Loading…
Privacy preserving biometric authentication using Chaos on remote untrusted server
Biometric-based authentication systems are promising because of unique biometric features for each person. Generally, biometric features are generated , and biometric templates or bio-hash codes are calculated and stored in Authentication Data Table (ADT) along with userid. However, such hashing bas...
Saved in:
Published in: | Measurement : journal of the International Measurement Confederation 2021-06, Vol.177, p.109257, Article 109257 |
---|---|
Main Authors: | , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Biometric-based authentication systems are promising because of unique biometric features for each person. Generally, biometric features are generated , and biometric templates or bio-hash codes are calculated and stored in Authentication Data Table (ADT) along with userid. However, such hashing based authentication is vulnerable to precomputed table attacks. Also, in some cases, the service providers outsource the ADT to cloud or untrusted server. In this paper, a novel biometric-based authentication system is proposed using two servers: crypto-match server and untrusted storage server. The system utilizes biometric image cryptosystem, cryptographic hashing, and Paillier cryptosystem. In the proposed cryptosystem, keystreams are generated from Henon and logistic maps. The control parameters of these chaotic maps are calculated from the input biometric image. The proposed biometric encryption is able to resist statistical and differential attacks and its security level is also validated through various analyzes. Also, the attacks related to the privacy of ADT are analyzed.
•Novel biometric image cryptosystem is developed.•Privacy-preserving biometric authentication is designed using proposed encryption.•Encryption key depends on input biometric to withstand differential attacks.•Because of improved speed and security, the proposed scheme can be used in real-time.•Security analysis is done through various factors. |
---|---|
ISSN: | 0263-2241 1873-412X |
DOI: | 10.1016/j.measurement.2021.109257 |