 1 attacks. On the other hand, it may also increase their applicability since no physical production (that is still more costly and time consuming compared to digital production) such as plastic molding, is necessary. Further, in the digital domain, the attacks can be executed in relatively less time. For eliminating type 2 attacks, where a previously intercepted biometric is replayed, Ratha et al. [9] proposed a challenge/response based system. A pseudo-random challenge is presented to the sensor by a secure transaction server. At that time, the sensor acquires the current biometric signal and computes the response corresponding to the challenge (for example, pixel values at locations indicated in the challenge). The acquired signal and the corresponding response are sent to the transaction server where the response is checked against the received signal for consistency. An inconsistency reveals the possibility of the resubmission attack.

Soutar [10] proposed a �hill-climbing� attack for a simple image recognition system based on filter-based correlation. Synthetic templates are gradually input to a biometric authentication system; using the scores returned by the matching system, Soutar showed the system could be compromised till the point of incorrectpositive identification. Outputting only the quantized matching scores, not absolute scores, is proposed as a way to increase the time needed for an incorrect positive identification, thereby decreasing the practicality of this attack. This hill climbing attack can be cast as either type 2 or type 4 attack. As an example of the former, Adler [11] proposed an attack on a face recognition system where the account of a specific user enrolled in the system is attacked via synthetically generated face images. An initial

face image is selected. Using the matching scores returned from the matcher that were generated for each of the successive face images, this initial image is modified. At each step, several eigen-images (that can be generated from public domain face databases) are multiplied with a weight and added to the current candidate face image. The modified image that leads to the highest matching score is input as the new candidate image. These iterations are repeated until no improvement in matching score is observed. Experimental results on three commercial face recognition systems show that after about 4000 iterations, a sufficiently large matching score is obtained, which corresponds to a very high (~99.9%) confidence of matching scores. The author calculated the confidence as a sigmoidal function of the matching scores.

When hill climbing is applied as a type 2 attack (before the feature extractor), the information about the template format (which is essential for a type 4 attack) is not necessary. Synthetic images are input to the matching algorithm, which in turn handles conversion of the images into any suitable representation before matching. But, for a fingerprint-based biometric system, such an approach presents challenges not found in a face-based system: the discriminating information in fingerprints is not tied to specific geometrical relationships, as it is in face-based systems (e.g., between

eyes, nose, mouth, etc.) and methods that are inherently linked to the correct registration of image pixels (e.g., eigenimage analysis used in [11]) seem unsuitable.

A study that is related to the template database security (type 6 attack) is given in [12]. Using a commercial fingerprint matcher, the minutiae template data is reverse engineered by the author and the corresponding synthetic fingerprint images are generated. Although the generated images are not very realistic and few experimental results are provided, the possibility of this masquerading may imply that raw biometric templates need to be secured, using, for example, techniques such as encryption. Another method to protect templates from fraudulent usage involves using a distorted (but noninvertible) version of the biometric signal or the feature vector [9]; if a specific representation of template is compromised, the distortion transform can be replaced with another one from a transform database. Every application can use a different transform (e.g., health care, visa, e-commerce) so that the privacy concerns of subjects related to database sharing between institutions can be addressed. Data hiding and watermarking techniques have also been proposed as means of increasing the security of fingerprint images, by detecting modifications [13], by hiding one

biometric into another [14] and by hiding messages (authentication stamps such as personal ID information) in the compressed domain [9]. Linnartz and Tuyls [15] proposed delta-contracting and epsilon-revealing functions as preprocessors to construct helper data that is used in a way that no information about user templates is released to unauthorized parties. In the following section, we propose a system that uses hill climbing as a type 4 attack that bypasses the feature extractor and uses synthetically generated feature sets in the realm of a minutiae-based fingerprint matcher. Note that the format of the feature template used by the system should be known in advance to launch such an attack.

SYSTEM ARCHITECTURE

It is being designed an attack system for a minutiae-based fingerprint authentication system. While there exist other representation methods for fingerprints (e.g., FingerCode [16]), we chose a minutiae-based system as our test bed since they are used in most of the commercial fingerprint authentication systems. In typical minutiae-based fingerprint authentication systems, minutiae points consist of ridge endings and ridge bifurcations. Generally, all of the minutiae based systems use the location (c, r) of the minutiae and the orientation q associated with the minutiae as the attributes; but some systems use additional information such as ridge flow around the minutiae [17]. For keeping our attack system more general, we simply use (c, r,q ) attributes for each minutia. This is also consistent with the proposed minutiae template exchange format [18] that excludes proprietary features, and encompasses only the location, orientation and type for each minutia. Our attack system inputs synthetic minutiae sets to the matcher with the aim of gaining access to the system in place of a genuine user. Note that the user�s template information is unknown to the attack system. Using the scores returned by

the matcher and the characteristics of these minutiae sets, the attack system tries to generate a minutia set that results in a sufficiently high matching score to achieve positive identification. The block diagram of the proposed system is given

in Fig. 2.

Our notation in the remainder of the paper will be as follows:

� Di : The database template corresponding to user i , i =1, 2,3,....N , where N is the total number of users registered in the system. It is assumed that the attacking system knows the format of this template, but it cannot access the template itself.

� ni : The total number of minutiae in Di . Note that the attacking system does not know this value. �

Tji : The j th synthetic template generated by the attacking system for user i . This template has the samemformat as database templates; it can be represented as

, (1)

where each row represents column index, row index and orientation associated with a minutia; upper left hand subscript denotes the minutiae index, so the total number of minutiae in j

Tij is nij .

�?S (Di Ti) : The matching score between Di and Tij .

�?� Sthreshold : The decision threshold used by the matcher. Note that the attacking system does not know this value.

For attacking a specific user�s ( i ) account, the attacking system follows the following five steps:

� Step 1 (Initial guessing): Generate a fixed number of synthetic templates. In the current implementation, 100 random minutia templates ( Ti1 , Ti2 , Ti3 ��.. Ti100)

are created.

Fig. 2. Overview of the attack system.

�

Step 2 (Try initial guesses): Attack user i account with the templates generated in Step 1; accumulate the corresponding matching scores

( S(Di ,Ti1 ), S(Di ,Ti2 ), S(Di ,Ti3 ),..., S(Di ,Ti100 ) ).

� Step 3 (Pick the best initial guess): Declare the best guess ( best Ti ) to be the template resulting in the highest matching score.

Declare the best score (S best (Di ) ) to be the highest matching score.

� Step 4 (Try modification set): Modify best Ti by (i) perturbing an existing minutia, (ii) adding a new minutia,

(iii) replacing an existing minutia, and (iv) deleting an existing minutia. If for any one of these attempts, the matching score is larger than best S (Di), declare the modified template as best

Ti , and update (S best (Di )) accordingly. Else, do not change the parameters of Tibest .

Step 5 (Obtaining result): If the current best score is accepted by the matcher (namely, best (S best (Di )) > SThreshold ),

stop the attack; else, go to Step 4.

We assume that the resolution (in dpi) and size (in pixels) of the images generating the original templates is known to the attacking system. This is a valid assumption since these values are generally announced by sensor manufacturers.

For the current implementation, we used MSU-VERIDICOM fingerprint image database, with 500 dpi, 300x300 images. The image size is used for generating the location of synthetic minutiae; the resolution determines the interridge distance (9 pixels for 500 dpi) associated with the fingerprints. For eliminating the generation of minutiae too close to each other, we first create a rectangular grid (where each cell size is set to be the same as the inter-ridge distance). Then, the 2D location of a minutia, (c, r) , is created to be in the center of those cells, where the cells to be occupied are selected randomly. Hence, the attacking program does not create

minutiae that are closer than the inter-ridge distance. This helps is creating dispersed minutiae sets. The angle value associated with a minutia is generated randomly as a quantized value in the range [0, 360). For the current implementation, we quantized this interval into 16 equally spaced intervals.

In Steps 1-3, the aim is to find a good initial guess and concentrate on modifying it. Note that if the initial guess is bad, the algorithm may need more iterations to break into an account. Initial templates all have the same number of minutiae ( nij = 25, "i, j = 1,2,...,100 ). Even though the actual number of minutiae in the target template ( ni ) is not known, this value of 25 is selected to be a typical number. Further, the algorithm modifies the template set so that the number of minutia can increase or decrease, based on the returned matching scores, as explained below.

Step 4 is composed of 4 iterations in each loop of the process. At the first iteration, an existing minutia is randomly picked, and its location or angle are modified slightly, both with a probability of 0.5. Here, the aim is to change either the location or angle of a minutia and see the effect on the matching score. The location in each direction is perturbed with a distance equal to inter-ridge distance (note that a minutia has at most 8 neighboring cells to go to); the angle is perturbed so that it is increased or decreased to the next angle quantum (hence, it changes �22.5 degrees in the current implementation). At the second iteration, a new randomly created minutia is added to the current template. At the third iteration, an existing minutia is randomly picked and it is replaced with a randomly created minutia. At the fourth iteration, an existing minutia is randomly picked and it is deleted from the current template.

After each iteration, if the matching score improves, we replace the current template with the new template; otherwise

It does not being changed it. Hence, the algorithm �hill climbs� to increase the matching score.

Fig.7. Fingerprint image and minutiae comparison: (a) an easy account to crack (original template has 15 minutia, synthetic template has 17 minutia, final matching score is 12.5), (b) a medium difficulty account (original template has 26 minutia, synthetic template has 10 minutia, final matching score is 16.4), (c) a hard account to crack (original template has 16 minutia, synthetic template has 10 minutia, final matching score is 13.3). Solid lines with circle (-o) indicate the original minutiae, dotted lines with triangles ( ??_ ) indicate the synthetic minutiae.

Biometric template database: In this proposal it emphasized protecting the template, thus it the template database (in figure 2) which is relevant. An attack on the biometric template database is possibly the most critical in the whole biometric system, which can lead to these three vulnerabilities [2]:

_ Replacement of a forged or invalid template

_ Reconstruction of biometric samples from template

_ Abuse of the templates to cross-match with other applications



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now