Biometrics security
Abstract
A biometric authentication system automatically authenticates an individual by using her/his physiological or behavioral characteristics. For example, fingerprint, face, iris, and vascular patterns are included in the physiological characteristics. Recently, the use of the biometric authentication systems has spread in various services such as the access control for a mobile phone and PC, the customer's authentication at a bank's ATM (automated tellers machine) terminal, the immigration control at an airport, and so on.
Unfortunately, a security evaluation method for a biometric authentication system has not been sufficiently established so far. In order to realize a reliable biometric authentication system with high security, it is necessary to develop the security evaluation method as the priority issue.
Our main research objective is to develop such a rigourous security method and, on the basis of our method, propose a new biometric authentication technique that is verifiable by a third party as one not only with high security but also with high usability (e.g. low FRR, high speed processing). Especially, we are now focusing on how to develop a quantative security measure against impersonation attacks. Moreover, we are also studying the security of template protection schemes or cancelable biometric authentication systems.
As a recent result, we proposed an important security measure, ``the wolf attack probability (WAP)''. WAP is a maximum success probability of a wolf attack, which is an attempt to impersonate a victim using wolves (i.e. input samples that show high similarity to most of templates). WAP can be used as the theoretical measure to evaluate a lower bound of a security level in a biometric authentication system. We applied the wolf attack to a finger-vein-pattern matching algorithm, a typical fingerprint-minutiae matching algorithm and an iris recognition algorithm, and computed WAP in their algorithms. Moreover, we proposed a theoretical framework for constructing matching algorithms secure against the wolf attack and evaluated previous algorithms in our proposed framework. We are now developing efficient and secure matching algorithms.
Members
- Manabu Inuma
- Akira Otsuka
- Rie Shigetomi
Selected Results
- M. Inuma, A. Otsuka, H. Imai, ``Theoretical framework for constructing matching algorithms in biometric authentication systems,'' Proceedings of 3rd International Conference on Biometrics (ICB 2009), June 2009
- M. Inuma, A. Otsuka, H. Imai, ``A new framework for constructing matching algorithms secure against the wolf attack in biometric authentication systems,'' (Presented in Japanese), The 2009 Symposium on Cryptography and Information Security, The Institute of Electronics, Information and Communication Engineers, Jan. 2009.
- Y. Kojima, R. Shigetomi, M. Inuma, A. Otsuka, H. Imai, ``An Efficient and Secure Protocol in a Framework of Matching Algorithms Based on Wolf Attack Probability,'' (Presented in Japanese), The 2009 Symposium on Cryptography and Information Security, The Institute of Electronics, Information and Communication Engineers, Jan. 2009.
- Y. Kojima, R. Shigetomi, M. Inuma, A. Otsuka, H. Imai, ``A Matching Algorithm Secure against the Wolf Attack in Biometric Authentication Systems,'' (Presented in Japanese), The Computer Security Symposium 2008, The Institute of Electronics, Information Processing Society of Japan, Oct. 2008.
- Y.Kojima, R. Shigetomi, K. Yoshizoe, M. Inuma, A. Otsuka, H. Imai, ``A Theoretical Study on Wolf Attack Probability in Iris-pattern Recognition Systems,''(Presented in Japanese), The 2008 Symposium on Cryptography and Information Security, The Institute of Electronics, Information and Communication Engineers, Jan. 2008.
- M. Une, A. Otsuka, H. Imai, ``Wolf Attack Probability: A Theoretical Security Measure in Biometrics-Based Authentication Systems,'' IEICE, Trans. on Info. and Sys. 2008, E91-D(5)
- M. Une, A. Otsuka, H. Imai, ``Wolf Attack Probability: A New Security Measure in Biometric Authentication Systems,'' In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007, LNCS, vol. 4642, Springer-Verlag Berlin Heidelberg, pp. 396-406, 2007
- M.Une, A.Otsuka, and H.Imai, ``Wolf Attack Probability: A New Security Measure in Biometrics-Based Authentication Systems,'' (Presented in Japanese), The 2007 Symposium on Cryptography and Information Security, The Institute of Electronics, Information and Communication Engineers, Jan. 2007.
- R.Kawakami, R.Shigetomi, K.Yoshizoe, M.Une, A.Otsuka, and H.Imai, ``A Theoretical Study on Wolves in a Minutiae Matching Algorithm,'' (Presented in Japanese), The 2007 Symposium on Cryptography and Information Security, The Institute of Electronics, Information and Communication Engineers, Jan. 2007.
- N.Watanabe, R.Shigetomi, K.Yoshizoe, M.Une, A.Otsuka, and H.Imai, ``Universal Wolves in a Matching Algorithm for Finger Vein Patterns - A Study on the Feature Extraction Process -,'' (Presented in Japanese), The 2007 Symposium on Cryptography and Information Security, The Institute of Electronics, Information and Communication Engineers, Jan. 2007.
- N.Watanabe, R.Shigetomi, M.Une, A.Otsuka, and H.Imai, ``Universal Wolves in a Matching Algorithm for Finger Vein Patterns'' (Presented in Japanese), The Computer Security Symposium 2006, The Institute of Electronics, Information Processing Society of Japan, Oct. 2006.