Loading…

Privacy preserving biometric authentication using Chaos on remote untrusted server

Biometric-based authentication systems are promising because of unique biometric features for each person. Generally, biometric features are generated , and biometric templates or bio-hash codes are calculated and stored in Authentication Data Table (ADT) along with userid. However, such hashing bas...

Full description

Saved in:
Bibliographic Details
Published in:Measurement : journal of the International Measurement Confederation 2021-06, Vol.177, p.109257, Article 109257
Main Authors: Falmari, Vinod Ramesh, Brindha, M.
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Biometric-based authentication systems are promising because of unique biometric features for each person. Generally, biometric features are generated , and biometric templates or bio-hash codes are calculated and stored in Authentication Data Table (ADT) along with userid. However, such hashing based authentication is vulnerable to precomputed table attacks. Also, in some cases, the service providers outsource the ADT to cloud or untrusted server. In this paper, a novel biometric-based authentication system is proposed using two servers: crypto-match server and untrusted storage server. The system utilizes biometric image cryptosystem, cryptographic hashing, and Paillier cryptosystem. In the proposed cryptosystem, keystreams are generated from Henon and logistic maps. The control parameters of these chaotic maps are calculated from the input biometric image. The proposed biometric encryption is able to resist statistical and differential attacks and its security level is also validated through various analyzes. Also, the attacks related to the privacy of ADT are analyzed. •Novel biometric image cryptosystem is developed.•Privacy-preserving biometric authentication is designed using proposed encryption.•Encryption key depends on input biometric to withstand differential attacks.•Because of improved speed and security, the proposed scheme can be used in real-time.•Security analysis is done through various factors.
ISSN:0263-2241
1873-412X
DOI:10.1016/j.measurement.2021.109257