Adaptive Management of Multimodal Biometrics—A Deep Learning and Metaheuristic Approach
مدیریت تطبیقی بیومتریک چند حالته - یادگیری عمیق و رویکرد فرا مکاشفه ای-2021
This paper introduces the framework for adaptive rank-level biometric fusion: a new approach towards personal authentication. In this work, a novel attempt has been made to identify the optimal design parameters and framework of a multibiometric system, where the chosen biometric traits are subjected to rank-level fusion. Optimal fusion parameters depend upon the security level demanded by a particular biometric application. The proposed framework makes use of a metaheuristic approach towards adaptive fusion in the pursuit of achieving optimal fusion results at varying levels of security. Rank-level fusion rules have been employed to provide optimum performance by making use of Ant Colony Optimization technique. The novelty of the reported work also lies in the fact that the proposed design engages three biometric traits simultaneously for the first time in the domain of adaptive fusion, so as to test the efficacy of the system in selecting the optimal set of biometric traits from a given set. Literature reveals the unique biometric characteristics of the fingernail plate, which have been exploited in this work for the rigorous experimentation conducted. Index, middle and ring fingernail plates have been taken into consideration, and deep learning feature-sets of the three nail plates have been extracted using three customized pre-trained models, AlexNet, ResNet-18 and DenseNet-201. The adaptive multimodal performance of the three nail plates has also been checked using the already existing methods of adaptive fusion designed for addressing fusion at the score-level and decision- level. Exhaustive experiments have been conducted on the MATLAB R2019a platform using the Deep Learning Toolbox. When the cost of false acceptance is 1.9, experimental results obtained from the proposed framework give values of the average of the minimum weighted error rate as low as 0.0115, 0.0097 and 0.0101 for the AlexNet, ResNet-18 and DenseNet-201 based experiments respectively. Results demonstrate that the proposed system is capable of computing the optimal parameters for rank-level fusion for varying security levels, thus contributing towards optimal performance accuracy.© 2021 Elsevier B.V. All rights reserved.
Keywords: Adaptive Biometric Fusion | Ant Colony Optimization | Deep Learning | Fingernail Plate | Multimodal Biometrics | Rank-level Adaptive Fusion
Trustworthy authorization method for security in Industrial Internet of Things
روش مجوز معتبر برای امنیت در اینترنت اشیا صنعتی-2021
Industrial Internet of Things (IIoT) realizes machine-to-machine communication and human–computer inter- action (HCI) through communication network, which makes industrial production automatic and intelligent. Security is critical in IIoT because of the interconnection of intelligent industrial equipment. In IIoT environment, legitimate human–computer interaction can only be performed by authorized professionals, and unauthorized access is not tolerated. In this paper, a reliable authentication method based on biological information is proposed. Specifically, the complete local binary pattern (CLPB) and the statistical local binary pattern (SLPB) are introduced to describe the local vein texture characteristics. Meanwhile, the contrast energy and frequency domain information are regarded as auxiliary information to interpret the finger vein. The distance between the features of the registration image and the test image is used to recognize the finger vein image, so as to realize identity authentication. The experiments are carried out on SDUMLA-FV database and FV-USM database, and results show that the presented method has achieved high recognition accuracy.
Keywords: Industrial Internet of Things (IIoT) | Human–computer interaction (HCI) | Biometric recognition | Comprehensive texture | Security system
Efficient biometric-based identity management on the Blockchain for smart industrial applications
مدیریت هویت مبتنی بر بیومتریک کارآمد در Blockchain برای کاربردهای صنعتی هوشمند-2021
In this work, we propose a new Blockchain-based Identity Management system for smart industry. First, we describe an efficient biometric-based anonymous credential scheme, which supports selective disclosure, suspension/thaw and revocation of credentials/entities. Our system provides non-transferability through a freshly computed hidden biometric attribute, which is generated using a secure fuzzy extractor during each authentication. This mechanism combined with offchain storage guarantees GDPR compliance, which is required for protecting user’s data. We define blinded (Brands) DLRep scheme to provide multi-show unlinkability, which is a lacking feature in Brands’ credential based systems. For larger organizations, we re-design the system by replacing the Merkle Tree with an accumulator to improve scalability. The new system enables auditing by adapting the standard Industrial IoT (IIoT) Identity Management Lifecycle to Blockchain. Finally, we show that the new proposal outperforms BASS, i.e. the most recent blockchain-based anonymous credential scheme designed for smart industry. The computational cost at the user-side (can be a weak IoT device) of our scheme is 8-times less than that of BASS. Thus, our system is more suitable for IIoT.© 2020 Elsevier B.V. All rights reserved.
Keywords: Identity management | Smart industry | Blockchain | Non-transferability | Biometrics | DLRep | Multi-show unlinkability | Selective disclosure | Accumulators
Open code biometric tap pad for smartphones
باز کردن کد ضربه گیر بیومتریک برای تلفن های هوشمند-2021
Poor security practices among smartphone users, such as the use of simple, easily guessed passcodes for logins, are a result of the effort required to memorize stronger ones. In this paper, we devise a concept of ‘‘open code’’ biometric tap pad to authenticate smartphone users, which eliminates the need of memorizing secret codes. A biometric tap pad consists of a grid of buttons each labeled with a unique digit. The user attempting to log into the phone will tap these buttons in a given sequence. He/she will not memorize this tap sequence. Instead, the sequence will be displayed on the screen. The focus here is how the user types the sequence. This typing behavior is used for authentication. An open code biometric tap pad has several advantages, such as(1) users do not need to memorize passcodes, (2) manufacturers do not need to include extra sensors, and (3) onlookers have no chance to practice shoulder-surfing. We designed three tap pads and incorporated them into an Android app. We evaluated the performance of these tap pads by experimenting with three sequence styles and five different fingers: two thumbs, two index fingers, and the ‘‘usual’’ finger. We collected data from 33 participants over two weeks. We tested three machine learning algorithms: Support Vector Machine, Artificial Neural Network, and Random Forest. Experimental results show significant promise of open code biometric tap pads as a solution to the problem of weak smartphone security practices used by a large segment of the population.
Keywords: Smartphone security | Behavioral biometrics | Touchscreen behavior | Open code | Biometric tap pad
Lossless fuzzy extractor enabled secure authentication using low entropy noisy sources
استخراج کننده فازی بدون تلفات ، احراز هویت ایمن را با استفاده از منابع پر سر و صدا کم آنتروپی فعال کرد-2021
Fuzzy extractor provides a way for key generation from biometrics and other noisy data. It has been widely applied in biometric authentication systems that provides natural and passwordless user authentication. In general, given a random sample, a fuzzy extractor extracts a nearly uniform random string, and subsequently regenerates the string using a different yet similar noisy sample. However, due to error tolerance between the two samples, fuzzy extractor imposes high information loss (entropy) and thus, it only works for an input with high enough entropy. In this work, we propose a lossless fuzzy extractor for a large family of sources. The proposed lossless fuzzy extractor can be adopted for a wider range of random sources to extract an arbitrary number of nearly uniform random strings. Besides, we formally defined a new entropy measurement, named as equal error entropy, to measure the entropy loss in reproducing a bounded number of random strings. When the number of random strings is large enough, the equal error entropy is minimized and necessary for performance evaluation on the authentication using the extracted random strings.
Keywords: Authentication | Biometric | Fuzzy extractor | Secure sketch
A cancelable biometric authentication system based on feature-adaptive random projection
یک سیستم احراز هویت بیومتریک قابل لغو بر اساس طرح تصادفی سازگار با ویژگی-2021
Biometric template data protection is critical in preventing user privacy and identity from leakage. Random projection based cancelable biometrics is an efficient and effective technique to achieve biometric template protection. However, traditional random projection based cancelable template design suffers from the attack via record multiplicity (ARM), where an adversary obtains multiple transformed templates from different applica- tions and the associated parameter keys so as to assemble them into a full-rank linear equation system, thereby retrieving the original feature vector. To address this issue, in this paper we propose a feature-adaptive random projection based method, in which the projection matrixes, the key to the ARM, are generated from one basic matrix in conjunction with local feature slots. The generated projection matrixes are discarded after use, thus making it difficult for the adversary to launch the ARM. Moreover, the random projection in the proposed method is performed on a local-feature basis. This feature-adaptive random projection can mitigate the negative impact of biometric uncertainty on recognition accuracy, as it limits the error to part of the transformed feature vector rather than the entire vector. The proposed method is evaluated on four public available databases FVC2002 DB1-DB3 and FVC2004 DB2. The experimental results and security analysis show the validity of the proposed method.
Keywords: Biometric authentication | Template protection | Random projection | Cancelable biometrics
Deep belief network-based hybrid model for multimodal biometric system for futuristic security applications
مدل ترکیبی مبتنی بر باور عمیق برای سیستم بیومتریک چند حالته برای برنامه های امنیتی آینده-2021
Biometrics is the technology to identify humans uniquely based on face, iris, and fingerprints, etc. Biometric authentication allows the person recognition automatically on the basis of behavioral or physiological charac- teristics. Biometrics are broadly employed in several commercial as well as the official identification systems for automatic access control. This paper introduces the model for multimodal biometric recognition based on score level fusion method. The overall procedure of the proposed method involves five steps, such as pre-processing, feature extraction, recognition score using Multi- support vector neural network (Multi-SVNN) for all traits, score level fusion, and recognition using deep belief neural network (DBN). The first step is to input the training images into pre-processing steps. Thus, the pre-processing of three traits, like iris, ear, and finger vein is done. Then, the feature extraction is done for each modality to extract the features. After that, the texture features are extracted from pre-processed images of the ear, iris, and finger vein, and the BiComp features are acquired from individual images using a BiComp mask. Then, the recognition score is computed based on the Multi-SVNN classifier to provide the score individually for all three traits, and the three scores are provided to the DBN. The DBN is trained using the chicken earthworm optimization algorithm (CEWA). The CEWA is the integration of the chicken swarm optimization (CSO), and earthworm optimization algorithm (EWA) for the optimal authentication of the person. The analysis proves that the developed method acquired a maximal accuracy of 95.36%, maximal sensitivity of 95.85%, and specificity of 98.79%, respectively.
Keywords: Multi-modal Bio-metric system | Chicken Swarm Optimization | Earthworm Optimization algorithm | Deep Belief Network | Multi-SVNN
An efficient biometric-based continuous authentication scheme with HMM prehensile movements modeling
یک طرح احراز هویت مداوم مبتنی بر بیومتریک با مدل سازی حرکات پیش ساخته HMM-2021
Biometric is an emerging technique for user authentication thanks to its efficiency compared to the traditional methods, such as passwords and access-cards. However, most existing biometric authentication systems require the cooperation of users and provide only a login time authentication. To address these drawbacks, we propose in this paper a new, efficient continuous authentication scheme based on the newly biometric trait that still under development: prehensile movements. In this work, we model the movements through Hidden Markov Model-Universal Background Model (HMM-UBM) with continuous observations based on Gaussian Mixture Model (GMM). Unlike the literature, the gravity signal is included. The results of the experiments conducted on a public database HMOG and on a proprietary database, collected under uncontrolled conditions, have shown that prehensile movements are very promising. This new biometric feature will allow users to be authenticated continuously, passively and in real time.
Keywords: Biometric | Authentication | Prehensile movement | HMM-UBM | GMM
Provably secure biometric-based client–server secure communication over unreliable networks
ارتباطات امن مشتری و سرور مبتنی بر بیومتریک به طور قابل اطمینان در شبکه های غیرقابل اعتماد-2021
Due to rapid advancement in internet technologies, remote client access has become much more comfortable than in previous days. The responsibility of the system does not limit even after providing access to resources. In every system, there is a possibility that an adversary may use the resources of the system without prior authentication. This will create interruption, and the clients of the system will ultimately be affected, so the system must provide some authentication mechanism. Therefore, an authentication scheme needs to be introduced, which provides security against different attacks. Consequently, in this article, we propose a reliable and secure three factor authentication scheme that prevents various security attacks. The provable security of the proposed scheme is proved through a widely used random oracle model. We implemented the cryptographic operations of proposed and related schemes on a desktop system having good specifications to get the experimental results. Moreover, the presented scheme is compared with the existing schemes to compare its performance. The performance evaluation shows that our scheme is lightweight and efficient in terms of computation and communication costs as compared to related competing schemes.
Keywords: Anonymity | Authentication | Impersonation attack | Session key | Smartcard
ECB2: A novel encryption scheme using face biometrics for signing blockchain transactions
ECB2: یک طرح رمزگذاری جدید با استفاده از بیومتریک چهره برای امضای تراکنش های بلاک چین-2021
Blockchain is the technology on the basis of the recent smart and digital contracts. It ensures at this system the required characteristics to be effectively applied. In this work, we propose a novel encryption scheme specifically built to authorize and sign transactions in digital or smart contracts. The face is used as a biometric key, encoded through the Convolutional Neural Network (CNN), FaceNet. Then, this encoding is fused with an RSA key by using the Hybrid Information Fusion algorithm (BNIF). The results show a combined key that ensures the identity of the user that is executing the transaction by preserving privacy. Experiments reveal that, even in strong heterogeneous acquisition conditions for the biometric trait, the identity of the user is ensured and the contract is properly signed in less than 1.86 s. The proposed ECB2 encryption scheme is also very fast in the user template creation (0.05s) and requires at most four attempts to recognize the user with an accuracy of 94%.