Search In this Thesis
   Search In this Thesis  
العنوان
Development of Efficient Algorithms for Cancelable Biometrics\
المؤلف
Abou Elazm,Lamiaa Atef El-sayed
هيئة الاعداد
باحث / لمياء عاطف السيد أبو العزم
مشرف / محمد كامل السعيد
مشرف / سامح عاصم ابراهيم
مناقش / السيد مصطفى سعد
تاريخ النشر
2021.
عدد الصفحات
97p.:
اللغة
الإنجليزية
الدرجة
الدكتوراه
التخصص
الهندسة الكهربائية والالكترونية
تاريخ الإجازة
1/1/2021
مكان الإجازة
جامعة عين شمس - كلية الهندسة - كهربة اتصالات
الفهرس
Only 14 pages are availabe for public view

from 126

from 126

Abstract

Biometrics are defined as either signals or images extracted from humans for the purpose of identification. The most common biometrics is fingerprints, faces, iris, and speech signals. The basic idea of operation of biometric systems is to collect the biometrics from some authorized persons, extract discriminating features from the biometrics as a tool for data reduction and store these features in a database along with the associated person’s identities. This is known as the training phase. In the other phase of biometric systems, which is the testing phase, features are extracted from the incoming biometrics for new persons and the detected persons identities are matched to the identities stored in the database.
Most modern security systems depend on encryption and password techniques in data transfer and on biometrics to secure the access to different systems. These traditional systems have suffered for a long time from hacking trials; hence, the researchers have concentrated on biometric systems to avoid these security breaches. Biometric systems require the generation of databases storing the discriminating features extracted from the biometrics. Unfortunately, if the biometric databases are hacked for any reason, the biometrics saved in these systems would be revealed forever.
The basic concept of Cancelable biometrics is to use another version of the original biometric template created through a 1-way transformation of a high-security encryption algorithms, which keeps the original biometrics safe and away from utilization in the system. The new biometrics template can be changed easily in emergency cases without the need to change the system at all. For geometric biometrics as in face recognition, it is possible to use some one-way geometric distortion transforms that can change the indices in the biometric at hand. These transforms can be designed and changed easily. In the case of biometrics that depend on transform-domain features as in the iris recognition case, it is possible to use techniques such as random projection, and bio-hashing.
With the proliferation of information exchange across the Internet, and the storage of sensitive data on open networks, cryptography is becoming an increasingly important need of computer security. Many cryptographic algorithms are available for securing information. In general, data will be secured using a symmetric cipher system, while public-key systems will be used for digital signatures and for secure key exchange between users.
However, regardless of whether a user deploys a symmetric or a public-key system, the security is dependent on the secrecy of the secret or private key, respectively. Because of the large size of a cryptographically-strong key, it would clearly not be feasible to require the user to remember and enter the key each time it is required. Instead, the user is typically required to choose an easily remembered passcode that is used to encrypt the cryptographic key. This encrypted key can then be stored on a computer’s hard drive. To retrieve the cryptographic key, the user is prompted to enter the passcode, which will then be used to decrypt the key.
Biometric authentication offers a new mechanism for key security by using a biometric to secure the cryptographic key. Instead of entering a passcode to access the cryptographic key, the use of this key is guarded by biometric authentication. When a user wishes to access a secured key, he or she will be prompted to allow for the capture of a biometric sample. If this verification sample matches the enrollment template, then the key is released and can be used to encrypt or decrypt the desired data. Thus, biometric authentication can replace the use of passcodes to secure a key. This offers both conveniences, as the user no longer has to remember a passcode, and secure identity confirmation, since only the valid user can release the key.
Biometric Encryption refers to a process of secure key management. Biometric Encryption does not directly provide a mechanism for the encryption/decryption of data, but rather provides a replacement to typical passcode key-protection protocols. Specifically, Biometric Encryption provides a secure method for key management to complement existing cipher systems. This thesis aims to develop the cancelable biometric systems, through a 1-way transform of high-security encryption algorithms, which keeps the original biometrics safe and away from utilization in the system.
The new biometrics template can be changed easily in emergency cases without the need to change the system at all. The system will be then tested over Field Programmable Gate Array (FPGA) to assess its efficiency.