Data protection management process during remote biometric authentication
Keywords:biometric template, remote authentication, attacks, network steganography
Remote biometric authentication systems have recently become widespread due to the need to use common devices and make payments over the Internet. Because biometric methods are more user-friendly and now quickly replace passwords, the task of transmitting biometric information over an open network without compromising it is becoming urgent. This work aims to upgrade the remote authentication system to increase the secrecy and security of user biometric data. In order to achieve this goal, it is proposed to use the best security methods for forming biometric templates, network steganography to increase secrecy, and the introduction of an intelligent decision-making system. These improvements will increase the security and privacy of data during the remote authentication process.
M.S. Lutsenko, O.O. Kuznetsov, D.I. Prokopovich-Tkachenko, and V.P. Zverev, “Comparative analysis of biometric cryptosystems,” (in rus), Applied radio electronics, vol. 17, no. 3, 4, pp. 182–191, 2018.
A.A. Kuznetsov, R.V. Sergienko, and A.A. Uvarova, “Fuzzy extractor on noise-tolerant codes for biometric cryptography,” (in rus), Radio engineering, vol. 208, issue. 195, pp. 224–234.
Y. Dodis, R. Ostrovsky, L. Reyzin, and A.D. Smith, “Fuzzy extractors: How to generate strong keys from biometrics and other noisy data,” SIAM J. Comput., vol. 38, no. 1, pp. 97–139, 2008.
Y. Dodis, L. Reyzin, and A. Smith, Fuzzy Extractors. A Brief Survey of Results from 2004 to 2006. Available: http://www.cs.bu.edu/~reyzin/papers/fuzzysurvey.pdf )
A. Juels and M. Sudan, “A fuzzy vault scheme,” Des. Codes Cryptography, vol. 38, no. 2, pp. 237–257, 2006.
Anil K. Jain, A. Ross, and S. Prabhakar, “An introduction to biometric recognition,” IEEE Trans. Circ. Syst. Video Technol., vol. 14, no. 1, pp. 4–20, 2004.
Anil K. Jain, K. Nandakumar, A. Nagar, “Biometric template security,” EURASIP J. Adv. in Signal Process., pp. 1–17, 2008.
M. Upmanyu, A.M. Namboodiri, K. Srinathan, and C.V. Jawahar, “Efficient biometric verification in encrypted domain,” ICB ‘09: Proc. of the Third Int. Conf. on Biometrics., pp. 899–908, 2009.
U. Uludag, S. Pankanti, S. Prabhakar, and Anil K. Jain, “Biometric cryptosystems: issues and challenges,” Proc. IEEE 2004, 92(6), pp. 948–960.
A. Astrakhantsev, G. Liashenko, and A. Shcherbak, “Noise resistance of remote authentication via LTE network,” Information and Telecommunication Sciences, vol. 2, pp. 38–43, 2020.
G. Liashenko, A. Astrakhantsev, and V. Chernikova, “Network steganography application for remote biometrie user authentication,” IEEE 9th International Conference On Dependable Systems, Services And Technologies (DESSERT), pp. 326–330, 2018.
P. Jayapriya, R.R. Manimegalai, and R. Kumar Lakshmana, “A Survey on Different Techniques for Biometric Template Protection,” Journal of Internet Technology, vol. 21, no. 5, 2020.
P. Poongodi and P.Betty, “A Study on Biometric Template Protection Techniques,” International Journal of Engineering Trends and Technology (IJETT), vol. 7, no. 4, 2014.
Edwin T.L. Rampine and Cynthia H. Ngejane, “A Brief Overview of Hybrid Schemes for Biometric Fingerprint Template Security,” in Proceedings of the 2nd International Conference on Information Systems Security and Privacy (ICISSP 2016), pp. 340–346.
A. Sarkar and Binod K. Singh, “A Review on Different Biometric Template Protection Methods,” Recent Advances in Computer Science and Communications, vol.14, issue 5, pp. 1551–1572, 2021.
V.G. Chernikova, A.A. Astrakhantsev, and G.Ye. Lyashenko, “Study of the characteristics of the iris biometric identification system”, Weapons systems and military equipment, no.1 (53), pp.195–202, 2018.
3GPP [TS 38.214]: NR; Physical layer procedures for data. Available: https://www.tech-invite.com/3m38/tinv-3gpp-38-214.html