SlideShare a Scribd company logo
1   Biometric Template Security




                    BIOMETRIC TEMPLATE SECURITY




                      University of Glamorgan: | Farhan Liaqat
University of Glamorgan




                                University of Glamorgan

                                  Prifysgol Morgannwg




                            Faculty of Advanced Technology




                           STATEMENT OF ORIGINALITY




This is to certify that, except where specific reference is made, the work described in
this project is the result of the investigation carried out by the student, and that neither
this project nor any part of it has been presented, or is currently being submitted in
candidature for any award other than in part for the M.Sc. award, Faculty of Advanced
Technology from the University of Glamorgan.




          Signed...........………………………………………………………...

                                         (Student)
                                                                                     Page | 2
University of Glamorgan

                                                               Table of Contents
ABSTRACT .......................................................................................................................................................... 6
CHAPTER 1.......................................................................................................................................................... 7
    INTRODUCTION .................................................................................................................................................. 7
      1. Introduction .......................................................................................................................................... 8
      Summary ....................................................................................................................................................... 9
CHAPTER 2........................................................................................................................................................ 10
    INTRODUCTION TO BIOMETRICS SYSTEM THREATS AND VULNERABILITIES ............................................... 10
      2.1   History of Biometrics Systems ....................................................................................................... 12
      2.2   Biometrics Traits ............................................................................................................................... 13
      2.2.1 Requirements for Biometrics Traits .................................................................................................... 13
      2.2.3 Comparison of Biometrics Trait and Technology ............................................................................. 16
      2.3   Biometrics User Authentication ....................................................................................................... 17
      2.4   A Standard Biometric System ........................................................................................................ 18
      2.5   Threats to Finger Print Biometric System .................................................................................... 21
      2.6   Threat Vectors ................................................................................................................................ 21
      2.7   Types of Attacks ............................................................................................................................. 22
      2.7.1 Physical Attacks ............................................................................................................................. 22
      2.7.2 Computer Based Attacks ................................................................................................................ 23
      2.7.3 Template Attacks ............................................................................................................................ 24
      Summary ..................................................................................................................................................... 25
CHAPTER 3........................................................................................................................................................ 26
    PREVIOUS WORK AND LIMITATIONS .............................................................................................................. 26
      3   Different Approaches ......................................................................................................................... 27
      Summary ..................................................................................................................................................... 28
CHAPTER 4........................................................................................................................................................ 29
    FINGERPRINT SENSOR AND IMAGE ................................................................................................................. 29
      4.1   Biometric Scanners ........................................................................................................................ 30
      4.1.1 Optical Sensors .............................................................................................................................. 31
      4.2   Fingerprint Image.......................................................................................................................... 32
      4.2.1 Resolution ...................................................................................................................................... 32
      4.2.2 Area ................................................................................................................................................ 32
      4.2.3 Number of Pixels ........................................................................................................................... 32
      4.2.4 Dynamic Range (or depth)............................................................................................................. 33
      4.2.5 Geometric Accuracy ....................................................................................................................... 33
      4.2.6 Image Quality ................................................................................................................................. 33
      4.3   Fingerprint Structure..................................................................................................................... 33
      4.4   Fingerprint image Security............................................................................................................ 34
      Summary ..................................................................................................................................................... 34
CHAPTER 5........................................................................................................................................................ 36
    DESIGN AND IMPLEMENTATION ...................................................................................................................... 36
      5. Device and Software............................................................................................................................ 37
      5.1.1 Computer ............................................................................................................................................ 37
      5.1.2 Fingerprint Reader ............................................................................................................................ 38
      5.1.3 Software Development Kit (SDK) ...................................................................................................... 38
      5.2. Griaule Software Development Kit (SDK)........................................................................................... 38
      5.3. Steganography...................................................................................................................................... 39
      5.3.1. What is Steganography Used for? .................................................................................................... 39
      5.3.2. Steganography and Biometric Fingerprint Image ........................................................................... 40
                                                                                                                                                          Page | 3
University of Glamorgan

        5.4. Steganography Using .Net Algorithms and Techniques ..................................................................... 40
        5.5. Generation of Steganography in .Net .................................................................................................. 40
        5.6. Fingerprint Image and Steganography ............................................................................................... 41
        5.6.2 Application Structure ......................................................................................................................... 41
        5.6.2 Application Process ............................................................................................................................ 41
        5.6.2.1 Enrolment Process .......................................................................................................................... 42
        5.6.2.2 Conversion of Image ....................................................................................................................... 42
        5.6.2.3 Steganography................................................................................................................................. 43
        5.6.2.4 Stego Library ................................................................................................................................... 44
        5.6.3 Decoding the Image ........................................................................................................................... 45
        5.6.4 Development Limitations ................................................................................................................... 46
        5.7 Fingerprint and Byte Stream ................................................................................................................ 46
        5.7.1 Application structure.......................................................................................................................... 46
        5.7.2 Application Process ............................................................................................................................ 47
        5.7.2.1 Enrolment Process .......................................................................................................................... 47
        5.7.2.2 Random Number Generation ......................................................................................................... 47
        5.7.2.3 Verification Process ........................................................................................................................ 48
        5.7.2.4 Template Attack and Verification ................................................................................................... 49
        5.7.2.5 Securing the Template .................................................................................................................... 50
        5.7.3 Application Limitations and Advantages .......................................................................................... 50
        Summary ..................................................................................................................................................... 51
CHAPTER 6........................................................................................................................................................ 52
   RESULTS AND CONCLUSION ............................................................................................................................ 52
APPENDIX A...................................................................................................................................................... 55
APPENDIX B ...................................................................................................................................................... 57
   REFERENCES .................................................................................................................................................... 57




                                                                                                                                                           Page | 4
University of Glamorgan

                                                                   Table of Figures

FIGURE 2 BIOMETRICS DEVICE MARKET 2003 ...................................................................................................... 11
FIGURE 1 FORECAST FOR BIOMETRICS MARKET 2003........................................................................................... 11
FIGURE 3 BRETILLON MEASUREMENT SYSTEM (YORK 2003) ............................................................................... 12
FIGURE 4 BRETILLON FINGERPRINT CARD (FIGURE 4) (YORK 2003) .................................................................... 13
FIGURE 5 DIFFERENT HUMAN TRAITS (FIGURE 5) .................................................................................................... 14
FIGURE 6 TABLE 1 BIOMETRICS TRAIT .................................................................................................................... 16
FIGURE 7 - TABLE 2 TRAITS COMPARISON ............................................................................................................... 16
FIGURE 8 AN EXAMPLE OF BIOMETRIC ATM MACHINE ........................................................................................... 18
FIGURE 9 BIOMETRIC SYSTEM COMPONENTS ........................................................................................................ 18
FIGURE 10 A SAMPLE FINGER PRINT INPUT .......................................................................................................... 19
FIGURE 11 POSSIBLE AREAS OF VULNERABILITIES BASED ON (N.K. RATHA 2001) .............................................. 21
FIGURE 12 OPTICAL SENSOR ................................................................................................................................. 31
FIGURE 13 FINGERPRINT TEMPLATE RESOLUTION ................................................................................................ 32
FIGURE 14 FINGERPRINT RIDGES ........................................................................................................................... 33
FIGURE 15 DELL INSPIRON .................................................................................................................................... 37
FIGURE 16 MICROSOFT FINGERPRINT READERS ................................................................................................... 38
FIGURE 17 ENROLMENT PROCESS ......................................................................................................................... 42
FIGURE 18 ENROLMENT PROCESS ......................................................................................................................... 42
FIGURE 19 IMAGE CONVERSION ............................................................................................................................ 43
FIGURE 20 CREATING STEGO FILE......................................................................................................................... 44
FIGURE 21 DECODING THE IMAGE ......................................................................................................................... 45
FIGURE 22 ENROLMENT PROCESS ......................................................................................................................... 47
FIGURE 23 RANDOM NUMBER ............................................................................................................................... 48
FIGURE 24 VERIFICATION PROCESS ....................................................................................................................... 49
FIGURE 25 ATTACK ............................................................................................................................................... 49
FIGURE 26 SECURING TEMPLATE .......................................................................................................................... 50
FIGURE 27 ALGORITHM ......................................................................................................................................... 56




                                                                                                                                                      Page | 5
University of Glamorgan

Abstract

Technology is becoming an essential part of human life as it increases the attention towards
security and privacy. A person logs into several systems in a day and every log, authenticates
or identifies him into the system. Biometrics provides a reliable and natural solution to verify
a user or to identify a person. The confidence to accept biometric will depend on the
guarantee from the designer that the application is robust with low error rates and security.
But as much biometric systems are authentic, the vulnerabilities remain present. This study
particularly aims towards template security, explaining how biometric systems thoroughly
enlighten the various threats and point of attacks, describing the structure of template and
how it is acquired. Leading toward the solution for the template attacks, the solution
suggested in this paper is robust and customizable providing backward compatibility based
on previous studies.




                                                                                        Page | 6
University of Glamorgan




C            hapter 1



                          Introduction




                                  Page | 7
University of Glamorgan

1. Introduction


There have been many events in the world, which directed attention towards security and
safety. Most of the attention to security is regarding passengers in airports. However, there is
one more type of threat which is not visible to a normal person. Hackers, who attack a system
use some techniques modify the information and then manipulate the system to compromise
with the security.

The growth of information technology has been explosive. Technology was never
mishandled in order to access other’s personal information, but now we can evidently see the
propagation of misusing technology in order to penetrate in to every human activity.
Computers have helped human being to explore new horizons in many areas of studies like
human genome, artificial intelligence and application which helped in enhancing human life.
From a small sales application to big financial solutions all information is secured on
database servers and can be accessed from anywhere. Computer systems, and their
interconnecting networks, are also prey to vandals, malicious egotists, terrorists, and an array
of individuals, groups, companies, and governments' intent on using them to further their
own ends, with total disregard for the effects on innocent victims. Apart from attacks on
computer networks externally there are methods of destruction which are unintentional.
Computer security can be defined as a state in which a person cannot compromise with a
system or cannot damage a system intentionally and it is free from external threats. The
purpose of information system security is to optimize the performance of an organization
with respect to the risks to which it is exposed. Security is not only important for Operating
Systems and Networks but we have to secure the physical access to the system as well.

This study begins with introduction to biometrics. Biometrics refers to identify a person
based on his physical or behavioural characteristics. Biometrics is adopted today in most of
the organizations from attendance of employees to border clearance. This study goes to the
greater depth from the origin of biometrics, history and modern technologies, explaining how
the physical and behavioural characteristics are categorised and the mechanism of typical
biometrics system in brief. Later, describing the threats on biometric system which is the core
part of this study. No doubt biometric is very strong and authentic to identify or verify a
person but still it is vulnerable. These threats have been explained in Second chapter.

The main emphasise of the study is on fingerprint biometrics system which has been
implemented vastly over the years. This is due to the fact that it is cheap, accurate and easy to
implement as compared to other biometric systems available in market. In order to spread
biometrics it is important to ensure security integrity of the product. Fingerprint is not only
being used in US or Europe It is also being implemented in south Asia and Middle East now.
Once a product is famous in market the vulnerability increases. Vulnerabilities are of
different nature with regards to biometrics.

Biometric threats are also interlinked with computers as well, because at a level the
information is stored on computer based databases. Hacker can attack the database and steal
the template that holds the important information. Hence, the template is the core part of the
biometric system. The third chapter is going to focus more on the work of other authors,
describing what they have implemented so far and will also highlight the limitations and

                                                                                         Page | 8
University of Glamorgan

weaknesses. This study is based on these hypothetical literature and concepts to secure
biometrics. The fourth chapter will keep main focus on the template, which will explain how
the template is acquired and which sensor is being used in this study. It will also explain the
mechanism of the sensor and how the image is acquired. Finally will cover, what are the
characteristics of a template. This information will help us to understand the weaknesses and
how to overcome the weakness of the computer based biometric vulnerabilities.

After carefully understanding the current biometrics system, and threats, this study provides a
solution based on combination of different technologies and previous research in chapter five.
This solution will provide more security to the biometrics system which is very necessary. As
biometric traits are the features of human being this cannot be replaced or altered.

Summary


This chapter explains about the structure of this paper. It begins explaining the origin and
reason why it is important to work on biometric template. Biometric template which is not
only the soul of the system but it can be used against the system. This study will prevent the
hackers or attackers to replace and modify the template. The solution proposed in this study is
not only efficient and robust but also cheap and easy to implement and provides a backward
compatibility as it is on software level. All topics are explained step by step helping to
understand the biometric system and solution for the threats.




                                                                                       Page | 9
University of Glamorgan




C            hapter 2



             Introduction to Biometrics System Threats and
                                             Vulnerabilities




                                                       Page | 10
University of Glamorgan

Currently, information is mainly secured by using password or some memorable information
from the end user. This type of authentication system is not secure because if someone can
retrieve a bit of information out of end user they can access their bank accounts and personal
computers. These weaknesses in standard validation systems can be avoided if we can use
human body for validation.

The word biometrics originated from the Greek language, Bio means life and Metron means
measures. Modern day technology companies are trying to embed biometrics system with in
hardware and gadgets.

Biometrics is being used almost and it has some befits e.g. reduced cost, easy and simple user
for end user, less need for system support and improved security for the business owners.
Now a day it is being used in many organizations and with many devices e.g. ATM’s,
Passport authentication, border controls, ID cards, Computer system user ID authentication,
Physical access control and fraud prevention.

With the passage of time government and organization are looking forward to improve and
implement biometrics systems for better security. Forecast growths in the market of
biometrics systems have showed a huge change since 1999.

   $2,500.00

   $2,000.00

   $1,500.00
                                                                      Millions of Dollar
   $1,000.00

    $500.00

      $0.00
               1999   2000   2001    2002   2003   2004     2005

                      Figure 1 Forecast for Biometrics Market 2003

There are many biometrics systems available in the market which I am going to discuss later
on but fingerprint scanning systems is amongst the leading ones. In 2001 it was half of the
market was claimed by the fingerprint scanning devices. According to Dan riley, vice
president of SecuGen “One of the main reasons was because fingerprint identification and
verification is a very old, tried-and-tested technology, with lots of confidence in the
technology and the ability to develop excellent-quality, low-cost solutions,” (Biometrics
2001).


                                                          Finger Scan

                                                          Voice Scan
                  10%
                               49%
                 15%                                      Signature Scan
                   12%
                                                          Iris Scan
                1%
               6%     3% 4%
                        Figure 2 Biometrics Device Market 2003

                                                                                           Page | 11
University of Glamorgan

The reason why finger print biometrics system are being used so widely all over the world is
because it is one of the earliest methods implemented to identify a person. Nevertheless, there
are still some organizations that do not adopt this mechanism as they think it is not very
authentic. Companies are trying to improve and evolve it which we are going to discuss later
on.

As we speak about the cost of biometrics devices fingerprint are once again the cheapest ones
which are available in market and can purchase from 60$ to 130$ in market from many
different vendors. Comparatively, iris scan is four to six time expensive than fingerprint
scanners. According to British National Physical Laboratory facial scan has become third
largest amount revenue in world. (Biometrics 2001)

2.1 History of Biometrics Systems


Biometrics has been previously related to forensics science. Modern day biometrics system is
more related to forensics than security purpose. According to CSI survey 15% out of 687
organizations are using biometrics system.

Early references to biometrics, as a method to identify a person were around thousand year
back. East Asian potters use to place their finger print on products as a brand identity. In
ancient Egypt trusted traders were identified based on certain characteristics such as height,
eye colour and complexion. (JD.JR., Biometrics Background 2000)

Biometrics was not very famous as field in late 18th Century when to police clerks from Paris
found a solution that taking measurement of different body parts of adult can identify the
convicted criminals as the body parts of adult don’t change overtime and can be used to
identify later on. (Record 2002)

The Bretillon system, also known as bretillonage and anthropometry has been widely
accepted. It is used around the world for decades depict a series of Bretillon measurements as
they were used in USA at the beginning of 20th century. The measurements included the
width and length of the head and of the right ear, the breadth of the outstretched arms, the
length of the left foot, the left form arm and the left little finger as well as the body and trunk
heights. (Canton 2203)




                     Figure 3 Bretillon Measurement System (York 2003)

                                                                                          Page | 12
University of Glamorgan

An abrupt end to the use of anthropometrics was caused by an incident in 1903, when two
identical twins, that in later investigation were discovered to be separated at birth, were
registered at the united state penitentiary at Leavenworth, Kansas with measurement as close
enough to identify as one person. They looked exactly the same so the identification was only
possible only using fingerprints. (Canton 2203)




                   Figure 4 Bretillon Fingerprint Card (Figure 4) (York 2003)

In 1891 the inspector general of Bengal police, Sir Edward Henry, got interested in the work
of Sir Francis Galton and others considering fingerprints as a mean of identification. In 1896
an order was issued by Henry, which in addition to Bretillon finger prints should be taken
from every prisoner. With the help of his assistant he was able to make classification system
allowing thousand of fingerprints to be easily filled, searched and traced. Henry was assigned
as Assistant Commissioner of Scotland Yard in 1901 where the first finger print bureau was
established in the same year. After the failure of anthropometry in 1903, the Henry
fingerprint system quickly gained worldwide acceptance as the means of identifying
criminals. It is still used in much the same way today (Record 2002).

Automated means of human recognition first appeared as an application for physical access
in the early 1970s. One of the first commercially available biometrics system was a finger
measurement device called identimat, which was installed n 1972 to serve a wall street
company, Shearson Hamil, as a time keeping and monitoring application. (JD.JR., N.M and
P.T, Biometrics Identity Assurance in The Information Age 2003)

2.2 Biometrics Traits

There have been many human characteristics used to identify human for biometrics application. To
categorize human characteristics some question come in mind, what are the requirements? Are there
any general identifiers? What are the technologies can they meet the general requirements? This
section is going to cover the answers to these questions.

2.2.1   Requirements for Biometrics Traits

There are some general requirements which should meet to qualify with a Biometric system.

    •   Universality:     Every Human Has.
    •   Uniqueness :      This Means That Trait Should Be Different From Person to Person
    •   Permanente :      The Trait Should Not Change With Time
    •   Collectability:   The Trait Can Be Measured
                                                                                        Page | 13
University of Glamorgan


According to (A.K., S and S 1999) there are some more factors which should be considered for
categorizing traits.
    • Performance: To achieve the best possible identification environmental factors should be
        consider with the combination of minimum cost.
    • Acceptability: Future user should accept the system.
    • Circumvention Resistance: It should be difficult to fool with the system.
    • Cost Effectiveness: Maintenance and installation should be in reasonable cost.

We cannot find all the characteristics or requirements in a single biometrics device but each
system or device has its own strength and qualities.

2.2.2   Classification of Biometrics Traits

According to the National Institute of Standards (2003) Biometrics system is divided into two
categories of biological measurements.

   •    Physiological Characteristics
   •    Behavioral Characteristics




                           Figure 5 Different Human Traits (Figure 5)
   i.      Physiological Characteristics

These traits are obtained from the human anatomy e.g. DNA, Fingerprint, and Face, Iris or the
retina. Data is generated by the analysis and the measurement of structure of the human body
parts.

It is important to understand that physiological traits are not necessarily genetically determined;
therefore, a differentiation between genotype and phenotype features must be made. (Daugman
1999)

   •    Genotype

        There are about 1% people in world, that have similar genetic code or in other words we
        can say they are monozygotic twins. An example which we have discussed of west
                                                                                          Page | 14
University of Glamorgan

         brothers, in genetics monozygotic twins share all their characteristics like blood group,
         DNA structure and gender etc.

   •     Phenotype

         These are the features which are unique unlike to genotypic features. In the west brothers
         for example finger prints were use to identify them. Fingerprints and iris are one of the
         examples of phenotypic characteristics.

Some features can expose both genotype and phenotype factors of a human like face which
changes throughout the age, but still identical twins can look similar in any stage of age.

   ii.      Behavioral Characteristic

Today if we want to open a bank account in the UK, they require our signatures on a device and
later on if you want to make a query regarding your account they match your signature with the
stored information on the computer. Human has some behaviors which are unique from person to
person. According to International Biometrics Group “Behavioural characteristics are based on
an action taken by a person. (Group 2003) Behavioural biometrics, in turn, is based on
measurements and data derived from an action, and indirectly measure characteristics of the
human body. Voice recognition, keystroke-scan, and signature-scan are leading behavioural
biometric technologies. One of the defining characteristics of a behavioural biometric is the
incorporation of time as a metric – the measured behaviour has a beginning, middle and
end.” (Group 2003)

Humans, learn their behaviour or are trained hence it can be changed. By the passage of time
with the growth of age prominent changes also occur in the behaviour of human so it
becomes more difficult to achieve them. (JD.JR., N.M and P.T, Biometrics Identity
Assurance in The Information Age 2003) Still behavioural characteristics can be used as
biometrics traits even if they are not permanent. Below in the given table you can see the
categorization of biometrics traits in groups. There are some traits which are not used widely
in the table e.g. Blood Chemistry and body odour. But we are going to study commonly used
traits in detail.

                     Category                                   Biometrics Trait
   Hands                                           Fingerprints
                                                   Palm Prints
                                                   Hand Geometry
                                                   Hand, Palm and Wrist Vein Patterns
                                                   Spectroscopy Skin Analysis
                                                   Nail bed Scanning
   Head and Face
                                                   Face Recognition
                                                   Iris
                                                   Retina
                                                   Ear Shape and Size
   Other Physical Characters
                                                   Body Salinity
                                                   Blood Chemistry
                                                   Body Odor
                                                                                          Page | 15
University of Glamorgan

                                                    DNA
                                                    3D Thermal Imaging
                                                    Neural Wave Analysis
   Behavioral Characteristics
                                                   Gait Pattern
                                                   Voice Recognition
                                                   Signature Recognition
                                                   Keystroke Dynamics
                                      Figure 6 Table 1 Biometrics Trait


2.2.3     Comparison of Biometrics Trait and Technology

To get a better understanding of why some technologies are more preffered and are being used
widely in market, we have to create a table based on analysis and perception of (A.K, R and S,
BIOMETRIC- Personal Identification in Network Society 1999) and (Corporation 2002).



                                                            Perform




                                                                                            effective
                                                                       Accepta
                                         Perman
                      Univers




                                                                                 resistan
                                                                                 Circum
                                                                                 vention
                                Unique




                                                  Collect
                                                  ability




                                                                                              Cost-
                                                                        bility
                                                             ance
                                          ence
                       ality


                                 ness




                                                                                              ness
   Characteristics

   Finger Print       Med        Hi       Hi       Med       Hi       Med         Med        Med

   Hand Geo.          Med       Med      Med        Hi      Med       Med         Med        Med

   Retina              Hi        Hi      Med       Low       Hi       Low          Hi        Low

   Iris                Hi        Hi       Hi       Med       Hi       Low          Hi        Low

   Face                Hi       Low      Med        Hi      Low        Hi         Low        Med

   Vascular Pat.      Med       Med      Med       Med      Med       Med          Hi        Med

   DNA                 Hi        Hi       Hi       Low       Hi       Low         Low        Low

   Ear Shape          Med       Med       Hi       Med      Med        Hi         Med          ?

   Body Odor           Hi        Hi       Hi       Low      Low       Med         Low          ?

   Facial Thermo.      Hi        Hi      Low        Hi      Med        Hi          Hi        Med

   Voice              Med       Low      Low       Med      Low        Hi         Low         Hi

   Signature          Low       Low      Low        Hi      Low        Hi         Low        Med

   Keystroke          Low       Low      Low       Med      Low       Med         Med         Hi

   Gait Pattern       Med       Low      Low        Hi      Low        Hi         Med          ?



                                Figure 7 - Table 2 Traits Comparison
In the table we can see that the comparison is based on available technologies based on available
basic eight requirements. They have been compared using “Hi”, “Med” and “Low”. Question
                                                                                               Page | 16
University of Glamorgan

mark indicates that the data is not available. Cost effectiveness of biometrics system has not been
calculated yet of some technologies.
From the above chart we can conclude many results as explained below.
   •   Behavioral biometrics performance is not as good as we compare it to physiological.
   •   Permanent traits are DNA, Iris, Retina Body odor and Fingerprint.
   •   DNA and Facial Thermograph shows better performance in the chart, Body Odor shows
       that it is unique permanent and universal. Iris and DNA can make a very strong biometric.
       But some technologies still need improvement like Body Odor.
   •   Biometrics system like DNA and Iris are expensive comparatively Fingerprint and Hand
       Geometry are cheaper.
   •   Acceptability is higher when information or data is gathered without the information of
       end user e.g. Facial Thermograph and ear shape recognition. User mostly likes to provide
       identity which they are familiar with like voice recognition and signature dynamics.

2.3 Biometrics User Authentication

In early days to identify a person some sort of physical information used to be stored. This
information was in several formats e.g. Picture, Physical measurements, Fingerprint or a picture.
Modern days same methods are used in a different way, these information are kept into a database
and then cross matched to verify a person.

But sometimes due to injuries or accident we cannot authorize a person. In one case a person had
his burnt his finger accidentally hence the prints were damaged so when he tried to scan his finger
from the device it was not allowing him to do so.

People, have the tendency to leave their information where ever they go e.g. latent finger prints on
surfaces, recorded voice print and video recording of face can generate bogus authentications.
Secondly a trained attacker can intercept the information stored in the database and replace them
with the fake one. Therefore, accurate information is only possible if the system can ensure that
the information stored in the system is of the live people. (JD.JR., N.M and P.T, Biometrics
Identity Assurance in The Information Age 2003)

Even though biometric technologies are far from being an authentication panacea, they represent a
very promising method, especially when combined with other authentication techniques. (A.K, R
and S, BIOMETRIC- Personal Identification in Network Society 1999)

Again, it has been demonstrated that every system created by human is defeated by human. In
terms of authentication techniques, all factors suffer from fundamental weaknesses. (JD.JR., N.M
and P.T, Biometrics Identity Assurance in The Information Age 2003)

Every authentication system can be cracked e.g. Information like password and pins can be
hacked. Properties like cards can be stolen and biometric information can be swapped by
someone.

Some systems accept two types of authentication token based a knowledge based. For instance,
when we need to make a transaction from the ATM, we have to swipe in the card then enter the
pin. In 1999 25% people write down their pins on the card and due to these companies had to face
hug loss. (Anil K. Jain 1999)

Now suppose we replace the pin with biometrics authentication. Let’s take Iris scan, as a personal
identifier some companies already tried to use it as a replacement of PINs.
                                                                                           Page | 17
University of Glamorgan




                       Figure 8 An Example of Biometric ATM Machine
There might be some complications like position problem of user but if it is implements it will be
far stronger then PINs.

2.4 A Standard Biometric System

Apart from the technologies, whether it is an iris, finger print or DNA all biometric devices
follow almost similar mechanism I m going to explain it in detail below. A biometrics system
is based on five basic subsystem according to (Jhon D. 2003) and (J.L. Wayman n.d.) For i.e.
acquisition, transmission, signal processing, data storage and decision policy.


        Data                                 Signal                            Decision Policy
                                                               Matching
                                                               Review


                                             Pattern
        Biometric
                                            matching                                Match
                                                                                     ?
                                                               Quality Score




     Presentation                            Quality
                                             Control
                                                                                    Accept
                                                                                      ?

        Sensor                              Extraction


    Sample                               Sample             Template               Yes/No

                        Transmission                                           Data Storage


      Compression                                                                Templates
                                            Expansion
                                                              Sample
`                         Transmission                                             Images
                            Channel


                 Based on (John D. Woodward 2003; J.L. Wayman August 2002)

                          Figure 9 Biometric System Components

                                                                                                 Page | 18
University of Glamorgan

   i.        Data Acquisition

(James Wayman 2004) States that biometric data flow begins with the collection of
physiological and behavioural characteristics and every biometric system is based on two
assumptions.

   •      Uniqueness: Biometric trait is distinctive among all human beings.
   •      Repeatability: Measurements can be repeated over time




                               Figure 10 A Sample Finger Print Input
A sensor is used to measure characteristic of an individual. For each system biometric system
is standardize so if information is collected from one system can be matched on other systems
as well. The information captured by the sensor is stored into database as a template. Every
template has its own attributes depending on what type of trait is being used or read by the
sensor.

   ii.       Transmission

The captured template is stored in a standard format e.g. image acquired by the sensor is
saved as JPEG (Join Photographic Expert Group) facial images, WSQ (Wavelet/Scalar
Quantization) for fingerprint and CELP (Code Excited Linear Predication) is used for voice
data. This information is then transmitted to data processing so it can be saved in the
database. Sometimes the sensor is located somewhere else and data processing is somewhere
else. During the transmission of the data compression is done to save the bandwidth. Due to
compression the quality can be poor. Developments in technologies are introducing new
methods of compression so loss can be reduced.

   iii.      Signal Processing

As described in Figure 10, signal processing is performed in three steps, initially it is a
mechanism in which the template is created from the information that is received from the
sensor.

   •      Feature Extraction
   •      Quality Control
   •      Pattern Matching

     iv.    Feature Extraction
It is a mechanism in which the biometrics system extracts the required information out of the
trait from a particular biometric device. In this scenario, it is an iris scanner which willbe
                                                                                     Page | 19
University of Glamorgan

observe how the feature extraction works with it. This task is performed by localizing the iris,
pupil and both eyelid boundaries, excluding pupil and eyelashes from the photo and creating
an iris mapping that are invariant to size, distance, magnification and pupil dilation. After that
an iris code is generated(Daugman 1999) we will discuss it later.

   v.      Quality Control

After the feature extraction a quality check is performed which calculates the score output. If
the received signal from the device is insufficient and there is some incomplete information.
For e.g. If there is some dust on the sensor or some metal is on the sensor, automatically a
request is sent back to the user for rescan. There have been many major updates in quality
checking in biometrics system in past few years.

   vi.     Pattern Matching

After the extraction and quality check pattern matching is performed, if there is a mismatch
with the data, the enrolments takes place. This is the process in which new user enrols
himself and the information is stored in the data base along some external information passed
by the system owner or administrator.

There are two types of enrolments further in one case if user claims about an identity then the
match is 1:1 otherwise system has to perform a 1: N match. In which the pattern is matched
with all the available templates in database. As a result of matching the decision policy
system checks the score which is a measurement of similarity between the database templates
and the one extracted from the device.

   vii.    Data Storage

After signal processing these templates are stored to a database management system so when
a user enrol system can make a comparison, Databases for biometrics systems varies from
systems to systems depending on the nature of application.

For systems which are based on 1:1 matching. Templates are stored on something which can
be in possession of an individual e.g. magnetic strip cards or smart cards. When someone
tries to identify them the system asks for a token and then verifies the image with the
template on the card. The database is used in such cases as well.

In 1: N matching systems a centralized database is designed. These kinds of systems perform
better and also the occurrence of faults and errors can be vastly reduced. These databases are
divided then into smaller partitions. In this way the templates are matched with corresponding
information in the database instead of whole database.

   viii.   Decision Policy

This subsystem determines the results of the match whether they are right or wrong. These
results are based on quality score and matching score received from the signal process. For
some systems, it can be very simple but for alternatives it can be sophisticated e.g. a simple
system might have a matching score and if a signal generates the highest score it is matched.

                                                                                         Page | 20
University of Glamorgan

In a sophisticated system there can be many factors i.e. time variant threshold, user dependant
and high score.

2.5 Threats to Finger Print Biometric System

When a hacker attacks a typical system it is difficult from a biometric security system. In
Denial of Service Attack and attacker corrupts the authentication so the users cannot use it.
Hacker bombards so many bogus access requests on biometric system, an online
authentication server that processes access request to a point where the server’s resources
cannot handle any more queries. In circumvention, an attacker gains access of the system by
destroying the authentication application. This threat can lead us to the modification of data
or access to the information which is not allowed to access by external users. (Maltoni 2005)

In contamination attacker copies the biometric information of a user e.g. a fingerprint from
the surface and use that print to access biometric security system or access the information. In
repudiation attacker denies that he accessed the system and can argue that False Accept Rate
phenomenon associated with biometric system might caused the problem. In collusion
legitimate user with wide privilege to the system is that attacker (System Administrator)
(Maltoni 2005).

2.6 Threat Vectors

Understanding how biometrics is categorized based upon the physical properties. Similarly
biometrics attacks are performed on the system at different levels, some of these attacks are
on physical level and with the personal contact with biometric system e.g. bogus biometric
attack is a type of physical attack in which attacker uses latent fingerprint and use it on the
system to compromise with security. After compromising the security it can manipulate the
system steal personal information of a person and let access to unauthorized people to a
certain area. This section will explain how many types of attacks can be performed on which
stage during a biometric process which has been explained above in detail.

We have discussed some types of attack above; according to (N.K. Ratha 2001) there are
about eight types of attacks which can be performed on a typical biometric system. These
possible attacks areas are called threat vectors.

                      1               Sensor      `

                      2
                                                          7                6
                      3          Feature Extraction

                      4

                      5             Matcher                        Template Database

                      8

                                    Decision

         Figure 11 Possible Areas of Vulnerabilities Based on (N.K. Ratha 2001)

                                                                                       Page | 21
University of Glamorgan

Computer systems have been the target of attacks from a variety of sources almost since they
were first used. Early examples of exploitation were generally related to fraud. In more recent
times, hackers, organised crime and a variety of other cyber-criminals have attacked
computer systems. Information systems also have to deal with viruses, worms and Trojans
seeking to disrupt systems or steal data. Again, this is not unique to biometric systems and
there are now well-established standards, frameworks, policies and process as well as
legislative support, for the protection of information systems. The most important factors are
proper systems and security design and proper implementation and on-going management,
rather than the use of biometrics per se. (Roberts November 2005)

The first threat to biometrics technology was recognized by several authors (D, et al. 2003)
(A.K., S and S 1999) (G.L and F 2003). When an authentication is used on large scale, the
reference database has to be made available to many different verifiers, who in general,
cannot be trusted. Especially in a network environment, attacks on database pose a serious
threat. It was shown explicitly by Matsumoto et al (G.L. and F 2003). that using information
stolen from database, artificial biometrics can be constructed to impersonate people.
Construction of artificial biometrics is possible if only a part of the template is available. Hill
(A, A.K and J 2003) showed that if only a minute template of a fingerprint is available, it is
possible to successfully construct artificial biometrics that pass authentication.

The second threat was addressed by Schneier (S and A.K 2002). The problem is concisely
paraphrased by: “Theft of biometrics is theft of identity.”

The threat is caused by the fact that biometrics contains sensitive personal information. It is
shown by the author (A.K, R and S, BIOMETRIC- Personal Identification in Network
Society 1999) (T and F n.d.) (X and L 2003) That a fingerprint contains certain genetic
information.

2.7 Types of Attacks

Schneier (B 1999) compares traditional security systems with biometric systems. The lack of
secrecy (e.g. leaving fingerprint impression on the surface we touch), and non replace ability
(e.g., once the biometric data is compromised, there is no way to return to a secure situation,
unlike replacing a key or password) are identified as the main problems of biometric systems.

(D, et al. 2003) Describe the typical threats, for genetic authentication application, which may
result in quite different effects for traditional and biometrics-based systems. In Denial of
Service (DoS), an attacker corrupts the authentication system so that legitimate users cannot
use it, for a biometric authentication server that processes access request (via retrieving
template from a database and performing matching with the transferred biometric data).
Biometrics attacks have been categorized in three sections according to their nature as below.

2.7.1   Physical Attacks

These attacks are mainly on the biometric devices sensor or biometric readers. Most of these
attacks have been performed on fingerprint biometric system.




                                                                                          Page | 22
University of Glamorgan

       i.       False Enrolment

The accurate data of legitimate user is enrolled, if it is fake then data will be accurate but it
will be matched incorrectly. For example a passport application once registered the system
data will identify it and give privileges to the system

       ii.      Bogus Physical Biometrics

We have numerously seen in the movies, when someone tries to access a security area
breaking a biometric system. Person uses a fingerprint left from some surface. This vector is
most prominent one from all. This attack is performed without any technical knowledge it is
very cheap and easy in modern days when we have digital cameras. These attacks are made
only on iris, palm and fingerprint biometrics systems.

•      Bogus Digital Biometrics

       When we talk about biometrics attacks, masquerade attacks are on the top of list. They
       are fake digital patterns which are used to break biometrics systems. Second ones are
       reference attacks in which attacker gathers technical information of a biometrics system
       and has digital copies of the templates to replace them from the database or during the
       enrolment.
•      Latent Print Reactivation

       Human sweats glands produce oil which sweats from hands. When someone touches
       surface marks of print are left on it. These prints can be copied and used on biometrics
       devices. These types of attacks are done on finger and palm print reader.

2.7.2        Computer Based Attacks

In this type of attack mainly the target is computer system i.e. server, databases or networks
connected with the system.

i.           Override Feature Extraction

In this type of attack hackers interfere with the feature extraction process, this attack is also
used to disable a system or for DoS. It is usually conducted on hardware or software
firmware.

ii.          System Parameters

In such kind of attacks system parameters are changed. If someone changes the percentage or
score of FAR (False Acceptance Rate) that will result that poor quality data can be verified.

iii.         Match override

In these types of attacks, matching decisions are changed or ignored. Parameters are changed
by authorised person only or the hacker should have access to the system.

iv.          Decision Override

This is also called a bypass attack which ignores all the process. In this type of attack the
                                                                                        Page | 23
University of Glamorgan

decision is changed data is injected the decision. In this type of attack some physical
tempering may be involve.

v.          Modification of Rights

If someone gets unauthorised access to system administration accounts and creates a user
with admin privileges. This can cause a DoS attack.

vi.         Systems Interconnections

If two systems are interconnected it is possible to get two types of threats, one is from the
external system which is interconnected with biometrics system and second one is the
network which is connecting the two systems. Usually these kinds of threats are handling by
the people administrating biometrics systems.

vii.        System Weaknesses

Weaknesses and Flaws in the design of a system may create some vulnerability. Some time
organizations use customization and integrate their Biometrics security system with the
secondary system. These weaknesses maybe occur in

•      Operating Systems i.e. Server or clients
•      Storage Management i.e. Operating Systems
•      Biometrics Software
•      Database
•      Sensors
•      System Configurations

These problems are noticeable in other technologies as well as biometric systems but we have
to accept these as weaknesses which may lead hacker to compromise with the system.

viii.       Denial of Service Attack

DoS are the worst vector threat. They vary in different types of attack from power loss to
system attacks design to corrupt biometrics security systems. Changes in the environmental
condition dust or light can change the quality of biometrics sensor reading. Adding electrical
or radio frequency can corrupt the data e.g. spilling liquid on sensor or introducing portable
light to the sensor. DoS attacks are usually noisy and they can be noticed easily.

2.7.3       Template Attacks

These attacks are mainly on templates and are usually on databases. The nature of these
attacks is modification of template and then attacker compromise with the system.

       i.      Reuse of Residual

In some biometric systems templates are stored in temporary memory after extraction. If
hacker gains access to the memory, they can copy the information and use it next time.




                                                                                     Page | 24
University of Glamorgan

   ii.       Data Injection

This type of attack both the system and stored data are compromised. If attackers gains access
to the system, it would be easier to manipulate data in the database as it is not encrypted. For
these types of attack system and template knowledge is essential.

   iii.      Template Modification

Templates are stored on different media (Cards, Tokens or Biometrics Devices). In this type
of attack hacker modifies or adds information to the storage media. In this type of scenario
information is added and then unauthorised access is allowed by providing a false ID.

   iv.       False Data Injection

This type of attack takes places in three steps. The attack can also be placed in the category
of man in middle attack. First the data is intercepted when sensor transfers the information to
processing system. Mostly this is don’t on physical level e.g. data is stored on a card or RFID
and it is unencrypted first. Secondly, the data is modified and then finally the signal is
replayed. Encryption of the data increases the complication of the data and also is used as a
defence strategy.

   v.        Synthesised Feature Vector

Hill Climbing is a technique which is mentioned in various articles on biometric security.
According to (Anil K. Jain 2005) in this technique false biometrics information is injected
into the system but every time the changes into templates are made which can increase the
matching score. In this technique access to system match score and communication channels
is necessary.(Anil K. Jain 2005)

Templates attack is different from above mentioned two attacks as they can be secured by
several security measures. If a template is copied once system can compromise to some
extent which can grant access to attacker to any level. This paper will mainly focus on
template attacks.

Summary
This chapter explains traits, mechanism of biometric system and threats to biometric systems.
Biometrics is divided based or different properties called biometric traits, which are
categorized under physical and behavioural traits. Mechanism of biometric system has been
explained in depth from the acquisition of biometric trait to storage in database and
verification of a user. By understanding in detail a typical biometric system threats can be
outlined. These threats are further segmented based on their nature.

   •      Physical
   •      Computer Based
   •      Templates Attack

Templates attacks are most dangerous attack in biometric system. As if a template is acquired
and attacker can compromise with the system then nothing can be done on physical and
computer based security.
                                                                                       Page | 25
University of Glamorgan




C           hapter 3



                          Previous Work and Limitations




                                                  Page | 26
University of Glamorgan

3   Different Approaches


Analysing the above mentioned attacks, an attacker can clandestinely obtain biometric data of
legitimate users e.g. lifting a latent fingerprint and constructing a three-dimensional mould
and use to access system. Further the biometric data associated with specific application can
be used to another unintended application e.g. it can be used to retrieve medical records.
Cross application usage of biometric can be more often as many organizations prefer
biometric applications. (D, et al. 2003)

The problem may arise from the above mentioned attacks on biometrics systems are raising
concerns as more and more biometrics systems are being deployed both commercially and in
government applications. (Enhanced Border Security and Visa Entry Reform 2002) This is
along with the increase in the size of the population using these systems and the expanding
application areas i.e. visa, border control, health care, e-commerce etc. may lead to privacy
and security related breaches.

As I have discussed several types on attacks on biometric system. There are some attacks
mentioned above which are mainly related to biometric templates. The template is the core of
a biometric system. In this paper I am going to propose a system which will reduce the threats
to template modification or bogus attack on a fingerprint biometric system.

Several work has been done on biometric template security, but not been implemented
practically in any biometric technology. In order to prevent hill climbing attack Southar (C
n.d.) has suggested the use of coarsely quantized match scores by the matcher. However
Adler (A. A May 2004), demonstrated that it is still possible to estimate the unknown
enrolled image although the number of iterations required to converge is significantly higher
now.

Yeung and Pankanti (M and S 1999) describe an invisible fragile watermarking technique to
detect regions in a fingerprint image that has been tampered by the attacker. In the proposed
scheme the chaotic mixing procedure is employed to transform visually perceptible
watermark to a random-looking textured image in order to make it resilient against attacks.
This mixed image is then embedded in fingerprint image. The author shows that the presence
of the watermark does not affect the feature extraction process. The use of watermark also
imparts copyright capability to identifying the origin of the raw fingerprint image.

IBM is one of the leading vendors in biometrics industry. Many of IBM products have built
in fingerprint sensors i.e. laptops. IBM suggested that if the techniques presented here for
transforming biometric signals differ from simple compression using signal or image
processing techniques. While compression of the signal causes it to lose some of its spatial
domain characteristics, it strives to preserve the overall geometry. (N.K., J.H. and R.M. 2001)
That is, two points in a biometric signal before compression are likely to remain at
comparable distance when decompressed. This is usually not the case with our distortion
transforms. Our technique also differs from encryption. The purpose of encryption is to allow
a legitimate party to regenerate the original signal. In contrast, distortion transforms
permanently obscure the signal in a noninvertible manner (N.K., J.H. and R.M. 2001).

                                                                                      Page | 27
University of Glamorgan

Ferri (L, et al. 2002) proposed an algorithm to embed dynamic signature features into face
image present on ID cards. These features are transformed into a binary stream after
compression (used in order to decrease the amount of payload data). A computer generated
hologram converts this stream into the data that is finally embedded into blue channel of the
image. During verification the signature features hidden in the face image are recovered and
compared against the signature obtained on-line, Ferri (L, et al. 2002) report that any
modification of the face image can be detected, thereby disallowing the use of fake ID cards.

On the other hand Jain and Uludag suggest the use of steganography principles to hid
biometric data in host image. This is particularly useful in distributed systems where raw
biometric data may have to be transmitted over a non secure communication channel.
Embedding biometric data in an innocuous host image prevents an eavesdropper from
accessing sensitive template information. The author also discusses novel application where
in the facial features of a user are embedded in a host fingerprint image. In this scenario, the
watermarked fingerprint image of a person may be stored in a smart card issued to that person
at an access control site. The fingerprint of the person possessing the card will first be
compared with the fingerprint present in the smart card. The eight coefficients hidden in the
fingerprint image can then be used to reconstruct the user face thereby serving as a second
source of authentication (A.K and U, Hiding Biometric Data 2003).

Pros and Cons

In summary, their published work attempts to deal with the biometric template security issue.
Some of them address how to handle biometric based key schemes. The most promising
approaches tolerate the variations in biometric solutions, but few of them are practically
feasible for biometric template as the rate of matching biometric template decrease with the
variations.

This paper will work on the purposed solution provided by Jain and Uludag mentioned.
Steganography can be used to hide encryption inside the template. Steganography will be
discussed in detail in chapter five. This paper will introduce an application which will use
steganography with fingerprint biometric template on software template. This is easy and
robust also it can be used with previous hardware.

Summary
Security has been concern since long time and people have been working on it. Similarly
goes with biometrics. Authors directed our attentions to different threats and provided
possible solutions over the years. Some of the solutions were implemented practically but
results were not desired. Improvements have been made in such areas specifically talking
about fingerprint biometrics watermarking and steganography helped a lot in encryption of
biometrics.




                                                                                       Page | 28
University of Glamorgan




C           hapter 4



                          Fingerprint Sensor and Image




                                                 Page | 29
University of Glamorgan

Modern day organizations are developing their own solutions for business purpose. These
businesses are running on internet and millions of users are logging into the website
purchasing products and spending money over the internet through credit cards. There is no
proper authentication system available for end user over the web apart for traditional security
asking for memorable question or security pin etc. In this section I am going to explain and
design a solution for modern business, which can be implemented easily and integrated with
any software and hardware of fingerprint biometric system, also providing more
authentication and security to the product.

Indeed, a growing number of financial services firms’ are strongly considering the use of
biometrics technology, sooner rather than later, because of heightened security concerns
sparked by the Sept. 11 terrorist attacks and skyrocketing fraud rates. Biometric identification
systems use individuals' unique physical or behavioural characteristics, such as fingerprints
or voice patterns, to identify them. (Mearian n.d.)

According to Meridien Research Inc. in Newton, Mass., consumer fears and losses due to
fraud are a strong enough incentive for institutions to invest large sums of money in
biometrics. And with 500,000 cases of identity theft in the U.S. each year, consumers are
ready to accept biometrics at the cost of increased privacy and more intrusive methods of
identification, according to a recent report by Meridien. (Mearian n.d.)

Many software vendor organizations are providing solutions for e business to protect identity
theft. These solutions are software based totally and any fingerprint hardware can integrate
with them. These software integrations are quite simple and flexible. Companies can use
biometrics system in any department and for any purpose. Similarly this biometric software
can be use over the internet. Suppose a customer needs to get online and purchase a product
from a web site. At the time of payment when the verification is required customer is using a
biometric verification by using fingerprint scanner, instead of providing information related
to its bank account. This can prevent the attacker from getting information of the user and
reduce the risk to identity theft. This type of solution is not expensive as now a day’s many
hardware vendors are providing built in fingerprint sensors.

The question which arise here is that how much secure is this type of solution over internet,
considering the above mentioned attacks on a biometric system in chapter two. An attacker
can perform a DOS attack on the system or decision override. Also can inject new template
into the system and make changes to the template information inside database. First of all the
main threat is to be point out. As mentioned above mostly attacks are done on templates and
five types of template attacks are available.

4.1 Biometric Scanners

Before continuing further, a question arises that what is this fingerprint template which has
been stated so many times. Most of the personal recognition systems do not store fingerprint
image itself but store only numeric data after extracting the feature from the image.
Sometimes it may be important to save the acquired image into the database.

The first fingerprint scanner was introduced about thirty years back. Before that ink technique
was used this is still being used by law and enforcement agencies. AFIS has created a
database over the years which contains both fingerprint images acquired offline and live scan
scanners. (D, et al. 2003)
                                                                                       Page | 30
University of Glamorgan

The offline fingerprint is usually taken by spreading black ink on the finger and then the
impression is taken on a paper. This impression is later on converted into digital format with
the resolution of 500 dpi. (D, et al. 2003)

For live scan fingerprint scanners are used. Most important part of the scanner is sensor.
There are three types of fingerprint sensors are available in the market. Optical solid state and
ultrasound (D, et al. 2003) in this paper optical sensor will be discussed only.

4.1.1   Optical Sensors

In this paper more emphasis will be on optical sensor as it will be used further. A simple
optical sensor is based on three components

   1. Prism
   2. Light
   3. CCD or CMOS




                                  Figure 12 Optical Sensor
This is the oldest and most live fingerprint scanning technique used today. The finger touches
the top side of the glass prism, but when the ridges touch the surface the valleys remains on a
certain distance as shown in the image. Light is illuminated from the left side from light
emitting diodes. The light is then reflected randomly from the prism and focused through a
lens on CCD or CMOS. (D, et al. 2003)

When the finger is very dry, it does not make a uniform contact with the sensor surface. To
improve the formation of fingerprints from dry fingers, whose ridges do not contain sweat
particles, some scanner producers use silicon coating, which favours the contact of the skin
with the prism. With the aim of reducing the cost of optical devices plastic is nowadays often
used instead of glass for prism and lenses, and CMOS cameras are mounted instead of more
expensive CCDs. (D, et al. 2003)



                                                                                        Page | 31
University of Glamorgan

4.2 Fingerprint Image

After the impression is taken from the sensor, it is then converted into image file which is in
most of the cases is in .Jpeg format. There are some parameters for the characterisation of
fingerprint image which is as following.

4.2.1   Resolution

This indicates the number of dots or pixels per inch (dpi). 500 dpi is the minimum resolution
standard for FBI-complaint scanners and is met by many commercial devices. 250 to 300 dpi
is probably the minimum resolution that allows the extraction algorithms to locate the
minutiae in fingerprint patterns. Minutiae play a primary role in fingerprint matching, since
most of the algorithms rely on the coincidence of minutiae to declare whether the two
fingerprint impressions are of the same finger. (D, et al. 2003)




                          Figure 13 Fingerprint Template Resolution
In Figure 13, there are samples of same fingerprint image in different resolutions. It is clear
that decreasing the resolution size of image can affect the matching algorithm.

4.2.2   Area

The size of rectangular area sensed by a fingerprint scanner is a fundamental parameter. The
larger the area is the more ridges and valleys are captured and more distinctive the fingerprint
becomes. An area greater than or equal to (1 X 1) as per FBI standards permits a full plain
fingerprint impression. Recently companies are reducing the area to reduce cost and to have a
smaller device size. (D, et al. 2003)

4.2.3   Number of Pixels

The numbers of pixels can be simply derived by the resolution and the area. A scanner
working with r dpi over an area can be expressed by. (D, et al. 2003)

Height (h) × width (w) inch2 = rh × rw pixels


                                                                                       Page | 32
University of Glamorgan

4.2.4   Dynamic Range (or depth)

This denotes the numbers of bits used to encode the intensity value of each pixel. Colour
information is not useful for fingerprint recognition and therefore almost all the available
fingerprint scanners acquire greyscale images. The FBI standard for pixel bit depth is 8 bits,
which yields 256 levels of gray. Actually, some sensors capture only 2 or 3 bits of real
fingerprint information and successively stretch the dynamic range to 8 bits in software. (D,
et al. 2003)

4.2.5   Geometric Accuracy

This is usually specified by the maximum geometric distortion introduced by the acquisition
device, and expressed as a percentage with respect to x and y directions. Most of the optical
fingerprint scanners introduce geometric distortion which, if not compensated, alters the
fingerprint pattern depending on the relative position of the finger on the sensor surface. (D,
et al. 2003)

4.2.6   Image Quality

It is not easy to precisely define the quality of a fingerprint image, and it is even more
difficult to decouple the fingerprint image quality from the intrinsic finger quality or status.
In fact when the ridge prominence is very low, for example a manual workers and elderly
people, when the fingers are too moist or to dry, when they are incorrectly presented to the
sensor. Most of the scanners produce a poor quality image. (D, et al. 2003)

4.3 Fingerprint Structure

A fingerprint usually appears as a series of dark lines that represent the high, peaking portion of the
friction ridge skin, while the valley between these ridges appears as white space capacitive and are
the low, shallow portion of the friction ridge skin. Fingerprint identification is based primarily on
the minutiae, or the location and direction of the Ridge endings and bifurcations (splits) along a
ridge path. (http://cte1401-01.sp00.fsu.edu/holly.html n.d.)




                                  Figure 14 Fingerprint Ridges
The image presents an example of fingerprint features. The types of information that can be
collected from a fingerprint's friction ridge impression include the flow of the friction ridges, the
presence or absence of features along the individual friction ridge paths and their sequence, and
the intricate detail of a single ridge. Recognition is usually based on the first and second levels of
detail or just the latter.

                                                                                             Page | 33
University of Glamorgan

4.4 Fingerprint image Security

As it has been mentioned above, some of the some techniques were suggested by several
authors in chapter 2. These solutions have not been implemented yet on any biometrics
system or to some extent they have been implemented but not available in market. This study
will provide a basic understanding of the structure and mechanism of fingerprint biometric
and template, which will lead us toward the solution for securing the template. The idea is to
use steganography with in biometric template to hide encrypted information to verify along
with the biometric template. In this way if an attacker attacks a and manipulate the biometric
template it will not compromise with the system. The reason will be the template used to
attack the system lacks the encrypted information which is stored in database.

Summary
It is necessary to understand the system before suggesting a solution. This chapter focuses on
how fingerprints are acquired and what are its components and how can we secure it. Adding
steganography in template is a challenge as it can affect matching algorithm. With the
knowledge of template structure it can be clear how we can embed a key inside the image
without disturbing the template features. Also it will help to decide whether changes can be
made on hardware level.




                                                                                     Page | 34
University of Glamorgan




                          Page | 35
University of Glamorgan




C           hapter 5



                          Design and Implementation




                                              Page | 36
University of Glamorgan

As mentioned above the aim of this study is to design an application which can increase the
security in fingerprint biometric systems i.e. security of biometric template. This hypothesis
can be achieved by creating a small module which can embed encrypted information into the
template and then decode it at the time of verification. The encrypted key will be stored in the
database separately for verification purpose. If the attacker replaces the template it can reduce
the risk that template will compromise as lack of the computer generated encrypted key.

To prove the hypothesis two applications are developed on different technologies. One
application is on Microsoft VB .Net and Microsoft Access. The second application is on
Visual C# and Microsoft SQL Server. The concept is same but both work on different
approach which is explained in detail below.

5.       Device and Software

The required Devices and Software is as following:

     •     Computer for application development running Microsoft windows operating system
     •     A biometric fingerprint reader with optical sensor.
     •     Biometric software development kit (SDK) compatible with windows and fingerprint
           reader.

The specifications of these devices are as following.

5.1.1 Computer


The computer which will be used in this study is a laptop machine specifications are as
following.

Name                           Dell
Model                          Inspiron 6400
Processor Speed                1.86 GHz Intel T2130 Genuine




                                     Figure 15 Dell Inspiron

                                                                                        Page | 37
University of Glamorgan

5.1.2 Fingerprint Reader


The Microsoft Fingerprint Reader has a small, efficient design. The device is almost three
inches long, and a little over an inch wide, and a quarter inch high with a weight of slightly
more than an ounce. The reader screen itself is a little over an inch long, and slightly less than
inch wide. A split red/silver circle encompasses the plastic reader screen. The reader itself is
a slightly sticky plastic material. When the keyboard is on, the reader lights up in the same
way the bottom of the optical mouse do.




                          Figure 16 Microsoft Fingerprint Readers

5.1.3 Software Development Kit (SDK)


The Software Development Kit (SDK) used in this application is from Griaule for visual
basic 2005 .Net.

5.2. Griaule Software Development Kit (SDK)


The SDK which is used in this study is Griaule Fingerprint SDK. It is the most efficient SDK
available in marker at the moment which can be integrated into several languages and works
with many sensors. Some features of SDK are as following.

            •   Plug and play for Microsoft fingerprint device.
            •   Easy integration with applications
            •   Very small template size 1KB approximately
            •   Image can be stored along with the template
            •   1:1 and 1:N matching capabilities
            •   Microsoft .Net support
            •   FVC2006 recognised



                                                                                         Page | 38
University of Glamorgan

FVC compared several SDK and Griaule SDK results were highly accurate and stable in
matching with low error rates. Secondly Griaule provides easy integration with hardware and
language. One feature which Griaule SDK provides is storing image along with the template
in the database. Storing image of the fingerprint can help in embedding information using
steganography.

Before moving further it is important to understand what steganography is and how it can be
used in securing template.

5.3. Steganography


Steganography is really nothing new, as it has been around since the times of ancient Rome.
For example, in ancient Rome and Greece, text was traditionally written on wax that was
poured on top of stone tablets. If the sender of the information wanted to obscure the message
- for purposes of military intelligence, for instance - they would use steganography: the wax
would be scraped off and the message would be inscribed or written directly on the tablet,
wax would then be poured on top of the message, thereby obscuring not just its meaning but
its very existence (Johnson 1995)

According to Dictionary.com, steganography (also known as "steg" or "stego") is "the art of
writing in cipher, or in characters, which are not intelligible except to persons who have the
key; cryptography" (Dictionary.com n.d.). In computer terms, steganography has evolved into
the practice of hiding a message within a larger one in such a way that others cannot discern
the presence or contents of the hidden message (Howe 1993 - 2001). In contemporary terms,
steganography has evolved into a digital strategy of hiding a file in some form of multimedia,
such as an image, an audio file (like a .wav or mp3) or even a video file.

5.3.1. What is Steganography Used for?

Like many security tools, steganography can be used for a variety of reasons, some good,
some not so good. Legitimate purposes can include things like watermarking images for
reasons such as copyright protection. Digital watermarks (also known as fingerprinting,
significant especially in copyrighting material) are similar to steganography in that they are
overlaid in files, which appear to be part of the original file and are thus not easily detectable
by the average person. (Schneier 1996) Steganography can also be used as a way to make a
substitute for a one-way hash value (where you take a variable length input and create a static
length output string to verify that no changes have been made to the original variable length
input) (Schneier 1996). Further, steganography can be used to tag notes to online images (like
post-it notes attached to paper files). Finally, steganography can be used to maintain the
confidentiality of valuable information, to protect the data from possible sabotage, theft, or
unauthorized viewing (Radcliff 2002).

Unfortunately, steganography can also be used for illegitimate reasons. For instance, if
someone was trying to steal data, they could conceal it in another file or files and send it out
in an innocent looking email or file transfer. Furthermore, a person with a hobby of saving
pornography, or worse, to their hard drive, may choose to hide the evidence through the use
of steganography. And, as was pointed out in the concern for terroristic purposes, it can be
used as a means of covert communication. Of course, this can be both a legitimate and an
illegitimate application. (Westphal 2003)
                                                                                         Page | 39
University of Glamorgan

5.3.2. Steganography and Biometric Fingerprint Image

Understanding the idea of steganography, it can be quite useful to secure fingerprint image in
the database from attacker. Let’s suppose,

5.4. Steganography Using .Net Algorithms and Techniques


There are three different techniques you can use to hide information in a cover file:

•    Injection (or insertion)

Using this technique, you store the data you want to hide in sections of a file that are ignored
by the processing application. By doing this you avoid modifying those file bits that are
relevant to an end-user—leaving the cover file perfectly usable. For example, you can add
additional harmless bytes in an executable or binary file. Because those bytes don't affect the
process, the end-user may not even realize that the file contains additional hidden
information. However, using an insertion technique changes file size according to the amount
of data hidden and therefore, if the file looks unusually large, it may arouse suspicion. (Weiss
nd)

•    Substitution

Using this approach, you replace the least significant bits of information that determine the
meaningful content of the original file with new data in a way that causes the least amount of
distortion. The main advantage of that technique is that the cover file size does not change
after the execution of the algorithm. On the other hand, the approach has at least two
drawbacks. First, the resulting stego file may be adversely affected by quality degradation—
and that may arouse suspicion. Second, substitution limits the amount of data that you can
hide to the number of insignificant bits in the file. (Brainos nd)

5.5. Generation of Steganography in .Net


In the substitution techniques, a very popular methodology is the LSB (Least Significant Bit)
algorithm, which replaces the least significant bit in some bytes of the cover file to hide a
sequence of bytes containing the hidden data. That's usually an effective technique in cases
where the LSB substitution doesn't cause significant quality degradation, such as in 24-bit
bitmaps.

For example, to hide the letter "a" (ASCII code 97 that is 01100001) inside eight bytes of a
cover, you can set the LSB of each byte like this:

    10010010
    01010011
    10011011
    11010010
    10001010
                                                                                        Page | 40
University of Glamorgan

    00000010
    01110010
    00101011

The application decoding the cover reads the eight Least Significant Bits of those bytes to re-
create the hidden byte—that is 0110001—the letter "a." As you may realize, using this
technique let you hide a byte every eight bytes of the cover. Note that there's a fifty percent
chance that the bit you're replacing is the same as its replacement, in other words, half the
time, the bit doesn't change, which helps to minimize quality degradation.

5.6. Fingerprint Image and Steganography

5.6.2 Application Structure


Classes

Classes used in this application are as below

•    InputBox.cs
•    DBClass.cs
•    Util.cs

These classes are provided with fingerprint SDK samples and provide method to acquire
image from sensor and extract features.

References

•    AxGrFingerXLib
•    GrFingerXLib
•    Stdole
•    System
•    System.Data
•    System.Drawing
•    System.Windows.Form
•    System.XML
•    stego

5.6.2 Application Process


Application will mainly start from enrolment process of the finger. User will place the finger
on sensor and image will be acquired in application from the sensor. After the acquisition of
the image SDK normally extracts the features of the image which is called template and
stores the template in the database. To achieve the goal this method is modified.




                                                                                      Page | 41
University of Glamorgan

5.6.2.1 Enrolment Process


Enrolment process takes place when user place finger on the sensor and image is acquired by
the application into the image box. Once the enrolment process takes place image format is
converted which is explained further.



                          Encrypted

                            Text

                                                            Template         Image with key

                                                                       Database


                               Figure 17 Enrolment Process




                                      Figure 18 Enrolment Process

5.6.2.2 Conversion of Image


After the image is acquired it is converted from 8 bit format to 24 bit due to the stego
requirements from the library.
Bitmap bm8bit = new Bitmap(sfdImage.FileName);

Bitmap bm24bit = new Bitmap(bm8bit.Width, bm8bit.Height,
System.Drawing.Imaging.PixelFormat.Format24bppRgb);
                                                                                          Page | 42
University of Glamorgan


Graphics g = Graphics.FromImage(bm24bit);


After the image is converted into 24 bit format text are embedded using steganography
techniques.




                                   Figure 19 Image Conversion

5.6.2.3 Steganography


Once the image is ready and in 24 bit format cover file is created which will be explained in
next section. Message and password is assigned to the file and after that the file is created
using encode button as shown in figure.




                                                                                    Page | 43
University of Glamorgan




                                   Figure 20 Creating Stego File

5.6.2.4 Stego Library


This library is developed by Giuseppe Naccarato and Alessandro Lacava. Provides a simple
API to encode an image and decode it using simple method. There are two interfaces to
perform this task

IcoverFilel: This method requires three parameter stego file name message to hide and
password. This method hides the message inside the stego file.

If the code in project is over the method mention above can be seen in these lines and explain
the usage.

          ICoverFile cover = new BMPCoverFile(pic);

          // Create the stego file
          cover.CreateStegoFile(stegoFile, message, password);

                                                                                      Page | 44
University of Glamorgan

           Result("Message hidden successfully");

           Image stegoPic = new Bitmap(stegoFile);
           FitPic(stegoPic, picStegoFileEnc);
           picStegoFileEnc.Image = new Bitmap(stegoPic);
           stegoPic.Dispose();

IStegoFile: This method extract hidden message from the file. This method has been used in
project on following lines this opens the stego file and displays the hidden message into the
text box as shown in image below.

            // Open the stego file
           IStegoFile stego = new BMPStegoFile(stegoFile, password);

           // Show the hidden message
           txtMessageDec.Text = stego.HiddenMessage;

5.6.3 Decoding the Image


Image decoding is reverse of steganography process as mention above in section stego library how it
is performed in the application. Password and the file path are provided in the option box. After click
on the decode button it shows the hidden value in the text box.




                                      Figure 21 Decoding the Image




                                                                                               Page | 45
University of Glamorgan

5.6.4 Development Limitations
• Image Size

    First issue during the development was to change the image resolution. Microsoft
    Fingerprint reader produces an image of 256 colours. For steganography the method used
    in this application the requirement of image was of 24 bit. For this purpose the small
    module was written to convert the image from 256 colours to 24 bit.

•   Image Storage

    Next challenge in this application was the storage of image in the access database. Access
    has some limitations in data types. Image features extracted into template can be stored
    into database using OLE Object data type. Due to this it was difficult to store image in
    access as compare to SQL server which will be explained further later on.

•   Verification Process
    In verification process user will place finger on the sensor. Image will be acquired in
    application. Now at this stage multiple verifications will take place. As there are some
    limitations which are explained.

5.7 Fingerprint and Byte Stream


This application is designed using Microsoft Visual C# and Microsoft SQL server 2005.
Griaule SDK is again used in the same way with the small modification of DB Class.

5.7.1 Application structure
Classes

These are the main classes used in the application

•   InputBox.cs
•   DBClass.cs
•   Util.cs

These classes are provided with SDK by Griaule. Which provide default method to add
information in database and to manipulate the features of the image in the image box; these
classes also provide flexibility for programming end.

References

•   AxGrFingerXLib
•   GrFingerXLib
•   Stdole
•   System
•   System.Data
•   System.Drawing
                                                                                     Page | 46
University of Glamorgan

•   System.Windows.Form
•   System.XML

5.7.2 Application Process


This application will also work on same procedure as mentioned above in previous topic.

5.7.2.1 Enrolment Process


The process of this application is similar to previous one. Application will start from
enrolment process. User will place finger on biometric device and image will be acquired by
the SDK in application. Template features will be auto extracted. When user will click on
enrolment button application will store template and image in the Database. Image will be
store in binary format at the end of the information system based encrypted text will be
embedded into the image.




                                  Figure 22 Enrolment Process

5.7.2.2 Random Number Generation


The main function in this application is a random number which is generated through a small
module. The main template manipulation is using the SDK DB Class. A random number is
generated 0 to 255 using the code shown below
         decimal encrypt;
         Random rand = new Random ();
         encrypt = 1 + rand.Next(255);

                                                                                   Page | 47
University of Glamorgan



Once the number is generated a byte array is created of image file. This is shown below as
following
          byte [] tempimg = new byte[arrImage.Length+1];
          Array.Copy(arrImage,tempimg,arrImage.Length);
          enc =(byte)encrypt;
          tempimg[arrImage.Length]=enc;

The random number which is converted into byte array is attached with the image byte array
during the insertion process in database field. With this functionality it becomes the part of
the image and there are no changes in the image or the template value.




                                      Figure 23 Random Number

In this example it is shown that a number is generated 33 randomly and it has been shown in message
box.

5.7.2.3 Verification Process


When user will click on identify button it will match the template in database and retrieve the
image from the database. At this point verification will take process twice. The database
image will be again manipulated and feature will be extracted and match again with the
template if the result is positive then the key which is randomly generated and is embedded in
the image will be matched against the record nside the database.




                                                                                           Page | 48
University of Glamorgan




                                      Figure 24 Verification Process

After verification of the template application matched the encrypted value which was 33 and
displayed a message in log “Image contains the encrypted value”.

5.7.2.4 Template Attack and Verification


The most interesting part in the application is attack section which explains the attack on template in
simple manner. In this method after the enrolment application generates and ID. Simply scan the
finger and attack on the specific ID it will replace the template in database. In this example the
enrolled fingerprint is on ID 21. Now attack will take place and scan a different finger for ID 21 and
update the records as shown in image.




                                                 Figure 25 Attack

In the log section it displays the message that image on ID 21 was been updated successfully.




                                                                                                Page | 49
University of Glamorgan

5.7.2.5 Securing the Template


Now after the attack it is clear that the template has been replaced in the database. Now if attacker
tries to compromise with the system. System will verify the template but show the original image in
the second image box.

If closely observe the both fingerprint they are different for each other which displays the
difference that template alteration can be stopped in the database if small effort is done on the
application side. Also in the log box it shows that encrypted value is in the image and image
is verified. The encrypted value is retrieved from the image when it is loaded into the image
box using same byte stream method the last bytes of the images are extracted and the value
which is embedded in the image is verified against the database. When both values match and
results are positive it is displayed in the log box the image has the value and it is the
authenticate image. Even if attacker replaces the template it won’t be authenticated. This
result proves that this application has achieved its goals and desired results.




                                     Figure 26 Securing Template

5.7.3 Application Limitations and Advantages


As mentioned above before application fails to perform verification on the second image box
due to the limitation in SDK. But the beauty of the application is the byte stream function
which reduces the risk of attacks on the template. Here question can be raised what if the
hacker attacks the database and retrieves image and the key value from the database. It is
simple in case if this happens hacker needs the logic to add byte stream in the database and
                                                                                           Page | 50
University of Glamorgan

how to retrieve the key from the image which is in byte format unreadable unless the process
is reversed. This concludes that it can make difficult for attacker to compromise with the
system.

Summary
Developing a solution on hardware or software level can be easy if logic of the operations is
clear. This chapter explains the development of two applications on different technologies on
backend. There were some limitations but it is not impossible to achieve the task. Results
show the main objective of this study was achieved though the full application was not
developed. Also demonstration of attack explains that the results were desired.




                                                                                    Page | 51
University of Glamorgan




C           hapter 6



                          Results and Conclusion




                                           Page | 52
University of Glamorgan

Evaluation of the Software

This project has proven to be a success to achieve the proposed objective. Though some
functionality are missing in steganography approach, which were due to limitation in access
database and SDK. The priority of developing application was VB .Net but it was later on
replaced with c# during the project because of the flexibility and object handling due the
object oriented nature of the language and access to base classes.

The binary data application produced more desired results due to the technology which was
adopted on the back end. It made easier to store image in the database and also allows the
application to run on network. But the application lacks the function of second verification
which is due to limitation from SDK. The limitation was in the process of verification of the
image in the second image box.

Other than that application shows how we can hide information in the image using
steganography and decrypt the information as well. The binary method is interesting as well
which adds the information along with the image details without changing the image features.

The results are quite positive and after the change in the image there is no problem in
matching the fingerprint in database. Attacking the database and replacing the template
explains the concept and shows how it is possible to avoid template attacks in simple manner.

If there is some flexibility in SDK a complete application can be developed to secure
template using software method which is flexible easy and can be integrated with hardware
easily this approach can be used with any language.




                                                                                    Page | 53
University of Glamorgan

Conclusion

Now a day security is holding the main priority all over the world. Banks, airports and other
organizations including hospitals are adopting biometric systems. Many biometrics systems
were introduced in market and they have been implemented as well.

But the question still arises in mind that is this secure? In this study it has been explained
there are several threats and methods to attack a biometric system. To improve the security
measure it is necessary to improve the system by using several methods which are
unpredictable. Also multiple methods can be combined and they can be used to secure
biometric information.

It is not necessary to design solutions on low level or on hardware level unless it is a
hardware application which runs standalone. For devices such as Microsoft fingerprint reader
and other plug and play sensor these approaches can be adopted. Many solutions are already
available in the market which is free of cost. Combining different method on application level
can increase the security with very small effort.

This project also explains a simple attack on database to replace template. Which shows that
template is not guarantee of security and authentication. To improve biometric security it is
important to do multiple verifications and use multiple methods to hide information which
cannot be decrypted easily.

In future we can use both approaches in one application for the verification system using
steganography and binary information storage as well. Either, we can us steganography and
add it in the image with the binary information rather than storing it separately in the table.
However, this it can be complicated to retrieve from the image unless the attacker has the
encrypted key to verify.

It is also clear that embedding text in the image or adding bytes in the stream either ways it
does not affect the quality of matching and extraction system. Even changing image from 8
bit to 24 bit provides the better results on software level. This does not disturb the matching
algorithm of SDK to verify the template which is another plus point.

SDK is important part in this application Griaule SDK is very robust and accurate. It has a lot
of flexibility and good integration with SQL server database and c# programming language
works fine with hardware and high acceptance rate. However, still fewer methods give
limitation to development end.

This paper serves to introduce new methods and approaches to improve the security in
application level. It explains the idea how to integrate different method technologies and
languages to develop solutions for biometrics, also in this paper limitation of languages and
back end applications are explained which help to understand which language can be
appropriate to use and which database is more flexible for biometric system.




                                                                                      Page | 54
University of Glamorgan

Appendix A
Pseudo code

Stage 1

   1. Enrol finger on Biometric Reader
   2. Template Extraction
   3. If User is not found in Database
      Then
   • Encrypted Key Generation
   • Embed Key in Template
   • Template Storage in Database
   • Store Key in Database
      Else
   • Match Extracted Template With Stored Template
   • Extract Key From Template
   • Match Key With Database
   • Verify User
      End

Stage 2

Enrolment Process

Pseudo code

   1.   Finger will be placed on sensor
   2.   Sensor will read the biometric information
   3.   Send the information to Transmission Process
   4.   Image will be compressed
   5.   Sent to Signal Process through Transmission channel

                                           Stage 3

                                Storage (If User Not Found)

Pseudo code

   1.   Expansion of image will take process.
   2.   Will be passed to Signal Process.
   3.   Template will be extracted from the image.
   4.   Quality will improve Dust particles etc will be removed.
   5.   Pattern will be matched (If User not found).
   6.   Encryption Key will be generated.
   7.   Key will be embedded using steganograpgy techniques.
   8.   Key will be stored in Database.
   9.   Template will be stored in Database.

                                           Stage 4
                                                                   Page | 55
University of Glamorgan

                             Verification (User Authentication)

Pseudo code

   1.   Expansion of image will take process.
   2.   Will be passed to Signal Process.
   3.   Template will be extracted from the image.
   4.   Quality will improve Dust particles etc will be removed.
   5.   Pattern will be matched (If User found).
   6.   Encryption Key will be extracted From Stored Template.
   7.   Key will be matched with the stored key.
   8.   User will be Authenticate.

Algorithm
                                         Enrolment




                                         Templat
                                         e
                                         Extracti
                                         on




                                        If User
                                                                   Generate Key
                                        Not
                                        Found



                                                                   Embed Key


                                        Else

                                                                     Store
                                                                     Template

                                     Match
                                     Template
                                                                     Store Key


                                     Extract Key




                                       Match
                                       Key with
                                       DB


                                     Verify User




                                                                         End


                                    Figure 27 Algorithm
                                                                                  Page | 56
University of Glamorgan

Appendix B

References


A, Adler. “Images can be regenerated from quantized.” Canadian Conf. Computer Electric
Eng. Niagra Falls, Canada , May 2004. 469-472.

A, Ross, Jain A.K, and Reisman J. “A Hybrid Fingerprint Matcher.” Pattern Recognition,
2003: 36 (7) 1661-1673.

A.K, Jain, and Uludag U. “Hiding Biometric Data.” IEEE Trans. Pattern Anal. Mach.
Intelligence 25, no. 11 (2003): 1493-1498.

A.K, Jain, Bolle R, and Pankanti S. BIOMETRIC- Personal Identification in Network Society.
London: Kluwer Academic Publishers, 1999.

A.K., Jain, Parbhakar S, and Chen S. “Combining Multiple Matchers for a High Security
Fingerprint Verification System.” Pattern Recognition Letters, 1999: 20 (11-13) 1371-1379.

B, Schneier. “The Uses and Abuses of Biometrics.” Comm ACM VOL 42, 8, 1999: 136.

Biometrics, Find. Biometrics: The Anotomy Lesson. 2001.
http://www.findbiometrics.com/Pages/feature%20articles/anatomy.html (accessed August 18,
2007).

Brainos, Alain C. “A Study Of Steganography And The Art Of Hiding Information.” East
Carolina University, nd: 3-7.

C, Soutar. “Biometrics System Securit, White Paper.” bioscrypt. http://www.bioscrypt.com
(accessed January 11, 2008).

Canton, State University of New York At. Public Safety Technology: Crimina Investigation.
2203. http://www.canton.edu/ci/previous_lessons_3.html (accessed August 14, 2007).

Corporation, Biometrics Technology. Biometric Technical Assessment. 2002. http://bio-tech-
inc.com/Bio_Tech_Assessment.html (accessed July 11, 2007).

D, Maltoni, Maio D, Jain A.K, and Parbhakar S. Handbook of Fingerprint Recognition.
Verlag: Springer, 2003.

Daugman, J.G. Recognition Person By Their Iris Pattrens : Biometrics: Personal
Identification in Networked Society. Edited by A.K. Jain. Vol. 1. Springer, 1999.

Dictionary.com. “Steganography.” Dictionary.com. n.d.
http://dictionary.reference.com/search?q=steganography (accessed January 19, 2008).

Enhanced Border Security and Visa Entry Reform. Congress of the United States of America
, 2002.



                                                                                    Page | 57
University of Glamorgan

G.L, Marcialis, and Roli F. “Experimental Results on Fusion of Multiple Fingerprint
Matcher.” Proc. 4th Int. Conf. on Audio and Video-Based Person Authentication, 2003: 814-
820.

G.L., Marcialis, and Roli F. “Preceptron-Based Fusion of Multiple Fingerprint Matchers .”
Proc. First Int. Work on Artificial Nural Netwroks in Pattern Matching, 2003: 36 (7) 1661-
1673.

Group, International Biometrics. How Biometrics is Defined. 2003.
http://www.biometricgroup.com/reports/public/reports/biometric_definition.html (accessed
August 19, 2007).

Howe, Denis. “Steganography.” The Free On-line Dictionary of Computing. 1993 - 2001.
http://www.nightflight.com/foldoc/index.html (accessed January 21, 2008).

http://cte1401-01.sp00.fsu.edu/holly.html. Biometrics: The Touch, the Scan, the Pattern of
Our Lives . n.d. http://cte1401-01.sp00.fsu.edu/holly.html (accessed September 9, 2007).

J.L. Wayman, A.J. Mansfield. Best Practices in Testing and Reporting Performance of
Biometric Devices. Vol. 2. 1 vols.

James Wayman, ed. National Biometric Test Center Collected Works. San Jose: San Jose
State University, 2004.

JD.JR., Woodward. “Biometrics Background.” www.ibia.org. 2000.
http:www.ibia.orgWoodwardPresentation.pdf (accessed September 2, 2007).

JD.JR., Woodward, Orlans N.M, and Higgnis P.T. Biometrics Identity Assurance in The
Information Age. Berkeley, 2003.

Jhon D., Woodward. biometrics identity assurance information age . Berkeley: Mc Graw
Hill, 2003.

Johnson, Neil F. Steganography. Technical Report, http://www.jjtc.com/stegdoc/sec202.html,
1995.

L, Ferri C, Mayerhofer A, Frank M, Vielhauer C, and Steinmetz R. “Biometrics
Authentication for ID Cards and Hologram Watermarks.” Proc. SPIE Security and
Watermarking of Multimedia Contents, 2002: Vol. 4675 629-640.

M, Yeung, and Pankanti S. “Verification watermarks on Fingerprint Recognition and
Retrival.” Proc. SPIE, Security and Watermarking of Multimedia Contents, 1999: Vol 3657
66-78.

Maltoni, Davide, Maio, Jain, and Prabhakar. Handbook of Fingerprint Recognition. New
York: Springers, 2005.

Mearian, Lucas. Toppling The PIN: Banks Eye Biometric Technology For ATM Access.
http://www.biometrictechnology.net/ (accessed January 9, 2008).


                                                                                     Page | 58
University of Glamorgan

N.K. Ratha, J.H. Connell, and R.M. Bolle. “An Analysis of Minutiae Matching Strength.”
AVBPA, 2001: 223 - 228.

N.K., Ratha, Connell J.H., and Bolle R.M. “Enhancing security and privacy in biometrics-
based authentication systems.” IBM System Journal. 21 April 2001.
http://researchweb.watson.ibm.com/journal/sj/403/ratha.html (accessed December 19, 2007).

Radcliff, Deborah. Steganography: Hidden Data. 10 June 2002.
http://www.computerworld.com/securitytopics/security/story/0,10801,71726,00.html
(accessed January 24, 2008).

Record, Scotish Criminal. History of Finger Prints - A Time Line. 2002. http://www.spsa-
forensics.police.uk/services/history_science (accessed November 11, 2007).

Roberts, Chris. “Biometrics.” Biometrics, November 2005: 24.

S, Parbhakar, and Jain A.K. “Decision-level Fusion in Fingerprint Verification.” Pattern
Recognition, 2002: 861-874.

Schneier, Bruce. Applied Cryptography. John Wiley and Sons Inc., 1996.

T, Windeatt, and Roli F. “Multiple Classification System.” Lecture Notes in Computer
Sciences Volume 2709.

Weiss, Max. “Principles of Steganography.” Math 187: Introduction to Cryptography, nd: 2-
3.

Westphal, Kristy. Steganography Revealed. 9 April 2003.
http://www.securityfocus.com/infocus/1684#ref_cryptography (accessed January 9, 2008).

X, Xia, and Gorman O L. “Innovations in Fingerprint Capture Devices.” Pattern Recognition,
2003: 36 (2) 361-369.

York, State University of New. Public Safety Technology Criminal Investigation. State
University of New York. 2003. http://www.canton.edu/ci/previous_lessons_3.html (accessed
August 11, 2007).




                                                                                     Page | 59

More Related Content

PDF
Pedagogical appraches-for-using-technology-literature-review-january-11-final
PDF
Gate 2013
PDF
Total beginner companion_document
PDF
Web 2.0 nell’impresa: modelli organizzativi e pratiche emergenti
PDF
AN ANALYSIS OF THE IMPORTANCE OF CORPORATE REPUTATION IN HIGHER EDUCATION INS...
PDF
Does online interaction with promotional video increase customer learning and...
PDF
Derya_Sezen_POMDP_thesis
PDF
Operational risk
Pedagogical appraches-for-using-technology-literature-review-january-11-final
Gate 2013
Total beginner companion_document
Web 2.0 nell’impresa: modelli organizzativi e pratiche emergenti
AN ANALYSIS OF THE IMPORTANCE OF CORPORATE REPUTATION IN HIGHER EDUCATION INS...
Does online interaction with promotional video increase customer learning and...
Derya_Sezen_POMDP_thesis
Operational risk

What's hot (18)

PDF
PDF
Web2.0 And Business Schools Dawn Henderson
PDF
Computer security using machine learning
DOCX
Java completed assignment
PDF
Software Arquitecture
PDF
Desislava Stankova's Master Thesis
PDF
Multi-Band Rejection EMI Shielding
PDF
Habanero book earlydraft
PDF
ICT SBA final
PDF
Evaluation of the u.s. army asymmetric warfare adaptive leader program
DOCX
Emergency planning independent study 235.b
PDF
Uni cambridge
 
PDF
bonino_thesis_final
PDF
Vet mismatch study_english
PDF
Biennial activity report 2010-2011
PDF
Aidan_O_Mahony_Project_Report
PDF
MACHINE LEARNING
PDF
Xi3 voyager userguide_en
Web2.0 And Business Schools Dawn Henderson
Computer security using machine learning
Java completed assignment
Software Arquitecture
Desislava Stankova's Master Thesis
Multi-Band Rejection EMI Shielding
Habanero book earlydraft
ICT SBA final
Evaluation of the u.s. army asymmetric warfare adaptive leader program
Emergency planning independent study 235.b
Uni cambridge
 
bonino_thesis_final
Vet mismatch study_english
Biennial activity report 2010-2011
Aidan_O_Mahony_Project_Report
MACHINE LEARNING
Xi3 voyager userguide_en
Ad

Similar to Fingerprint Biometrics vulnerabilities (20)

PDF
Unigraphics Full.......
DOCX
Thesis writing
PDF
It project development fundamentals
PDF
1640 99 004 6 18.04.2011 tattoo-star usermanual
DOC
Lesson 1...Guide
PDF
FCC Interop Board Final Report 05 22 12
PDF
Trinity Impulse - Event Aggregation to Increase Stundents Awareness of Events...
PDF
Project report on Eye tracking interpretation system
PDF
spurgeon_thesis_final
PDF
nasa-safer-using-b-method
PDF
Master_Thesis
PDF
Graduation Report
PDF
ICSA17 Imunologia - Manual eletroforese
DOCX
Industry_Project_Report
PDF
Application of nanotechnologies: ICT
PDF
E-FREELANCING - MAJOR/FINAL YEAR PROJECT DOCUMENTATION
PDF
PDF
Specification of the Linked Media Layer
PDF
IMO Model Course 7.02 Edition 2014
PDF
SSTRM - StrategicReviewGroup.ca - Workshop 2: Power/Energy and Sustainability...
Unigraphics Full.......
Thesis writing
It project development fundamentals
1640 99 004 6 18.04.2011 tattoo-star usermanual
Lesson 1...Guide
FCC Interop Board Final Report 05 22 12
Trinity Impulse - Event Aggregation to Increase Stundents Awareness of Events...
Project report on Eye tracking interpretation system
spurgeon_thesis_final
nasa-safer-using-b-method
Master_Thesis
Graduation Report
ICSA17 Imunologia - Manual eletroforese
Industry_Project_Report
Application of nanotechnologies: ICT
E-FREELANCING - MAJOR/FINAL YEAR PROJECT DOCUMENTATION
Specification of the Linked Media Layer
IMO Model Course 7.02 Edition 2014
SSTRM - StrategicReviewGroup.ca - Workshop 2: Power/Energy and Sustainability...
Ad

Recently uploaded (20)

PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Encapsulation theory and applications.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
KodekX | Application Modernization Development
PDF
Empathic Computing: Creating Shared Understanding
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Spectroscopy.pptx food analysis technology
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Review of recent advances in non-invasive hemoglobin estimation
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Unlocking AI with Model Context Protocol (MCP)
Encapsulation theory and applications.pdf
Encapsulation_ Review paper, used for researhc scholars
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
KodekX | Application Modernization Development
Empathic Computing: Creating Shared Understanding
The Rise and Fall of 3GPP – Time for a Sabbatical?
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Programs and apps: productivity, graphics, security and other tools
Advanced methodologies resolving dimensionality complications for autism neur...
Dropbox Q2 2025 Financial Results & Investor Presentation
Spectroscopy.pptx food analysis technology
Diabetes mellitus diagnosis method based random forest with bat algorithm
Understanding_Digital_Forensics_Presentation.pptx
Review of recent advances in non-invasive hemoglobin estimation
The AUB Centre for AI in Media Proposal.docx
Reach Out and Touch Someone: Haptics and Empathic Computing
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx

Fingerprint Biometrics vulnerabilities

  • 1. 1 Biometric Template Security BIOMETRIC TEMPLATE SECURITY University of Glamorgan: | Farhan Liaqat
  • 2. University of Glamorgan University of Glamorgan Prifysgol Morgannwg Faculty of Advanced Technology STATEMENT OF ORIGINALITY This is to certify that, except where specific reference is made, the work described in this project is the result of the investigation carried out by the student, and that neither this project nor any part of it has been presented, or is currently being submitted in candidature for any award other than in part for the M.Sc. award, Faculty of Advanced Technology from the University of Glamorgan. Signed...........………………………………………………………... (Student) Page | 2
  • 3. University of Glamorgan Table of Contents ABSTRACT .......................................................................................................................................................... 6 CHAPTER 1.......................................................................................................................................................... 7 INTRODUCTION .................................................................................................................................................. 7 1. Introduction .......................................................................................................................................... 8 Summary ....................................................................................................................................................... 9 CHAPTER 2........................................................................................................................................................ 10 INTRODUCTION TO BIOMETRICS SYSTEM THREATS AND VULNERABILITIES ............................................... 10 2.1 History of Biometrics Systems ....................................................................................................... 12 2.2 Biometrics Traits ............................................................................................................................... 13 2.2.1 Requirements for Biometrics Traits .................................................................................................... 13 2.2.3 Comparison of Biometrics Trait and Technology ............................................................................. 16 2.3 Biometrics User Authentication ....................................................................................................... 17 2.4 A Standard Biometric System ........................................................................................................ 18 2.5 Threats to Finger Print Biometric System .................................................................................... 21 2.6 Threat Vectors ................................................................................................................................ 21 2.7 Types of Attacks ............................................................................................................................. 22 2.7.1 Physical Attacks ............................................................................................................................. 22 2.7.2 Computer Based Attacks ................................................................................................................ 23 2.7.3 Template Attacks ............................................................................................................................ 24 Summary ..................................................................................................................................................... 25 CHAPTER 3........................................................................................................................................................ 26 PREVIOUS WORK AND LIMITATIONS .............................................................................................................. 26 3 Different Approaches ......................................................................................................................... 27 Summary ..................................................................................................................................................... 28 CHAPTER 4........................................................................................................................................................ 29 FINGERPRINT SENSOR AND IMAGE ................................................................................................................. 29 4.1 Biometric Scanners ........................................................................................................................ 30 4.1.1 Optical Sensors .............................................................................................................................. 31 4.2 Fingerprint Image.......................................................................................................................... 32 4.2.1 Resolution ...................................................................................................................................... 32 4.2.2 Area ................................................................................................................................................ 32 4.2.3 Number of Pixels ........................................................................................................................... 32 4.2.4 Dynamic Range (or depth)............................................................................................................. 33 4.2.5 Geometric Accuracy ....................................................................................................................... 33 4.2.6 Image Quality ................................................................................................................................. 33 4.3 Fingerprint Structure..................................................................................................................... 33 4.4 Fingerprint image Security............................................................................................................ 34 Summary ..................................................................................................................................................... 34 CHAPTER 5........................................................................................................................................................ 36 DESIGN AND IMPLEMENTATION ...................................................................................................................... 36 5. Device and Software............................................................................................................................ 37 5.1.1 Computer ............................................................................................................................................ 37 5.1.2 Fingerprint Reader ............................................................................................................................ 38 5.1.3 Software Development Kit (SDK) ...................................................................................................... 38 5.2. Griaule Software Development Kit (SDK)........................................................................................... 38 5.3. Steganography...................................................................................................................................... 39 5.3.1. What is Steganography Used for? .................................................................................................... 39 5.3.2. Steganography and Biometric Fingerprint Image ........................................................................... 40 Page | 3
  • 4. University of Glamorgan 5.4. Steganography Using .Net Algorithms and Techniques ..................................................................... 40 5.5. Generation of Steganography in .Net .................................................................................................. 40 5.6. Fingerprint Image and Steganography ............................................................................................... 41 5.6.2 Application Structure ......................................................................................................................... 41 5.6.2 Application Process ............................................................................................................................ 41 5.6.2.1 Enrolment Process .......................................................................................................................... 42 5.6.2.2 Conversion of Image ....................................................................................................................... 42 5.6.2.3 Steganography................................................................................................................................. 43 5.6.2.4 Stego Library ................................................................................................................................... 44 5.6.3 Decoding the Image ........................................................................................................................... 45 5.6.4 Development Limitations ................................................................................................................... 46 5.7 Fingerprint and Byte Stream ................................................................................................................ 46 5.7.1 Application structure.......................................................................................................................... 46 5.7.2 Application Process ............................................................................................................................ 47 5.7.2.1 Enrolment Process .......................................................................................................................... 47 5.7.2.2 Random Number Generation ......................................................................................................... 47 5.7.2.3 Verification Process ........................................................................................................................ 48 5.7.2.4 Template Attack and Verification ................................................................................................... 49 5.7.2.5 Securing the Template .................................................................................................................... 50 5.7.3 Application Limitations and Advantages .......................................................................................... 50 Summary ..................................................................................................................................................... 51 CHAPTER 6........................................................................................................................................................ 52 RESULTS AND CONCLUSION ............................................................................................................................ 52 APPENDIX A...................................................................................................................................................... 55 APPENDIX B ...................................................................................................................................................... 57 REFERENCES .................................................................................................................................................... 57 Page | 4
  • 5. University of Glamorgan Table of Figures FIGURE 2 BIOMETRICS DEVICE MARKET 2003 ...................................................................................................... 11 FIGURE 1 FORECAST FOR BIOMETRICS MARKET 2003........................................................................................... 11 FIGURE 3 BRETILLON MEASUREMENT SYSTEM (YORK 2003) ............................................................................... 12 FIGURE 4 BRETILLON FINGERPRINT CARD (FIGURE 4) (YORK 2003) .................................................................... 13 FIGURE 5 DIFFERENT HUMAN TRAITS (FIGURE 5) .................................................................................................... 14 FIGURE 6 TABLE 1 BIOMETRICS TRAIT .................................................................................................................... 16 FIGURE 7 - TABLE 2 TRAITS COMPARISON ............................................................................................................... 16 FIGURE 8 AN EXAMPLE OF BIOMETRIC ATM MACHINE ........................................................................................... 18 FIGURE 9 BIOMETRIC SYSTEM COMPONENTS ........................................................................................................ 18 FIGURE 10 A SAMPLE FINGER PRINT INPUT .......................................................................................................... 19 FIGURE 11 POSSIBLE AREAS OF VULNERABILITIES BASED ON (N.K. RATHA 2001) .............................................. 21 FIGURE 12 OPTICAL SENSOR ................................................................................................................................. 31 FIGURE 13 FINGERPRINT TEMPLATE RESOLUTION ................................................................................................ 32 FIGURE 14 FINGERPRINT RIDGES ........................................................................................................................... 33 FIGURE 15 DELL INSPIRON .................................................................................................................................... 37 FIGURE 16 MICROSOFT FINGERPRINT READERS ................................................................................................... 38 FIGURE 17 ENROLMENT PROCESS ......................................................................................................................... 42 FIGURE 18 ENROLMENT PROCESS ......................................................................................................................... 42 FIGURE 19 IMAGE CONVERSION ............................................................................................................................ 43 FIGURE 20 CREATING STEGO FILE......................................................................................................................... 44 FIGURE 21 DECODING THE IMAGE ......................................................................................................................... 45 FIGURE 22 ENROLMENT PROCESS ......................................................................................................................... 47 FIGURE 23 RANDOM NUMBER ............................................................................................................................... 48 FIGURE 24 VERIFICATION PROCESS ....................................................................................................................... 49 FIGURE 25 ATTACK ............................................................................................................................................... 49 FIGURE 26 SECURING TEMPLATE .......................................................................................................................... 50 FIGURE 27 ALGORITHM ......................................................................................................................................... 56 Page | 5
  • 6. University of Glamorgan Abstract Technology is becoming an essential part of human life as it increases the attention towards security and privacy. A person logs into several systems in a day and every log, authenticates or identifies him into the system. Biometrics provides a reliable and natural solution to verify a user or to identify a person. The confidence to accept biometric will depend on the guarantee from the designer that the application is robust with low error rates and security. But as much biometric systems are authentic, the vulnerabilities remain present. This study particularly aims towards template security, explaining how biometric systems thoroughly enlighten the various threats and point of attacks, describing the structure of template and how it is acquired. Leading toward the solution for the template attacks, the solution suggested in this paper is robust and customizable providing backward compatibility based on previous studies. Page | 6
  • 7. University of Glamorgan C hapter 1 Introduction Page | 7
  • 8. University of Glamorgan 1. Introduction There have been many events in the world, which directed attention towards security and safety. Most of the attention to security is regarding passengers in airports. However, there is one more type of threat which is not visible to a normal person. Hackers, who attack a system use some techniques modify the information and then manipulate the system to compromise with the security. The growth of information technology has been explosive. Technology was never mishandled in order to access other’s personal information, but now we can evidently see the propagation of misusing technology in order to penetrate in to every human activity. Computers have helped human being to explore new horizons in many areas of studies like human genome, artificial intelligence and application which helped in enhancing human life. From a small sales application to big financial solutions all information is secured on database servers and can be accessed from anywhere. Computer systems, and their interconnecting networks, are also prey to vandals, malicious egotists, terrorists, and an array of individuals, groups, companies, and governments' intent on using them to further their own ends, with total disregard for the effects on innocent victims. Apart from attacks on computer networks externally there are methods of destruction which are unintentional. Computer security can be defined as a state in which a person cannot compromise with a system or cannot damage a system intentionally and it is free from external threats. The purpose of information system security is to optimize the performance of an organization with respect to the risks to which it is exposed. Security is not only important for Operating Systems and Networks but we have to secure the physical access to the system as well. This study begins with introduction to biometrics. Biometrics refers to identify a person based on his physical or behavioural characteristics. Biometrics is adopted today in most of the organizations from attendance of employees to border clearance. This study goes to the greater depth from the origin of biometrics, history and modern technologies, explaining how the physical and behavioural characteristics are categorised and the mechanism of typical biometrics system in brief. Later, describing the threats on biometric system which is the core part of this study. No doubt biometric is very strong and authentic to identify or verify a person but still it is vulnerable. These threats have been explained in Second chapter. The main emphasise of the study is on fingerprint biometrics system which has been implemented vastly over the years. This is due to the fact that it is cheap, accurate and easy to implement as compared to other biometric systems available in market. In order to spread biometrics it is important to ensure security integrity of the product. Fingerprint is not only being used in US or Europe It is also being implemented in south Asia and Middle East now. Once a product is famous in market the vulnerability increases. Vulnerabilities are of different nature with regards to biometrics. Biometric threats are also interlinked with computers as well, because at a level the information is stored on computer based databases. Hacker can attack the database and steal the template that holds the important information. Hence, the template is the core part of the biometric system. The third chapter is going to focus more on the work of other authors, describing what they have implemented so far and will also highlight the limitations and Page | 8
  • 9. University of Glamorgan weaknesses. This study is based on these hypothetical literature and concepts to secure biometrics. The fourth chapter will keep main focus on the template, which will explain how the template is acquired and which sensor is being used in this study. It will also explain the mechanism of the sensor and how the image is acquired. Finally will cover, what are the characteristics of a template. This information will help us to understand the weaknesses and how to overcome the weakness of the computer based biometric vulnerabilities. After carefully understanding the current biometrics system, and threats, this study provides a solution based on combination of different technologies and previous research in chapter five. This solution will provide more security to the biometrics system which is very necessary. As biometric traits are the features of human being this cannot be replaced or altered. Summary This chapter explains about the structure of this paper. It begins explaining the origin and reason why it is important to work on biometric template. Biometric template which is not only the soul of the system but it can be used against the system. This study will prevent the hackers or attackers to replace and modify the template. The solution proposed in this study is not only efficient and robust but also cheap and easy to implement and provides a backward compatibility as it is on software level. All topics are explained step by step helping to understand the biometric system and solution for the threats. Page | 9
  • 10. University of Glamorgan C hapter 2 Introduction to Biometrics System Threats and Vulnerabilities Page | 10
  • 11. University of Glamorgan Currently, information is mainly secured by using password or some memorable information from the end user. This type of authentication system is not secure because if someone can retrieve a bit of information out of end user they can access their bank accounts and personal computers. These weaknesses in standard validation systems can be avoided if we can use human body for validation. The word biometrics originated from the Greek language, Bio means life and Metron means measures. Modern day technology companies are trying to embed biometrics system with in hardware and gadgets. Biometrics is being used almost and it has some befits e.g. reduced cost, easy and simple user for end user, less need for system support and improved security for the business owners. Now a day it is being used in many organizations and with many devices e.g. ATM’s, Passport authentication, border controls, ID cards, Computer system user ID authentication, Physical access control and fraud prevention. With the passage of time government and organization are looking forward to improve and implement biometrics systems for better security. Forecast growths in the market of biometrics systems have showed a huge change since 1999. $2,500.00 $2,000.00 $1,500.00 Millions of Dollar $1,000.00 $500.00 $0.00 1999 2000 2001 2002 2003 2004 2005 Figure 1 Forecast for Biometrics Market 2003 There are many biometrics systems available in the market which I am going to discuss later on but fingerprint scanning systems is amongst the leading ones. In 2001 it was half of the market was claimed by the fingerprint scanning devices. According to Dan riley, vice president of SecuGen “One of the main reasons was because fingerprint identification and verification is a very old, tried-and-tested technology, with lots of confidence in the technology and the ability to develop excellent-quality, low-cost solutions,” (Biometrics 2001). Finger Scan Voice Scan 10% 49% 15% Signature Scan 12% Iris Scan 1% 6% 3% 4% Figure 2 Biometrics Device Market 2003 Page | 11
  • 12. University of Glamorgan The reason why finger print biometrics system are being used so widely all over the world is because it is one of the earliest methods implemented to identify a person. Nevertheless, there are still some organizations that do not adopt this mechanism as they think it is not very authentic. Companies are trying to improve and evolve it which we are going to discuss later on. As we speak about the cost of biometrics devices fingerprint are once again the cheapest ones which are available in market and can purchase from 60$ to 130$ in market from many different vendors. Comparatively, iris scan is four to six time expensive than fingerprint scanners. According to British National Physical Laboratory facial scan has become third largest amount revenue in world. (Biometrics 2001) 2.1 History of Biometrics Systems Biometrics has been previously related to forensics science. Modern day biometrics system is more related to forensics than security purpose. According to CSI survey 15% out of 687 organizations are using biometrics system. Early references to biometrics, as a method to identify a person were around thousand year back. East Asian potters use to place their finger print on products as a brand identity. In ancient Egypt trusted traders were identified based on certain characteristics such as height, eye colour and complexion. (JD.JR., Biometrics Background 2000) Biometrics was not very famous as field in late 18th Century when to police clerks from Paris found a solution that taking measurement of different body parts of adult can identify the convicted criminals as the body parts of adult don’t change overtime and can be used to identify later on. (Record 2002) The Bretillon system, also known as bretillonage and anthropometry has been widely accepted. It is used around the world for decades depict a series of Bretillon measurements as they were used in USA at the beginning of 20th century. The measurements included the width and length of the head and of the right ear, the breadth of the outstretched arms, the length of the left foot, the left form arm and the left little finger as well as the body and trunk heights. (Canton 2203) Figure 3 Bretillon Measurement System (York 2003) Page | 12
  • 13. University of Glamorgan An abrupt end to the use of anthropometrics was caused by an incident in 1903, when two identical twins, that in later investigation were discovered to be separated at birth, were registered at the united state penitentiary at Leavenworth, Kansas with measurement as close enough to identify as one person. They looked exactly the same so the identification was only possible only using fingerprints. (Canton 2203) Figure 4 Bretillon Fingerprint Card (Figure 4) (York 2003) In 1891 the inspector general of Bengal police, Sir Edward Henry, got interested in the work of Sir Francis Galton and others considering fingerprints as a mean of identification. In 1896 an order was issued by Henry, which in addition to Bretillon finger prints should be taken from every prisoner. With the help of his assistant he was able to make classification system allowing thousand of fingerprints to be easily filled, searched and traced. Henry was assigned as Assistant Commissioner of Scotland Yard in 1901 where the first finger print bureau was established in the same year. After the failure of anthropometry in 1903, the Henry fingerprint system quickly gained worldwide acceptance as the means of identifying criminals. It is still used in much the same way today (Record 2002). Automated means of human recognition first appeared as an application for physical access in the early 1970s. One of the first commercially available biometrics system was a finger measurement device called identimat, which was installed n 1972 to serve a wall street company, Shearson Hamil, as a time keeping and monitoring application. (JD.JR., N.M and P.T, Biometrics Identity Assurance in The Information Age 2003) 2.2 Biometrics Traits There have been many human characteristics used to identify human for biometrics application. To categorize human characteristics some question come in mind, what are the requirements? Are there any general identifiers? What are the technologies can they meet the general requirements? This section is going to cover the answers to these questions. 2.2.1 Requirements for Biometrics Traits There are some general requirements which should meet to qualify with a Biometric system. • Universality: Every Human Has. • Uniqueness : This Means That Trait Should Be Different From Person to Person • Permanente : The Trait Should Not Change With Time • Collectability: The Trait Can Be Measured Page | 13
  • 14. University of Glamorgan According to (A.K., S and S 1999) there are some more factors which should be considered for categorizing traits. • Performance: To achieve the best possible identification environmental factors should be consider with the combination of minimum cost. • Acceptability: Future user should accept the system. • Circumvention Resistance: It should be difficult to fool with the system. • Cost Effectiveness: Maintenance and installation should be in reasonable cost. We cannot find all the characteristics or requirements in a single biometrics device but each system or device has its own strength and qualities. 2.2.2 Classification of Biometrics Traits According to the National Institute of Standards (2003) Biometrics system is divided into two categories of biological measurements. • Physiological Characteristics • Behavioral Characteristics Figure 5 Different Human Traits (Figure 5) i. Physiological Characteristics These traits are obtained from the human anatomy e.g. DNA, Fingerprint, and Face, Iris or the retina. Data is generated by the analysis and the measurement of structure of the human body parts. It is important to understand that physiological traits are not necessarily genetically determined; therefore, a differentiation between genotype and phenotype features must be made. (Daugman 1999) • Genotype There are about 1% people in world, that have similar genetic code or in other words we can say they are monozygotic twins. An example which we have discussed of west Page | 14
  • 15. University of Glamorgan brothers, in genetics monozygotic twins share all their characteristics like blood group, DNA structure and gender etc. • Phenotype These are the features which are unique unlike to genotypic features. In the west brothers for example finger prints were use to identify them. Fingerprints and iris are one of the examples of phenotypic characteristics. Some features can expose both genotype and phenotype factors of a human like face which changes throughout the age, but still identical twins can look similar in any stage of age. ii. Behavioral Characteristic Today if we want to open a bank account in the UK, they require our signatures on a device and later on if you want to make a query regarding your account they match your signature with the stored information on the computer. Human has some behaviors which are unique from person to person. According to International Biometrics Group “Behavioural characteristics are based on an action taken by a person. (Group 2003) Behavioural biometrics, in turn, is based on measurements and data derived from an action, and indirectly measure characteristics of the human body. Voice recognition, keystroke-scan, and signature-scan are leading behavioural biometric technologies. One of the defining characteristics of a behavioural biometric is the incorporation of time as a metric – the measured behaviour has a beginning, middle and end.” (Group 2003) Humans, learn their behaviour or are trained hence it can be changed. By the passage of time with the growth of age prominent changes also occur in the behaviour of human so it becomes more difficult to achieve them. (JD.JR., N.M and P.T, Biometrics Identity Assurance in The Information Age 2003) Still behavioural characteristics can be used as biometrics traits even if they are not permanent. Below in the given table you can see the categorization of biometrics traits in groups. There are some traits which are not used widely in the table e.g. Blood Chemistry and body odour. But we are going to study commonly used traits in detail. Category Biometrics Trait Hands Fingerprints Palm Prints Hand Geometry Hand, Palm and Wrist Vein Patterns Spectroscopy Skin Analysis Nail bed Scanning Head and Face Face Recognition Iris Retina Ear Shape and Size Other Physical Characters Body Salinity Blood Chemistry Body Odor Page | 15
  • 16. University of Glamorgan DNA 3D Thermal Imaging Neural Wave Analysis Behavioral Characteristics Gait Pattern Voice Recognition Signature Recognition Keystroke Dynamics Figure 6 Table 1 Biometrics Trait 2.2.3 Comparison of Biometrics Trait and Technology To get a better understanding of why some technologies are more preffered and are being used widely in market, we have to create a table based on analysis and perception of (A.K, R and S, BIOMETRIC- Personal Identification in Network Society 1999) and (Corporation 2002). Perform effective Accepta Perman Univers resistan Circum vention Unique Collect ability Cost- bility ance ence ality ness ness Characteristics Finger Print Med Hi Hi Med Hi Med Med Med Hand Geo. Med Med Med Hi Med Med Med Med Retina Hi Hi Med Low Hi Low Hi Low Iris Hi Hi Hi Med Hi Low Hi Low Face Hi Low Med Hi Low Hi Low Med Vascular Pat. Med Med Med Med Med Med Hi Med DNA Hi Hi Hi Low Hi Low Low Low Ear Shape Med Med Hi Med Med Hi Med ? Body Odor Hi Hi Hi Low Low Med Low ? Facial Thermo. Hi Hi Low Hi Med Hi Hi Med Voice Med Low Low Med Low Hi Low Hi Signature Low Low Low Hi Low Hi Low Med Keystroke Low Low Low Med Low Med Med Hi Gait Pattern Med Low Low Hi Low Hi Med ? Figure 7 - Table 2 Traits Comparison In the table we can see that the comparison is based on available technologies based on available basic eight requirements. They have been compared using “Hi”, “Med” and “Low”. Question Page | 16
  • 17. University of Glamorgan mark indicates that the data is not available. Cost effectiveness of biometrics system has not been calculated yet of some technologies. From the above chart we can conclude many results as explained below. • Behavioral biometrics performance is not as good as we compare it to physiological. • Permanent traits are DNA, Iris, Retina Body odor and Fingerprint. • DNA and Facial Thermograph shows better performance in the chart, Body Odor shows that it is unique permanent and universal. Iris and DNA can make a very strong biometric. But some technologies still need improvement like Body Odor. • Biometrics system like DNA and Iris are expensive comparatively Fingerprint and Hand Geometry are cheaper. • Acceptability is higher when information or data is gathered without the information of end user e.g. Facial Thermograph and ear shape recognition. User mostly likes to provide identity which they are familiar with like voice recognition and signature dynamics. 2.3 Biometrics User Authentication In early days to identify a person some sort of physical information used to be stored. This information was in several formats e.g. Picture, Physical measurements, Fingerprint or a picture. Modern days same methods are used in a different way, these information are kept into a database and then cross matched to verify a person. But sometimes due to injuries or accident we cannot authorize a person. In one case a person had his burnt his finger accidentally hence the prints were damaged so when he tried to scan his finger from the device it was not allowing him to do so. People, have the tendency to leave their information where ever they go e.g. latent finger prints on surfaces, recorded voice print and video recording of face can generate bogus authentications. Secondly a trained attacker can intercept the information stored in the database and replace them with the fake one. Therefore, accurate information is only possible if the system can ensure that the information stored in the system is of the live people. (JD.JR., N.M and P.T, Biometrics Identity Assurance in The Information Age 2003) Even though biometric technologies are far from being an authentication panacea, they represent a very promising method, especially when combined with other authentication techniques. (A.K, R and S, BIOMETRIC- Personal Identification in Network Society 1999) Again, it has been demonstrated that every system created by human is defeated by human. In terms of authentication techniques, all factors suffer from fundamental weaknesses. (JD.JR., N.M and P.T, Biometrics Identity Assurance in The Information Age 2003) Every authentication system can be cracked e.g. Information like password and pins can be hacked. Properties like cards can be stolen and biometric information can be swapped by someone. Some systems accept two types of authentication token based a knowledge based. For instance, when we need to make a transaction from the ATM, we have to swipe in the card then enter the pin. In 1999 25% people write down their pins on the card and due to these companies had to face hug loss. (Anil K. Jain 1999) Now suppose we replace the pin with biometrics authentication. Let’s take Iris scan, as a personal identifier some companies already tried to use it as a replacement of PINs. Page | 17
  • 18. University of Glamorgan Figure 8 An Example of Biometric ATM Machine There might be some complications like position problem of user but if it is implements it will be far stronger then PINs. 2.4 A Standard Biometric System Apart from the technologies, whether it is an iris, finger print or DNA all biometric devices follow almost similar mechanism I m going to explain it in detail below. A biometrics system is based on five basic subsystem according to (Jhon D. 2003) and (J.L. Wayman n.d.) For i.e. acquisition, transmission, signal processing, data storage and decision policy. Data Signal Decision Policy Matching Review Pattern Biometric matching Match ? Quality Score Presentation Quality Control Accept ? Sensor Extraction Sample Sample Template Yes/No Transmission Data Storage Compression Templates Expansion Sample ` Transmission Images Channel Based on (John D. Woodward 2003; J.L. Wayman August 2002) Figure 9 Biometric System Components Page | 18
  • 19. University of Glamorgan i. Data Acquisition (James Wayman 2004) States that biometric data flow begins with the collection of physiological and behavioural characteristics and every biometric system is based on two assumptions. • Uniqueness: Biometric trait is distinctive among all human beings. • Repeatability: Measurements can be repeated over time Figure 10 A Sample Finger Print Input A sensor is used to measure characteristic of an individual. For each system biometric system is standardize so if information is collected from one system can be matched on other systems as well. The information captured by the sensor is stored into database as a template. Every template has its own attributes depending on what type of trait is being used or read by the sensor. ii. Transmission The captured template is stored in a standard format e.g. image acquired by the sensor is saved as JPEG (Join Photographic Expert Group) facial images, WSQ (Wavelet/Scalar Quantization) for fingerprint and CELP (Code Excited Linear Predication) is used for voice data. This information is then transmitted to data processing so it can be saved in the database. Sometimes the sensor is located somewhere else and data processing is somewhere else. During the transmission of the data compression is done to save the bandwidth. Due to compression the quality can be poor. Developments in technologies are introducing new methods of compression so loss can be reduced. iii. Signal Processing As described in Figure 10, signal processing is performed in three steps, initially it is a mechanism in which the template is created from the information that is received from the sensor. • Feature Extraction • Quality Control • Pattern Matching iv. Feature Extraction It is a mechanism in which the biometrics system extracts the required information out of the trait from a particular biometric device. In this scenario, it is an iris scanner which willbe Page | 19
  • 20. University of Glamorgan observe how the feature extraction works with it. This task is performed by localizing the iris, pupil and both eyelid boundaries, excluding pupil and eyelashes from the photo and creating an iris mapping that are invariant to size, distance, magnification and pupil dilation. After that an iris code is generated(Daugman 1999) we will discuss it later. v. Quality Control After the feature extraction a quality check is performed which calculates the score output. If the received signal from the device is insufficient and there is some incomplete information. For e.g. If there is some dust on the sensor or some metal is on the sensor, automatically a request is sent back to the user for rescan. There have been many major updates in quality checking in biometrics system in past few years. vi. Pattern Matching After the extraction and quality check pattern matching is performed, if there is a mismatch with the data, the enrolments takes place. This is the process in which new user enrols himself and the information is stored in the data base along some external information passed by the system owner or administrator. There are two types of enrolments further in one case if user claims about an identity then the match is 1:1 otherwise system has to perform a 1: N match. In which the pattern is matched with all the available templates in database. As a result of matching the decision policy system checks the score which is a measurement of similarity between the database templates and the one extracted from the device. vii. Data Storage After signal processing these templates are stored to a database management system so when a user enrol system can make a comparison, Databases for biometrics systems varies from systems to systems depending on the nature of application. For systems which are based on 1:1 matching. Templates are stored on something which can be in possession of an individual e.g. magnetic strip cards or smart cards. When someone tries to identify them the system asks for a token and then verifies the image with the template on the card. The database is used in such cases as well. In 1: N matching systems a centralized database is designed. These kinds of systems perform better and also the occurrence of faults and errors can be vastly reduced. These databases are divided then into smaller partitions. In this way the templates are matched with corresponding information in the database instead of whole database. viii. Decision Policy This subsystem determines the results of the match whether they are right or wrong. These results are based on quality score and matching score received from the signal process. For some systems, it can be very simple but for alternatives it can be sophisticated e.g. a simple system might have a matching score and if a signal generates the highest score it is matched. Page | 20
  • 21. University of Glamorgan In a sophisticated system there can be many factors i.e. time variant threshold, user dependant and high score. 2.5 Threats to Finger Print Biometric System When a hacker attacks a typical system it is difficult from a biometric security system. In Denial of Service Attack and attacker corrupts the authentication so the users cannot use it. Hacker bombards so many bogus access requests on biometric system, an online authentication server that processes access request to a point where the server’s resources cannot handle any more queries. In circumvention, an attacker gains access of the system by destroying the authentication application. This threat can lead us to the modification of data or access to the information which is not allowed to access by external users. (Maltoni 2005) In contamination attacker copies the biometric information of a user e.g. a fingerprint from the surface and use that print to access biometric security system or access the information. In repudiation attacker denies that he accessed the system and can argue that False Accept Rate phenomenon associated with biometric system might caused the problem. In collusion legitimate user with wide privilege to the system is that attacker (System Administrator) (Maltoni 2005). 2.6 Threat Vectors Understanding how biometrics is categorized based upon the physical properties. Similarly biometrics attacks are performed on the system at different levels, some of these attacks are on physical level and with the personal contact with biometric system e.g. bogus biometric attack is a type of physical attack in which attacker uses latent fingerprint and use it on the system to compromise with security. After compromising the security it can manipulate the system steal personal information of a person and let access to unauthorized people to a certain area. This section will explain how many types of attacks can be performed on which stage during a biometric process which has been explained above in detail. We have discussed some types of attack above; according to (N.K. Ratha 2001) there are about eight types of attacks which can be performed on a typical biometric system. These possible attacks areas are called threat vectors. 1 Sensor ` 2 7 6 3 Feature Extraction 4 5 Matcher Template Database 8 Decision Figure 11 Possible Areas of Vulnerabilities Based on (N.K. Ratha 2001) Page | 21
  • 22. University of Glamorgan Computer systems have been the target of attacks from a variety of sources almost since they were first used. Early examples of exploitation were generally related to fraud. In more recent times, hackers, organised crime and a variety of other cyber-criminals have attacked computer systems. Information systems also have to deal with viruses, worms and Trojans seeking to disrupt systems or steal data. Again, this is not unique to biometric systems and there are now well-established standards, frameworks, policies and process as well as legislative support, for the protection of information systems. The most important factors are proper systems and security design and proper implementation and on-going management, rather than the use of biometrics per se. (Roberts November 2005) The first threat to biometrics technology was recognized by several authors (D, et al. 2003) (A.K., S and S 1999) (G.L and F 2003). When an authentication is used on large scale, the reference database has to be made available to many different verifiers, who in general, cannot be trusted. Especially in a network environment, attacks on database pose a serious threat. It was shown explicitly by Matsumoto et al (G.L. and F 2003). that using information stolen from database, artificial biometrics can be constructed to impersonate people. Construction of artificial biometrics is possible if only a part of the template is available. Hill (A, A.K and J 2003) showed that if only a minute template of a fingerprint is available, it is possible to successfully construct artificial biometrics that pass authentication. The second threat was addressed by Schneier (S and A.K 2002). The problem is concisely paraphrased by: “Theft of biometrics is theft of identity.” The threat is caused by the fact that biometrics contains sensitive personal information. It is shown by the author (A.K, R and S, BIOMETRIC- Personal Identification in Network Society 1999) (T and F n.d.) (X and L 2003) That a fingerprint contains certain genetic information. 2.7 Types of Attacks Schneier (B 1999) compares traditional security systems with biometric systems. The lack of secrecy (e.g. leaving fingerprint impression on the surface we touch), and non replace ability (e.g., once the biometric data is compromised, there is no way to return to a secure situation, unlike replacing a key or password) are identified as the main problems of biometric systems. (D, et al. 2003) Describe the typical threats, for genetic authentication application, which may result in quite different effects for traditional and biometrics-based systems. In Denial of Service (DoS), an attacker corrupts the authentication system so that legitimate users cannot use it, for a biometric authentication server that processes access request (via retrieving template from a database and performing matching with the transferred biometric data). Biometrics attacks have been categorized in three sections according to their nature as below. 2.7.1 Physical Attacks These attacks are mainly on the biometric devices sensor or biometric readers. Most of these attacks have been performed on fingerprint biometric system. Page | 22
  • 23. University of Glamorgan i. False Enrolment The accurate data of legitimate user is enrolled, if it is fake then data will be accurate but it will be matched incorrectly. For example a passport application once registered the system data will identify it and give privileges to the system ii. Bogus Physical Biometrics We have numerously seen in the movies, when someone tries to access a security area breaking a biometric system. Person uses a fingerprint left from some surface. This vector is most prominent one from all. This attack is performed without any technical knowledge it is very cheap and easy in modern days when we have digital cameras. These attacks are made only on iris, palm and fingerprint biometrics systems. • Bogus Digital Biometrics When we talk about biometrics attacks, masquerade attacks are on the top of list. They are fake digital patterns which are used to break biometrics systems. Second ones are reference attacks in which attacker gathers technical information of a biometrics system and has digital copies of the templates to replace them from the database or during the enrolment. • Latent Print Reactivation Human sweats glands produce oil which sweats from hands. When someone touches surface marks of print are left on it. These prints can be copied and used on biometrics devices. These types of attacks are done on finger and palm print reader. 2.7.2 Computer Based Attacks In this type of attack mainly the target is computer system i.e. server, databases or networks connected with the system. i. Override Feature Extraction In this type of attack hackers interfere with the feature extraction process, this attack is also used to disable a system or for DoS. It is usually conducted on hardware or software firmware. ii. System Parameters In such kind of attacks system parameters are changed. If someone changes the percentage or score of FAR (False Acceptance Rate) that will result that poor quality data can be verified. iii. Match override In these types of attacks, matching decisions are changed or ignored. Parameters are changed by authorised person only or the hacker should have access to the system. iv. Decision Override This is also called a bypass attack which ignores all the process. In this type of attack the Page | 23
  • 24. University of Glamorgan decision is changed data is injected the decision. In this type of attack some physical tempering may be involve. v. Modification of Rights If someone gets unauthorised access to system administration accounts and creates a user with admin privileges. This can cause a DoS attack. vi. Systems Interconnections If two systems are interconnected it is possible to get two types of threats, one is from the external system which is interconnected with biometrics system and second one is the network which is connecting the two systems. Usually these kinds of threats are handling by the people administrating biometrics systems. vii. System Weaknesses Weaknesses and Flaws in the design of a system may create some vulnerability. Some time organizations use customization and integrate their Biometrics security system with the secondary system. These weaknesses maybe occur in • Operating Systems i.e. Server or clients • Storage Management i.e. Operating Systems • Biometrics Software • Database • Sensors • System Configurations These problems are noticeable in other technologies as well as biometric systems but we have to accept these as weaknesses which may lead hacker to compromise with the system. viii. Denial of Service Attack DoS are the worst vector threat. They vary in different types of attack from power loss to system attacks design to corrupt biometrics security systems. Changes in the environmental condition dust or light can change the quality of biometrics sensor reading. Adding electrical or radio frequency can corrupt the data e.g. spilling liquid on sensor or introducing portable light to the sensor. DoS attacks are usually noisy and they can be noticed easily. 2.7.3 Template Attacks These attacks are mainly on templates and are usually on databases. The nature of these attacks is modification of template and then attacker compromise with the system. i. Reuse of Residual In some biometric systems templates are stored in temporary memory after extraction. If hacker gains access to the memory, they can copy the information and use it next time. Page | 24
  • 25. University of Glamorgan ii. Data Injection This type of attack both the system and stored data are compromised. If attackers gains access to the system, it would be easier to manipulate data in the database as it is not encrypted. For these types of attack system and template knowledge is essential. iii. Template Modification Templates are stored on different media (Cards, Tokens or Biometrics Devices). In this type of attack hacker modifies or adds information to the storage media. In this type of scenario information is added and then unauthorised access is allowed by providing a false ID. iv. False Data Injection This type of attack takes places in three steps. The attack can also be placed in the category of man in middle attack. First the data is intercepted when sensor transfers the information to processing system. Mostly this is don’t on physical level e.g. data is stored on a card or RFID and it is unencrypted first. Secondly, the data is modified and then finally the signal is replayed. Encryption of the data increases the complication of the data and also is used as a defence strategy. v. Synthesised Feature Vector Hill Climbing is a technique which is mentioned in various articles on biometric security. According to (Anil K. Jain 2005) in this technique false biometrics information is injected into the system but every time the changes into templates are made which can increase the matching score. In this technique access to system match score and communication channels is necessary.(Anil K. Jain 2005) Templates attack is different from above mentioned two attacks as they can be secured by several security measures. If a template is copied once system can compromise to some extent which can grant access to attacker to any level. This paper will mainly focus on template attacks. Summary This chapter explains traits, mechanism of biometric system and threats to biometric systems. Biometrics is divided based or different properties called biometric traits, which are categorized under physical and behavioural traits. Mechanism of biometric system has been explained in depth from the acquisition of biometric trait to storage in database and verification of a user. By understanding in detail a typical biometric system threats can be outlined. These threats are further segmented based on their nature. • Physical • Computer Based • Templates Attack Templates attacks are most dangerous attack in biometric system. As if a template is acquired and attacker can compromise with the system then nothing can be done on physical and computer based security. Page | 25
  • 26. University of Glamorgan C hapter 3 Previous Work and Limitations Page | 26
  • 27. University of Glamorgan 3 Different Approaches Analysing the above mentioned attacks, an attacker can clandestinely obtain biometric data of legitimate users e.g. lifting a latent fingerprint and constructing a three-dimensional mould and use to access system. Further the biometric data associated with specific application can be used to another unintended application e.g. it can be used to retrieve medical records. Cross application usage of biometric can be more often as many organizations prefer biometric applications. (D, et al. 2003) The problem may arise from the above mentioned attacks on biometrics systems are raising concerns as more and more biometrics systems are being deployed both commercially and in government applications. (Enhanced Border Security and Visa Entry Reform 2002) This is along with the increase in the size of the population using these systems and the expanding application areas i.e. visa, border control, health care, e-commerce etc. may lead to privacy and security related breaches. As I have discussed several types on attacks on biometric system. There are some attacks mentioned above which are mainly related to biometric templates. The template is the core of a biometric system. In this paper I am going to propose a system which will reduce the threats to template modification or bogus attack on a fingerprint biometric system. Several work has been done on biometric template security, but not been implemented practically in any biometric technology. In order to prevent hill climbing attack Southar (C n.d.) has suggested the use of coarsely quantized match scores by the matcher. However Adler (A. A May 2004), demonstrated that it is still possible to estimate the unknown enrolled image although the number of iterations required to converge is significantly higher now. Yeung and Pankanti (M and S 1999) describe an invisible fragile watermarking technique to detect regions in a fingerprint image that has been tampered by the attacker. In the proposed scheme the chaotic mixing procedure is employed to transform visually perceptible watermark to a random-looking textured image in order to make it resilient against attacks. This mixed image is then embedded in fingerprint image. The author shows that the presence of the watermark does not affect the feature extraction process. The use of watermark also imparts copyright capability to identifying the origin of the raw fingerprint image. IBM is one of the leading vendors in biometrics industry. Many of IBM products have built in fingerprint sensors i.e. laptops. IBM suggested that if the techniques presented here for transforming biometric signals differ from simple compression using signal or image processing techniques. While compression of the signal causes it to lose some of its spatial domain characteristics, it strives to preserve the overall geometry. (N.K., J.H. and R.M. 2001) That is, two points in a biometric signal before compression are likely to remain at comparable distance when decompressed. This is usually not the case with our distortion transforms. Our technique also differs from encryption. The purpose of encryption is to allow a legitimate party to regenerate the original signal. In contrast, distortion transforms permanently obscure the signal in a noninvertible manner (N.K., J.H. and R.M. 2001). Page | 27
  • 28. University of Glamorgan Ferri (L, et al. 2002) proposed an algorithm to embed dynamic signature features into face image present on ID cards. These features are transformed into a binary stream after compression (used in order to decrease the amount of payload data). A computer generated hologram converts this stream into the data that is finally embedded into blue channel of the image. During verification the signature features hidden in the face image are recovered and compared against the signature obtained on-line, Ferri (L, et al. 2002) report that any modification of the face image can be detected, thereby disallowing the use of fake ID cards. On the other hand Jain and Uludag suggest the use of steganography principles to hid biometric data in host image. This is particularly useful in distributed systems where raw biometric data may have to be transmitted over a non secure communication channel. Embedding biometric data in an innocuous host image prevents an eavesdropper from accessing sensitive template information. The author also discusses novel application where in the facial features of a user are embedded in a host fingerprint image. In this scenario, the watermarked fingerprint image of a person may be stored in a smart card issued to that person at an access control site. The fingerprint of the person possessing the card will first be compared with the fingerprint present in the smart card. The eight coefficients hidden in the fingerprint image can then be used to reconstruct the user face thereby serving as a second source of authentication (A.K and U, Hiding Biometric Data 2003). Pros and Cons In summary, their published work attempts to deal with the biometric template security issue. Some of them address how to handle biometric based key schemes. The most promising approaches tolerate the variations in biometric solutions, but few of them are practically feasible for biometric template as the rate of matching biometric template decrease with the variations. This paper will work on the purposed solution provided by Jain and Uludag mentioned. Steganography can be used to hide encryption inside the template. Steganography will be discussed in detail in chapter five. This paper will introduce an application which will use steganography with fingerprint biometric template on software template. This is easy and robust also it can be used with previous hardware. Summary Security has been concern since long time and people have been working on it. Similarly goes with biometrics. Authors directed our attentions to different threats and provided possible solutions over the years. Some of the solutions were implemented practically but results were not desired. Improvements have been made in such areas specifically talking about fingerprint biometrics watermarking and steganography helped a lot in encryption of biometrics. Page | 28
  • 29. University of Glamorgan C hapter 4 Fingerprint Sensor and Image Page | 29
  • 30. University of Glamorgan Modern day organizations are developing their own solutions for business purpose. These businesses are running on internet and millions of users are logging into the website purchasing products and spending money over the internet through credit cards. There is no proper authentication system available for end user over the web apart for traditional security asking for memorable question or security pin etc. In this section I am going to explain and design a solution for modern business, which can be implemented easily and integrated with any software and hardware of fingerprint biometric system, also providing more authentication and security to the product. Indeed, a growing number of financial services firms’ are strongly considering the use of biometrics technology, sooner rather than later, because of heightened security concerns sparked by the Sept. 11 terrorist attacks and skyrocketing fraud rates. Biometric identification systems use individuals' unique physical or behavioural characteristics, such as fingerprints or voice patterns, to identify them. (Mearian n.d.) According to Meridien Research Inc. in Newton, Mass., consumer fears and losses due to fraud are a strong enough incentive for institutions to invest large sums of money in biometrics. And with 500,000 cases of identity theft in the U.S. each year, consumers are ready to accept biometrics at the cost of increased privacy and more intrusive methods of identification, according to a recent report by Meridien. (Mearian n.d.) Many software vendor organizations are providing solutions for e business to protect identity theft. These solutions are software based totally and any fingerprint hardware can integrate with them. These software integrations are quite simple and flexible. Companies can use biometrics system in any department and for any purpose. Similarly this biometric software can be use over the internet. Suppose a customer needs to get online and purchase a product from a web site. At the time of payment when the verification is required customer is using a biometric verification by using fingerprint scanner, instead of providing information related to its bank account. This can prevent the attacker from getting information of the user and reduce the risk to identity theft. This type of solution is not expensive as now a day’s many hardware vendors are providing built in fingerprint sensors. The question which arise here is that how much secure is this type of solution over internet, considering the above mentioned attacks on a biometric system in chapter two. An attacker can perform a DOS attack on the system or decision override. Also can inject new template into the system and make changes to the template information inside database. First of all the main threat is to be point out. As mentioned above mostly attacks are done on templates and five types of template attacks are available. 4.1 Biometric Scanners Before continuing further, a question arises that what is this fingerprint template which has been stated so many times. Most of the personal recognition systems do not store fingerprint image itself but store only numeric data after extracting the feature from the image. Sometimes it may be important to save the acquired image into the database. The first fingerprint scanner was introduced about thirty years back. Before that ink technique was used this is still being used by law and enforcement agencies. AFIS has created a database over the years which contains both fingerprint images acquired offline and live scan scanners. (D, et al. 2003) Page | 30
  • 31. University of Glamorgan The offline fingerprint is usually taken by spreading black ink on the finger and then the impression is taken on a paper. This impression is later on converted into digital format with the resolution of 500 dpi. (D, et al. 2003) For live scan fingerprint scanners are used. Most important part of the scanner is sensor. There are three types of fingerprint sensors are available in the market. Optical solid state and ultrasound (D, et al. 2003) in this paper optical sensor will be discussed only. 4.1.1 Optical Sensors In this paper more emphasis will be on optical sensor as it will be used further. A simple optical sensor is based on three components 1. Prism 2. Light 3. CCD or CMOS Figure 12 Optical Sensor This is the oldest and most live fingerprint scanning technique used today. The finger touches the top side of the glass prism, but when the ridges touch the surface the valleys remains on a certain distance as shown in the image. Light is illuminated from the left side from light emitting diodes. The light is then reflected randomly from the prism and focused through a lens on CCD or CMOS. (D, et al. 2003) When the finger is very dry, it does not make a uniform contact with the sensor surface. To improve the formation of fingerprints from dry fingers, whose ridges do not contain sweat particles, some scanner producers use silicon coating, which favours the contact of the skin with the prism. With the aim of reducing the cost of optical devices plastic is nowadays often used instead of glass for prism and lenses, and CMOS cameras are mounted instead of more expensive CCDs. (D, et al. 2003) Page | 31
  • 32. University of Glamorgan 4.2 Fingerprint Image After the impression is taken from the sensor, it is then converted into image file which is in most of the cases is in .Jpeg format. There are some parameters for the characterisation of fingerprint image which is as following. 4.2.1 Resolution This indicates the number of dots or pixels per inch (dpi). 500 dpi is the minimum resolution standard for FBI-complaint scanners and is met by many commercial devices. 250 to 300 dpi is probably the minimum resolution that allows the extraction algorithms to locate the minutiae in fingerprint patterns. Minutiae play a primary role in fingerprint matching, since most of the algorithms rely on the coincidence of minutiae to declare whether the two fingerprint impressions are of the same finger. (D, et al. 2003) Figure 13 Fingerprint Template Resolution In Figure 13, there are samples of same fingerprint image in different resolutions. It is clear that decreasing the resolution size of image can affect the matching algorithm. 4.2.2 Area The size of rectangular area sensed by a fingerprint scanner is a fundamental parameter. The larger the area is the more ridges and valleys are captured and more distinctive the fingerprint becomes. An area greater than or equal to (1 X 1) as per FBI standards permits a full plain fingerprint impression. Recently companies are reducing the area to reduce cost and to have a smaller device size. (D, et al. 2003) 4.2.3 Number of Pixels The numbers of pixels can be simply derived by the resolution and the area. A scanner working with r dpi over an area can be expressed by. (D, et al. 2003) Height (h) × width (w) inch2 = rh × rw pixels Page | 32
  • 33. University of Glamorgan 4.2.4 Dynamic Range (or depth) This denotes the numbers of bits used to encode the intensity value of each pixel. Colour information is not useful for fingerprint recognition and therefore almost all the available fingerprint scanners acquire greyscale images. The FBI standard for pixel bit depth is 8 bits, which yields 256 levels of gray. Actually, some sensors capture only 2 or 3 bits of real fingerprint information and successively stretch the dynamic range to 8 bits in software. (D, et al. 2003) 4.2.5 Geometric Accuracy This is usually specified by the maximum geometric distortion introduced by the acquisition device, and expressed as a percentage with respect to x and y directions. Most of the optical fingerprint scanners introduce geometric distortion which, if not compensated, alters the fingerprint pattern depending on the relative position of the finger on the sensor surface. (D, et al. 2003) 4.2.6 Image Quality It is not easy to precisely define the quality of a fingerprint image, and it is even more difficult to decouple the fingerprint image quality from the intrinsic finger quality or status. In fact when the ridge prominence is very low, for example a manual workers and elderly people, when the fingers are too moist or to dry, when they are incorrectly presented to the sensor. Most of the scanners produce a poor quality image. (D, et al. 2003) 4.3 Fingerprint Structure A fingerprint usually appears as a series of dark lines that represent the high, peaking portion of the friction ridge skin, while the valley between these ridges appears as white space capacitive and are the low, shallow portion of the friction ridge skin. Fingerprint identification is based primarily on the minutiae, or the location and direction of the Ridge endings and bifurcations (splits) along a ridge path. (http://cte1401-01.sp00.fsu.edu/holly.html n.d.) Figure 14 Fingerprint Ridges The image presents an example of fingerprint features. The types of information that can be collected from a fingerprint's friction ridge impression include the flow of the friction ridges, the presence or absence of features along the individual friction ridge paths and their sequence, and the intricate detail of a single ridge. Recognition is usually based on the first and second levels of detail or just the latter. Page | 33
  • 34. University of Glamorgan 4.4 Fingerprint image Security As it has been mentioned above, some of the some techniques were suggested by several authors in chapter 2. These solutions have not been implemented yet on any biometrics system or to some extent they have been implemented but not available in market. This study will provide a basic understanding of the structure and mechanism of fingerprint biometric and template, which will lead us toward the solution for securing the template. The idea is to use steganography with in biometric template to hide encrypted information to verify along with the biometric template. In this way if an attacker attacks a and manipulate the biometric template it will not compromise with the system. The reason will be the template used to attack the system lacks the encrypted information which is stored in database. Summary It is necessary to understand the system before suggesting a solution. This chapter focuses on how fingerprints are acquired and what are its components and how can we secure it. Adding steganography in template is a challenge as it can affect matching algorithm. With the knowledge of template structure it can be clear how we can embed a key inside the image without disturbing the template features. Also it will help to decide whether changes can be made on hardware level. Page | 34
  • 36. University of Glamorgan C hapter 5 Design and Implementation Page | 36
  • 37. University of Glamorgan As mentioned above the aim of this study is to design an application which can increase the security in fingerprint biometric systems i.e. security of biometric template. This hypothesis can be achieved by creating a small module which can embed encrypted information into the template and then decode it at the time of verification. The encrypted key will be stored in the database separately for verification purpose. If the attacker replaces the template it can reduce the risk that template will compromise as lack of the computer generated encrypted key. To prove the hypothesis two applications are developed on different technologies. One application is on Microsoft VB .Net and Microsoft Access. The second application is on Visual C# and Microsoft SQL Server. The concept is same but both work on different approach which is explained in detail below. 5. Device and Software The required Devices and Software is as following: • Computer for application development running Microsoft windows operating system • A biometric fingerprint reader with optical sensor. • Biometric software development kit (SDK) compatible with windows and fingerprint reader. The specifications of these devices are as following. 5.1.1 Computer The computer which will be used in this study is a laptop machine specifications are as following. Name Dell Model Inspiron 6400 Processor Speed 1.86 GHz Intel T2130 Genuine Figure 15 Dell Inspiron Page | 37
  • 38. University of Glamorgan 5.1.2 Fingerprint Reader The Microsoft Fingerprint Reader has a small, efficient design. The device is almost three inches long, and a little over an inch wide, and a quarter inch high with a weight of slightly more than an ounce. The reader screen itself is a little over an inch long, and slightly less than inch wide. A split red/silver circle encompasses the plastic reader screen. The reader itself is a slightly sticky plastic material. When the keyboard is on, the reader lights up in the same way the bottom of the optical mouse do. Figure 16 Microsoft Fingerprint Readers 5.1.3 Software Development Kit (SDK) The Software Development Kit (SDK) used in this application is from Griaule for visual basic 2005 .Net. 5.2. Griaule Software Development Kit (SDK) The SDK which is used in this study is Griaule Fingerprint SDK. It is the most efficient SDK available in marker at the moment which can be integrated into several languages and works with many sensors. Some features of SDK are as following. • Plug and play for Microsoft fingerprint device. • Easy integration with applications • Very small template size 1KB approximately • Image can be stored along with the template • 1:1 and 1:N matching capabilities • Microsoft .Net support • FVC2006 recognised Page | 38
  • 39. University of Glamorgan FVC compared several SDK and Griaule SDK results were highly accurate and stable in matching with low error rates. Secondly Griaule provides easy integration with hardware and language. One feature which Griaule SDK provides is storing image along with the template in the database. Storing image of the fingerprint can help in embedding information using steganography. Before moving further it is important to understand what steganography is and how it can be used in securing template. 5.3. Steganography Steganography is really nothing new, as it has been around since the times of ancient Rome. For example, in ancient Rome and Greece, text was traditionally written on wax that was poured on top of stone tablets. If the sender of the information wanted to obscure the message - for purposes of military intelligence, for instance - they would use steganography: the wax would be scraped off and the message would be inscribed or written directly on the tablet, wax would then be poured on top of the message, thereby obscuring not just its meaning but its very existence (Johnson 1995) According to Dictionary.com, steganography (also known as "steg" or "stego") is "the art of writing in cipher, or in characters, which are not intelligible except to persons who have the key; cryptography" (Dictionary.com n.d.). In computer terms, steganography has evolved into the practice of hiding a message within a larger one in such a way that others cannot discern the presence or contents of the hidden message (Howe 1993 - 2001). In contemporary terms, steganography has evolved into a digital strategy of hiding a file in some form of multimedia, such as an image, an audio file (like a .wav or mp3) or even a video file. 5.3.1. What is Steganography Used for? Like many security tools, steganography can be used for a variety of reasons, some good, some not so good. Legitimate purposes can include things like watermarking images for reasons such as copyright protection. Digital watermarks (also known as fingerprinting, significant especially in copyrighting material) are similar to steganography in that they are overlaid in files, which appear to be part of the original file and are thus not easily detectable by the average person. (Schneier 1996) Steganography can also be used as a way to make a substitute for a one-way hash value (where you take a variable length input and create a static length output string to verify that no changes have been made to the original variable length input) (Schneier 1996). Further, steganography can be used to tag notes to online images (like post-it notes attached to paper files). Finally, steganography can be used to maintain the confidentiality of valuable information, to protect the data from possible sabotage, theft, or unauthorized viewing (Radcliff 2002). Unfortunately, steganography can also be used for illegitimate reasons. For instance, if someone was trying to steal data, they could conceal it in another file or files and send it out in an innocent looking email or file transfer. Furthermore, a person with a hobby of saving pornography, or worse, to their hard drive, may choose to hide the evidence through the use of steganography. And, as was pointed out in the concern for terroristic purposes, it can be used as a means of covert communication. Of course, this can be both a legitimate and an illegitimate application. (Westphal 2003) Page | 39
  • 40. University of Glamorgan 5.3.2. Steganography and Biometric Fingerprint Image Understanding the idea of steganography, it can be quite useful to secure fingerprint image in the database from attacker. Let’s suppose, 5.4. Steganography Using .Net Algorithms and Techniques There are three different techniques you can use to hide information in a cover file: • Injection (or insertion) Using this technique, you store the data you want to hide in sections of a file that are ignored by the processing application. By doing this you avoid modifying those file bits that are relevant to an end-user—leaving the cover file perfectly usable. For example, you can add additional harmless bytes in an executable or binary file. Because those bytes don't affect the process, the end-user may not even realize that the file contains additional hidden information. However, using an insertion technique changes file size according to the amount of data hidden and therefore, if the file looks unusually large, it may arouse suspicion. (Weiss nd) • Substitution Using this approach, you replace the least significant bits of information that determine the meaningful content of the original file with new data in a way that causes the least amount of distortion. The main advantage of that technique is that the cover file size does not change after the execution of the algorithm. On the other hand, the approach has at least two drawbacks. First, the resulting stego file may be adversely affected by quality degradation— and that may arouse suspicion. Second, substitution limits the amount of data that you can hide to the number of insignificant bits in the file. (Brainos nd) 5.5. Generation of Steganography in .Net In the substitution techniques, a very popular methodology is the LSB (Least Significant Bit) algorithm, which replaces the least significant bit in some bytes of the cover file to hide a sequence of bytes containing the hidden data. That's usually an effective technique in cases where the LSB substitution doesn't cause significant quality degradation, such as in 24-bit bitmaps. For example, to hide the letter "a" (ASCII code 97 that is 01100001) inside eight bytes of a cover, you can set the LSB of each byte like this: 10010010 01010011 10011011 11010010 10001010 Page | 40
  • 41. University of Glamorgan 00000010 01110010 00101011 The application decoding the cover reads the eight Least Significant Bits of those bytes to re- create the hidden byte—that is 0110001—the letter "a." As you may realize, using this technique let you hide a byte every eight bytes of the cover. Note that there's a fifty percent chance that the bit you're replacing is the same as its replacement, in other words, half the time, the bit doesn't change, which helps to minimize quality degradation. 5.6. Fingerprint Image and Steganography 5.6.2 Application Structure Classes Classes used in this application are as below • InputBox.cs • DBClass.cs • Util.cs These classes are provided with fingerprint SDK samples and provide method to acquire image from sensor and extract features. References • AxGrFingerXLib • GrFingerXLib • Stdole • System • System.Data • System.Drawing • System.Windows.Form • System.XML • stego 5.6.2 Application Process Application will mainly start from enrolment process of the finger. User will place the finger on sensor and image will be acquired in application from the sensor. After the acquisition of the image SDK normally extracts the features of the image which is called template and stores the template in the database. To achieve the goal this method is modified. Page | 41
  • 42. University of Glamorgan 5.6.2.1 Enrolment Process Enrolment process takes place when user place finger on the sensor and image is acquired by the application into the image box. Once the enrolment process takes place image format is converted which is explained further. Encrypted Text Template Image with key Database Figure 17 Enrolment Process Figure 18 Enrolment Process 5.6.2.2 Conversion of Image After the image is acquired it is converted from 8 bit format to 24 bit due to the stego requirements from the library. Bitmap bm8bit = new Bitmap(sfdImage.FileName); Bitmap bm24bit = new Bitmap(bm8bit.Width, bm8bit.Height, System.Drawing.Imaging.PixelFormat.Format24bppRgb); Page | 42
  • 43. University of Glamorgan Graphics g = Graphics.FromImage(bm24bit); After the image is converted into 24 bit format text are embedded using steganography techniques. Figure 19 Image Conversion 5.6.2.3 Steganography Once the image is ready and in 24 bit format cover file is created which will be explained in next section. Message and password is assigned to the file and after that the file is created using encode button as shown in figure. Page | 43
  • 44. University of Glamorgan Figure 20 Creating Stego File 5.6.2.4 Stego Library This library is developed by Giuseppe Naccarato and Alessandro Lacava. Provides a simple API to encode an image and decode it using simple method. There are two interfaces to perform this task IcoverFilel: This method requires three parameter stego file name message to hide and password. This method hides the message inside the stego file. If the code in project is over the method mention above can be seen in these lines and explain the usage. ICoverFile cover = new BMPCoverFile(pic); // Create the stego file cover.CreateStegoFile(stegoFile, message, password); Page | 44
  • 45. University of Glamorgan Result("Message hidden successfully"); Image stegoPic = new Bitmap(stegoFile); FitPic(stegoPic, picStegoFileEnc); picStegoFileEnc.Image = new Bitmap(stegoPic); stegoPic.Dispose(); IStegoFile: This method extract hidden message from the file. This method has been used in project on following lines this opens the stego file and displays the hidden message into the text box as shown in image below. // Open the stego file IStegoFile stego = new BMPStegoFile(stegoFile, password); // Show the hidden message txtMessageDec.Text = stego.HiddenMessage; 5.6.3 Decoding the Image Image decoding is reverse of steganography process as mention above in section stego library how it is performed in the application. Password and the file path are provided in the option box. After click on the decode button it shows the hidden value in the text box. Figure 21 Decoding the Image Page | 45
  • 46. University of Glamorgan 5.6.4 Development Limitations • Image Size First issue during the development was to change the image resolution. Microsoft Fingerprint reader produces an image of 256 colours. For steganography the method used in this application the requirement of image was of 24 bit. For this purpose the small module was written to convert the image from 256 colours to 24 bit. • Image Storage Next challenge in this application was the storage of image in the access database. Access has some limitations in data types. Image features extracted into template can be stored into database using OLE Object data type. Due to this it was difficult to store image in access as compare to SQL server which will be explained further later on. • Verification Process In verification process user will place finger on the sensor. Image will be acquired in application. Now at this stage multiple verifications will take place. As there are some limitations which are explained. 5.7 Fingerprint and Byte Stream This application is designed using Microsoft Visual C# and Microsoft SQL server 2005. Griaule SDK is again used in the same way with the small modification of DB Class. 5.7.1 Application structure Classes These are the main classes used in the application • InputBox.cs • DBClass.cs • Util.cs These classes are provided with SDK by Griaule. Which provide default method to add information in database and to manipulate the features of the image in the image box; these classes also provide flexibility for programming end. References • AxGrFingerXLib • GrFingerXLib • Stdole • System • System.Data • System.Drawing Page | 46
  • 47. University of Glamorgan • System.Windows.Form • System.XML 5.7.2 Application Process This application will also work on same procedure as mentioned above in previous topic. 5.7.2.1 Enrolment Process The process of this application is similar to previous one. Application will start from enrolment process. User will place finger on biometric device and image will be acquired by the SDK in application. Template features will be auto extracted. When user will click on enrolment button application will store template and image in the Database. Image will be store in binary format at the end of the information system based encrypted text will be embedded into the image. Figure 22 Enrolment Process 5.7.2.2 Random Number Generation The main function in this application is a random number which is generated through a small module. The main template manipulation is using the SDK DB Class. A random number is generated 0 to 255 using the code shown below decimal encrypt; Random rand = new Random (); encrypt = 1 + rand.Next(255); Page | 47
  • 48. University of Glamorgan Once the number is generated a byte array is created of image file. This is shown below as following byte [] tempimg = new byte[arrImage.Length+1]; Array.Copy(arrImage,tempimg,arrImage.Length); enc =(byte)encrypt; tempimg[arrImage.Length]=enc; The random number which is converted into byte array is attached with the image byte array during the insertion process in database field. With this functionality it becomes the part of the image and there are no changes in the image or the template value. Figure 23 Random Number In this example it is shown that a number is generated 33 randomly and it has been shown in message box. 5.7.2.3 Verification Process When user will click on identify button it will match the template in database and retrieve the image from the database. At this point verification will take process twice. The database image will be again manipulated and feature will be extracted and match again with the template if the result is positive then the key which is randomly generated and is embedded in the image will be matched against the record nside the database. Page | 48
  • 49. University of Glamorgan Figure 24 Verification Process After verification of the template application matched the encrypted value which was 33 and displayed a message in log “Image contains the encrypted value”. 5.7.2.4 Template Attack and Verification The most interesting part in the application is attack section which explains the attack on template in simple manner. In this method after the enrolment application generates and ID. Simply scan the finger and attack on the specific ID it will replace the template in database. In this example the enrolled fingerprint is on ID 21. Now attack will take place and scan a different finger for ID 21 and update the records as shown in image. Figure 25 Attack In the log section it displays the message that image on ID 21 was been updated successfully. Page | 49
  • 50. University of Glamorgan 5.7.2.5 Securing the Template Now after the attack it is clear that the template has been replaced in the database. Now if attacker tries to compromise with the system. System will verify the template but show the original image in the second image box. If closely observe the both fingerprint they are different for each other which displays the difference that template alteration can be stopped in the database if small effort is done on the application side. Also in the log box it shows that encrypted value is in the image and image is verified. The encrypted value is retrieved from the image when it is loaded into the image box using same byte stream method the last bytes of the images are extracted and the value which is embedded in the image is verified against the database. When both values match and results are positive it is displayed in the log box the image has the value and it is the authenticate image. Even if attacker replaces the template it won’t be authenticated. This result proves that this application has achieved its goals and desired results. Figure 26 Securing Template 5.7.3 Application Limitations and Advantages As mentioned above before application fails to perform verification on the second image box due to the limitation in SDK. But the beauty of the application is the byte stream function which reduces the risk of attacks on the template. Here question can be raised what if the hacker attacks the database and retrieves image and the key value from the database. It is simple in case if this happens hacker needs the logic to add byte stream in the database and Page | 50
  • 51. University of Glamorgan how to retrieve the key from the image which is in byte format unreadable unless the process is reversed. This concludes that it can make difficult for attacker to compromise with the system. Summary Developing a solution on hardware or software level can be easy if logic of the operations is clear. This chapter explains the development of two applications on different technologies on backend. There were some limitations but it is not impossible to achieve the task. Results show the main objective of this study was achieved though the full application was not developed. Also demonstration of attack explains that the results were desired. Page | 51
  • 52. University of Glamorgan C hapter 6 Results and Conclusion Page | 52
  • 53. University of Glamorgan Evaluation of the Software This project has proven to be a success to achieve the proposed objective. Though some functionality are missing in steganography approach, which were due to limitation in access database and SDK. The priority of developing application was VB .Net but it was later on replaced with c# during the project because of the flexibility and object handling due the object oriented nature of the language and access to base classes. The binary data application produced more desired results due to the technology which was adopted on the back end. It made easier to store image in the database and also allows the application to run on network. But the application lacks the function of second verification which is due to limitation from SDK. The limitation was in the process of verification of the image in the second image box. Other than that application shows how we can hide information in the image using steganography and decrypt the information as well. The binary method is interesting as well which adds the information along with the image details without changing the image features. The results are quite positive and after the change in the image there is no problem in matching the fingerprint in database. Attacking the database and replacing the template explains the concept and shows how it is possible to avoid template attacks in simple manner. If there is some flexibility in SDK a complete application can be developed to secure template using software method which is flexible easy and can be integrated with hardware easily this approach can be used with any language. Page | 53
  • 54. University of Glamorgan Conclusion Now a day security is holding the main priority all over the world. Banks, airports and other organizations including hospitals are adopting biometric systems. Many biometrics systems were introduced in market and they have been implemented as well. But the question still arises in mind that is this secure? In this study it has been explained there are several threats and methods to attack a biometric system. To improve the security measure it is necessary to improve the system by using several methods which are unpredictable. Also multiple methods can be combined and they can be used to secure biometric information. It is not necessary to design solutions on low level or on hardware level unless it is a hardware application which runs standalone. For devices such as Microsoft fingerprint reader and other plug and play sensor these approaches can be adopted. Many solutions are already available in the market which is free of cost. Combining different method on application level can increase the security with very small effort. This project also explains a simple attack on database to replace template. Which shows that template is not guarantee of security and authentication. To improve biometric security it is important to do multiple verifications and use multiple methods to hide information which cannot be decrypted easily. In future we can use both approaches in one application for the verification system using steganography and binary information storage as well. Either, we can us steganography and add it in the image with the binary information rather than storing it separately in the table. However, this it can be complicated to retrieve from the image unless the attacker has the encrypted key to verify. It is also clear that embedding text in the image or adding bytes in the stream either ways it does not affect the quality of matching and extraction system. Even changing image from 8 bit to 24 bit provides the better results on software level. This does not disturb the matching algorithm of SDK to verify the template which is another plus point. SDK is important part in this application Griaule SDK is very robust and accurate. It has a lot of flexibility and good integration with SQL server database and c# programming language works fine with hardware and high acceptance rate. However, still fewer methods give limitation to development end. This paper serves to introduce new methods and approaches to improve the security in application level. It explains the idea how to integrate different method technologies and languages to develop solutions for biometrics, also in this paper limitation of languages and back end applications are explained which help to understand which language can be appropriate to use and which database is more flexible for biometric system. Page | 54
  • 55. University of Glamorgan Appendix A Pseudo code Stage 1 1. Enrol finger on Biometric Reader 2. Template Extraction 3. If User is not found in Database Then • Encrypted Key Generation • Embed Key in Template • Template Storage in Database • Store Key in Database Else • Match Extracted Template With Stored Template • Extract Key From Template • Match Key With Database • Verify User End Stage 2 Enrolment Process Pseudo code 1. Finger will be placed on sensor 2. Sensor will read the biometric information 3. Send the information to Transmission Process 4. Image will be compressed 5. Sent to Signal Process through Transmission channel Stage 3 Storage (If User Not Found) Pseudo code 1. Expansion of image will take process. 2. Will be passed to Signal Process. 3. Template will be extracted from the image. 4. Quality will improve Dust particles etc will be removed. 5. Pattern will be matched (If User not found). 6. Encryption Key will be generated. 7. Key will be embedded using steganograpgy techniques. 8. Key will be stored in Database. 9. Template will be stored in Database. Stage 4 Page | 55
  • 56. University of Glamorgan Verification (User Authentication) Pseudo code 1. Expansion of image will take process. 2. Will be passed to Signal Process. 3. Template will be extracted from the image. 4. Quality will improve Dust particles etc will be removed. 5. Pattern will be matched (If User found). 6. Encryption Key will be extracted From Stored Template. 7. Key will be matched with the stored key. 8. User will be Authenticate. Algorithm Enrolment Templat e Extracti on If User Generate Key Not Found Embed Key Else Store Template Match Template Store Key Extract Key Match Key with DB Verify User End Figure 27 Algorithm Page | 56
  • 57. University of Glamorgan Appendix B References A, Adler. “Images can be regenerated from quantized.” Canadian Conf. Computer Electric Eng. Niagra Falls, Canada , May 2004. 469-472. A, Ross, Jain A.K, and Reisman J. “A Hybrid Fingerprint Matcher.” Pattern Recognition, 2003: 36 (7) 1661-1673. A.K, Jain, and Uludag U. “Hiding Biometric Data.” IEEE Trans. Pattern Anal. Mach. Intelligence 25, no. 11 (2003): 1493-1498. A.K, Jain, Bolle R, and Pankanti S. BIOMETRIC- Personal Identification in Network Society. London: Kluwer Academic Publishers, 1999. A.K., Jain, Parbhakar S, and Chen S. “Combining Multiple Matchers for a High Security Fingerprint Verification System.” Pattern Recognition Letters, 1999: 20 (11-13) 1371-1379. B, Schneier. “The Uses and Abuses of Biometrics.” Comm ACM VOL 42, 8, 1999: 136. Biometrics, Find. Biometrics: The Anotomy Lesson. 2001. http://www.findbiometrics.com/Pages/feature%20articles/anatomy.html (accessed August 18, 2007). Brainos, Alain C. “A Study Of Steganography And The Art Of Hiding Information.” East Carolina University, nd: 3-7. C, Soutar. “Biometrics System Securit, White Paper.” bioscrypt. http://www.bioscrypt.com (accessed January 11, 2008). Canton, State University of New York At. Public Safety Technology: Crimina Investigation. 2203. http://www.canton.edu/ci/previous_lessons_3.html (accessed August 14, 2007). Corporation, Biometrics Technology. Biometric Technical Assessment. 2002. http://bio-tech- inc.com/Bio_Tech_Assessment.html (accessed July 11, 2007). D, Maltoni, Maio D, Jain A.K, and Parbhakar S. Handbook of Fingerprint Recognition. Verlag: Springer, 2003. Daugman, J.G. Recognition Person By Their Iris Pattrens : Biometrics: Personal Identification in Networked Society. Edited by A.K. Jain. Vol. 1. Springer, 1999. Dictionary.com. “Steganography.” Dictionary.com. n.d. http://dictionary.reference.com/search?q=steganography (accessed January 19, 2008). Enhanced Border Security and Visa Entry Reform. Congress of the United States of America , 2002. Page | 57
  • 58. University of Glamorgan G.L, Marcialis, and Roli F. “Experimental Results on Fusion of Multiple Fingerprint Matcher.” Proc. 4th Int. Conf. on Audio and Video-Based Person Authentication, 2003: 814- 820. G.L., Marcialis, and Roli F. “Preceptron-Based Fusion of Multiple Fingerprint Matchers .” Proc. First Int. Work on Artificial Nural Netwroks in Pattern Matching, 2003: 36 (7) 1661- 1673. Group, International Biometrics. How Biometrics is Defined. 2003. http://www.biometricgroup.com/reports/public/reports/biometric_definition.html (accessed August 19, 2007). Howe, Denis. “Steganography.” The Free On-line Dictionary of Computing. 1993 - 2001. http://www.nightflight.com/foldoc/index.html (accessed January 21, 2008). http://cte1401-01.sp00.fsu.edu/holly.html. Biometrics: The Touch, the Scan, the Pattern of Our Lives . n.d. http://cte1401-01.sp00.fsu.edu/holly.html (accessed September 9, 2007). J.L. Wayman, A.J. Mansfield. Best Practices in Testing and Reporting Performance of Biometric Devices. Vol. 2. 1 vols. James Wayman, ed. National Biometric Test Center Collected Works. San Jose: San Jose State University, 2004. JD.JR., Woodward. “Biometrics Background.” www.ibia.org. 2000. http:www.ibia.orgWoodwardPresentation.pdf (accessed September 2, 2007). JD.JR., Woodward, Orlans N.M, and Higgnis P.T. Biometrics Identity Assurance in The Information Age. Berkeley, 2003. Jhon D., Woodward. biometrics identity assurance information age . Berkeley: Mc Graw Hill, 2003. Johnson, Neil F. Steganography. Technical Report, http://www.jjtc.com/stegdoc/sec202.html, 1995. L, Ferri C, Mayerhofer A, Frank M, Vielhauer C, and Steinmetz R. “Biometrics Authentication for ID Cards and Hologram Watermarks.” Proc. SPIE Security and Watermarking of Multimedia Contents, 2002: Vol. 4675 629-640. M, Yeung, and Pankanti S. “Verification watermarks on Fingerprint Recognition and Retrival.” Proc. SPIE, Security and Watermarking of Multimedia Contents, 1999: Vol 3657 66-78. Maltoni, Davide, Maio, Jain, and Prabhakar. Handbook of Fingerprint Recognition. New York: Springers, 2005. Mearian, Lucas. Toppling The PIN: Banks Eye Biometric Technology For ATM Access. http://www.biometrictechnology.net/ (accessed January 9, 2008). Page | 58
  • 59. University of Glamorgan N.K. Ratha, J.H. Connell, and R.M. Bolle. “An Analysis of Minutiae Matching Strength.” AVBPA, 2001: 223 - 228. N.K., Ratha, Connell J.H., and Bolle R.M. “Enhancing security and privacy in biometrics- based authentication systems.” IBM System Journal. 21 April 2001. http://researchweb.watson.ibm.com/journal/sj/403/ratha.html (accessed December 19, 2007). Radcliff, Deborah. Steganography: Hidden Data. 10 June 2002. http://www.computerworld.com/securitytopics/security/story/0,10801,71726,00.html (accessed January 24, 2008). Record, Scotish Criminal. History of Finger Prints - A Time Line. 2002. http://www.spsa- forensics.police.uk/services/history_science (accessed November 11, 2007). Roberts, Chris. “Biometrics.” Biometrics, November 2005: 24. S, Parbhakar, and Jain A.K. “Decision-level Fusion in Fingerprint Verification.” Pattern Recognition, 2002: 861-874. Schneier, Bruce. Applied Cryptography. John Wiley and Sons Inc., 1996. T, Windeatt, and Roli F. “Multiple Classification System.” Lecture Notes in Computer Sciences Volume 2709. Weiss, Max. “Principles of Steganography.” Math 187: Introduction to Cryptography, nd: 2- 3. Westphal, Kristy. Steganography Revealed. 9 April 2003. http://www.securityfocus.com/infocus/1684#ref_cryptography (accessed January 9, 2008). X, Xia, and Gorman O L. “Innovations in Fingerprint Capture Devices.” Pattern Recognition, 2003: 36 (2) 361-369. York, State University of New. Public Safety Technology Criminal Investigation. State University of New York. 2003. http://www.canton.edu/ci/previous_lessons_3.html (accessed August 11, 2007). Page | 59