Secure biometrics.

Item

Title
Secure biometrics.
Identifier
AAI3303793
identifier
3303793
Creator
Gao, Qinghai.
Contributor
Adviser: Michael Anshel
Date
2008
Language
English
Publisher
City University of New York.
Subject
Computer Science
Abstract
Biometric systems attempt to solve a matching problem through live measurements of human body features. One main barrier that prevents the widespread application of biometrics is the concern about the security and privacy of biometric information. To address this concern biometrics needs to be protected with cryptography. However, the specific problems with biometrics, namely number limitation, non-secrecy, non-reproducibility and non-cancelability, make it a challenge to secure biometrics effectively with existing cryptographic algorithms, especially on how to match two biometric templates in encrypted or hashed formats.;Inspired by the Central Dogma of Biology, we in this thesis develop an Artificial Intronization Method (AIM) to approach the problems of biometrics.;AIM is a method of inserting introns into an exon sequence to obtain ciphertext. Three methods are proposed to introduce introns into plaintext: Pseudo Random Number Generator, Integer Sequence and Geometric Key. The main advantage in using AIM is to prevent error propagation. However, one disadvantage of AIM is that security may require a large Message Expansion Rate. Therefore, three methods are proposed to control message expansion: Intron Compression, Intron Removal, and Exon Elimination.;With AIM, the number limitation, non-secrecy and non-cancelability problems can be solved by applying different intronization keys and different symmetric-key based intron sets; in theory, AIM could achieve zero-error propagation---a solution to the non-reproducible problem.;We believe AIM can be an effective hashing mechanism for protecting fuzzy biometrics. Our testing results support this belief. With this finding, AIM can also be used as a preprocessing step for other cryptographic algorithms to enhance security.;AIM, due to the intentional suppression of the diffusion property in favor of zero-error propagation, is vulnerable to Known-plaintext Attack. Thus, it has its limitation as a stand-alone cipher.
Type
dissertation
Source
PQT Legacy CUNY.xlsx
degree
Ph.D.
Item sets
CUNY Legacy ETDs