Abstract
In this paper, we propose a theoretical framework to construct matching algorithms for any biometric authentication systems. Conventional matching algorithms are not necessarily secure against strong intentional impersonation attacks such as wolf attacks. The wolf attack is an attempt to impersonate a genuine user by presenting a “wolf” to a biometric authentication system without the knowledge of a genuine user’s biometric sample. A “wolf” is a sample which can be accepted as a match with multiple templates. The wolf attack probability (WAP) is the maximum success probability of the wolf attack, which was proposed by Une, Otsuka, Imai as a measure for evaluating security of biometric authentication systems [UOI1], [UOI2]. We present a principle for construction of secure matching algorithms against the wolf attack for any biometric authentication systems. The ideal matching algorithm determines a threshold for each input value depending on the entropy of the probability distribution of the (Hamming) distances. Then we show that if the information about the probability distribution for each input value is perfectly given, then our matching algorithm is secure against the wolf attack. Our generalized matching algorithm gives a theoretical framework to construct secure matching algorithms. How lower WAP is achievable depends on how accurately the entropy is estimated. Then there is a trade-off between the efficiency and the achievable WAP. Almost every conventional matching algorithm employs a fixed threshold and hence it can be regarded as an efficient but insecure instance of our theoretical framework. Daugman’s algorithm proposed in [Da2] can also be regarded as a non-optimal instance of our framework.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Adler, A., Youmaran, R., Loyka, S.: Towards a measure of biometric feature information. In: Pattern Analysis and Applications. Springer, London (Online first), doi:10.1007/s10044-008-0120-3
Daugman, J.: High Confidence Visual Recognition of Persons by a Test of Statstical Independence. IEEE Trans. on Pattern Anal. Mach. Intell. 15(11) (November 1993)
Daugman, J.: Probing the uniqueness and randomness of IrisCodes: Results from 200 billion iris pair comparisons. Proceedings of the IEEE 94(11), 1927–1935 (2006)
International Organization for Standardization (ISO), International Electronical Commission (ICE): ISO/IEC CD 19792: Imformation technology - Security techniques - Security evaluations of biometrics (2006)
Kevenaar, T.: Protection of Biometric Information. In: Tuyls, P., Skoric, B., Kevenaar, T. (eds.) Security with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting, ch. 7, pp. 113–125. Springer, London (2007)
Matsumoto, T., Matsumoto, H., Yamada, K., Hoshino, S.: Impact of Artificial ‘Gummy’ Fingers on Fingerprinting Systems. In: Opt. Sec. and Count. Det. Tech. IV, Proc. of SPIE, vol. 4677, pp. 275–289 (2002)
Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40, 614–634 (2001)
Une, M., Otsuka, A., Imai, H.: Wolf Attack Probability: A New Security Measure in Biometric Authentication Systems. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol. 4642, pp. 396–406. Springer, Heidelberg (2007)
Une, M., Otsuka, A., Imai, H.: Wolf Attack Probability: A Theoretical Security Measure in Biometrics-Based Authentication Systems. IEICE, Transactions on Information and Systems 2008 E91-D (5), 1380–1389 (2008)
Wayman, J.S.: The cotton ball problem. In: Biometrics Conference, Washington, DC, USA, September 20-22 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Inuma, M., Otsuka, A., Imai, H. (2009). Theoretical Framework for Constructing Matching Algorithms in Biometric Authentication Systems. In: Tistarelli, M., Nixon, M.S. (eds) Advances in Biometrics. ICB 2009. Lecture Notes in Computer Science, vol 5558. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-01793-3_82
Download citation
DOI: https://doi.org/10.1007/978-3-642-01793-3_82
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-01792-6
Online ISBN: 978-3-642-01793-3
eBook Packages: Computer ScienceComputer Science (R0)