When Physical Unclonable Function Meets Biometrics
- URL: http://arxiv.org/abs/2012.07916v1
- Date: Mon, 14 Dec 2020 20:00:40 GMT
- Title: When Physical Unclonable Function Meets Biometrics
- Authors: Kavya Dayananda and Nima Karimian
- Abstract summary: Electrocardiogram (ECG) based biometric has become popular as it can authenticate patients and monitor the patient's vital signs.
volatile memory-based (NVM) PUF can be easily placed in the device to avoid counterfeit.
Our aim is to provide a comprehensive study on the state-of-the-art developments papers based on biometrics enabled hardware security.
- Score: 0.5156484100374058
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: As the Covid-19 pandemic grips the world, healthcare systems are being
reshaped, where the e-health concepts become more likely to be accepted.
Wearable devices often carry sensitive information from users which are exposed
to security and privacy risks. Moreover, users have always had the concern of
being counterfeited between the fabrication process and vendors' storage.
Hence, not only securing personal data is becoming a crucial obligation, but
also device verification is another challenge. To address biometrics
authentication and physically unclonable functions (PUFs) need to be put in
place to mitigate the security and privacy of the users. Among biometrics
modalities, Electrocardiogram (ECG) based biometric has become popular as it
can authenticate patients and monitor the patient's vital signs. However,
researchers have recently started to study the vulnerabilities of the ECG
biometric systems and tried to address the issues of spoofing. Moreover, most
of the wearable is enabled with CPU and memories. Thus, volatile memory-based
(NVM) PUF can be easily placed in the device to avoid counterfeit. However,
many research challenged the unclonability characteristics of PUFs. Thus, a
careful study on these attacks should be sufficient to address the need. In
this paper, our aim is to provide a comprehensive study on the state-of-the-art
developments papers based on biometrics enabled hardware security.
Related papers
- Biometrics Employing Neural Network [0.0]
Fingerprints, iris and retina patterns, facial recognition, hand shapes, palm prints, and voice recognition are frequently used forms of biometrics.
For systems to be effective and widely accepted, the error rate in recognition and verification must approach zero.
Artificial Neural Networks, which simulate the human brain's operations, present themselves as a promising approach.
arXiv Detail & Related papers (2024-02-01T03:59:04Z) - Face Presentation Attack Detection [59.05779913403134]
Face recognition technology has been widely used in daily interactive applications such as checking-in and mobile payment.
However, its vulnerability to presentation attacks (PAs) limits its reliable use in ultra-secure applicational scenarios.
arXiv Detail & Related papers (2022-12-07T14:51:17Z) - Benchmarking Quality-Dependent and Cost-Sensitive Score-Level Multimodal
Biometric Fusion Algorithms [58.156733807470395]
This paper reports a benchmarking study carried out within the framework of the BioSecure DS2 (Access Control) evaluation campaign.
The campaign targeted the application of physical access control in a medium-size establishment with some 500 persons.
To the best of our knowledge, this is the first attempt to benchmark quality-based multimodal fusion algorithms.
arXiv Detail & Related papers (2021-11-17T13:39:48Z) - Quality Measures in Biometric Systems [67.6699940572256]
Quality is a critical issue in security, especially in adverse scenarios involving surveillance cameras, forensics, portable devices, or remote access through the Internet.
This article analyzes what factors negatively impact biometric quality, how to overcome them, and how to incorporate quality measures into biometric systems.
arXiv Detail & Related papers (2021-11-17T13:28:07Z) - A Review-based Taxonomy for Secure Health Care Monitoring: Wireless
Smart Cameras [9.4545147165828]
This research focuses on the secure storage of patient and medical records in the healthcare sector.
A potential solution comes from biometrics, although their use may be time-consuming and can slow down data retrieval.
This research aims to overcome these challenges and enhance data access control in the healthcare sector through the addition of biometrics in the form of fingerprints.
arXiv Detail & Related papers (2021-07-05T11:59:10Z) - Biometrics: Trust, but Verify [49.9641823975828]
Biometric recognition has exploded into a plethora of different applications around the globe.
There are a number of outstanding problems and concerns pertaining to the various sub-modules of biometric recognition systems.
arXiv Detail & Related papers (2021-05-14T03:07:25Z) - COVI White Paper [67.04578448931741]
Contact tracing is an essential tool to change the course of the Covid-19 pandemic.
We present an overview of the rationale, design, ethical considerations and privacy strategy of COVI,' a Covid-19 public peer-to-peer contact tracing and risk awareness mobile application developed in Canada.
arXiv Detail & Related papers (2020-05-18T07:40:49Z) - Digital Ariadne: Citizen Empowerment for Epidemic Control [55.41644538483948]
The COVID-19 crisis represents the most dangerous threat to public health since the H1N1 pandemic of 1918.
Technology-assisted location and contact tracing, if broadly adopted, may help limit the spread of infectious diseases.
We present a tool, called 'diAry' or 'digital Ariadne', based on voluntary location and Bluetooth tracking on personal devices.
arXiv Detail & Related papers (2020-04-16T15:53:42Z) - Analyze and Development System with Multiple Biometric Identification [0.0]
Methods developed earlier to ensure personal the information from the thefts was not effective and safe.
Biometrics were introduced when it was needed technology for more efficient security of personal information.
In biometric authentication system, user may not remember any passwords or carry any keys.
arXiv Detail & Related papers (2020-04-10T05:08:54Z) - Nowhere to Hide: Cross-modal Identity Leakage between Biometrics and
Devices [10.583851548297728]
We study the feasibility of the compound identity leakage across cyber-physical spaces.
Co-located smart device IDs (e.g., smartphone MAC addresses) and physical biometrics (e.g., facial/vocal samples) are side channels to each other.
Two real-world experiments on different biometrics and device IDs show that the presented approach can compromise more than 70% of device IDs.
arXiv Detail & Related papers (2020-01-21T22:26:12Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.