ZK-SERIES: Privacy-Preserving Authentication using Temporal Biometric Data
- URL: http://arxiv.org/abs/2506.19393v1
- Date: Tue, 24 Jun 2025 07:45:43 GMT
- Title: ZK-SERIES: Privacy-Preserving Authentication using Temporal Biometric Data
- Authors: Daniel Reijsbergen, Eyasu Getahun Chekole, Howard Halim, Jianying Zhou,
- Abstract summary: We propose ZK-SERIES to provide privacy and efficiency to a broad spectrum of time series-based authentication protocols.<n>ZK-SERIES uses the same building blocks, i.e., zero-knowledge multiplication proofs and efficiently batched range proofs.<n>Our experimental results indicate that the privacy-preserving authentication protocol can be completed within 1.3 seconds on older devices.
- Score: 2.4985925375157443
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Biometric authentication relies on physiological or behavioral traits that are inherent to a user, making them difficult to lose, forge or forget. Biometric data with a temporal component enable the following authentication protocol: recent readings of the underlying biometrics are encoded as time series and compared to a set of base readings. If the distance between the new readings and the base readings falls within an acceptable threshold, then the user is successfully authenticated. Various methods exist for comparing time series data, such as Dynamic Time Warping (DTW) and the Time Warp Edit Distance (TWED), each offering advantages and drawbacks depending on the context. Moreover, many of these techniques do not inherently preserve privacy, which is a critical consideration in biometric authentication due to the complexity of resetting biometric credentials. In this work, we propose ZK-SERIES to provide privacy and efficiency to a broad spectrum of time series-based authentication protocols. ZK-SERIES uses the same building blocks, i.e., zero-knowledge multiplication proofs and efficiently batched range proofs, to ensure consistency across all protocols. Furthermore, it is optimized for compatibility with low-capacity devices such as smartphones. To assess the effectiveness of our proposed technique, we primarily focus on two case studies for biometric authentication: shake-based and blow-based authentication. To demonstrate ZK-SERIES's practical applicability even in older and less powerful smartphones, we conduct experiments on a 5-year-old low-spec smartphone using real data for two case studies alongside scalability assessments using artificial data. Our experimental results indicate that the privacy-preserving authentication protocol can be completed within 1.3 seconds on older devices.
Related papers
- BlowPrint: Blow-Based Multi-Factor Biometrics for Smartphone User Authentication [3.5860522669070454]
We propose BlowPrint, a novel behavioral biometric technique that allows us to authenticate users based on their phone blowing behaviors.<n>In this work, we assume that the way users blow on a phone screen can produce distinctive acoustic patterns, which can serve as a unique biometric identifier.<n>To assess BlowPrint's effectiveness, we conduct an empirical study involving 50 participants from whom we collect blow-acoustic and facial feature data.
arXiv Detail & Related papers (2025-07-05T18:40:32Z) - Trade-offs in Privacy-Preserving Eye Tracking through Iris Obfuscation: A Benchmarking Study [44.44776028287441]
We benchmark blurring, noising, downsampling, rubber sheet model, and iris style transfer to obfuscate user identity.<n>Our experiments show that canonical image processing methods like blurring and noising cause a marginal impact on deep learning-based tasks.<n>While downsampling, rubber sheet model, and iris style transfer are effective in hiding user identifiers, iris style transfer, with higher computation cost, outperforms others in both utility tasks.
arXiv Detail & Related papers (2025-04-14T14:29:38Z) - BiCert: A Bilinear Mixed Integer Programming Formulation for Precise Certified Bounds Against Data Poisoning Attacks [62.897993591443594]
Data poisoning attacks pose one of the biggest threats to modern AI systems.<n>Data poisoning attacks pose one of the biggest threats to modern AI systems.<n>Data poisoning attacks pose one of the biggest threats to modern AI systems.
arXiv Detail & Related papers (2024-12-13T14:56:39Z) - Keystroke Verification Challenge (KVC): Biometric and Fairness Benchmark
Evaluation [21.63351064421652]
Keystroke dynamics (KD) for biometric verification has several advantages.
KD is among the most discriminative behavioral traits.
We present a new experimental framework to benchmark KD-based biometric verification performance and fairness.
arXiv Detail & Related papers (2023-11-10T11:23:28Z) - Multi-Channel Time-Series Person and Soft-Biometric Identification [65.83256210066787]
This work investigates person and soft-biometrics identification from recordings of humans performing different activities using deep architectures.
We evaluate the method on four datasets of multi-channel time-series human activity recognition (HAR)
Soft-biometric based attribute representation shows promising results and emphasis the necessity of larger datasets.
arXiv Detail & Related papers (2023-04-04T07:24:51Z) - Facial Soft Biometrics for Recognition in the Wild: Recent Works,
Annotation, and COTS Evaluation [63.05890836038913]
We study the role of soft biometrics to enhance person recognition systems in unconstrained scenarios.
We consider two assumptions: 1) manual estimation of soft biometrics and 2) automatic estimation from two commercial off-the-shelf systems.
Experiments are carried out fusing soft biometrics with two state-of-the-art face recognition systems based on deep learning.
arXiv Detail & Related papers (2022-10-24T11:29:57Z) - Non-Contrastive Learning-based Behavioural Biometrics for Smart IoT
Devices [0.9005431161010408]
Behaviour biometrics are being explored as a viable alternative to overcome the limitations of traditional authentication methods.
Recent behavioural biometric solutions use deep learning models that require large amounts of annotated training data.
We propose using SimSiam-based non-contrastive self-supervised learning to improve the label efficiency of behavioural biometric systems.
arXiv Detail & Related papers (2022-10-24T05:56:32Z) - Evaluation of a User Authentication Schema Using Behavioral Biometrics
and Machine Learning [0.0]
This study contributes to the research being done on behavioral biometrics by creating and evaluating a user authentication scheme using behavioral biometrics.
The behavioral biometrics used in this study include touch dynamics and phone movement.
We evaluate the performance of different single-modal and multi-modal combinations of the two biometrics.
arXiv Detail & Related papers (2022-05-07T05:16:34Z) - Mobile Behavioral Biometrics for Passive Authentication [65.94403066225384]
This work carries out a comparative analysis of unimodal and multimodal behavioral biometric traits.
Experiments are performed over HuMIdb, one of the largest and most comprehensive freely available mobile user interaction databases.
In our experiments, the most discriminative background sensor is the magnetometer, whereas among touch tasks the best results are achieved with keystroke.
arXiv Detail & Related papers (2022-03-14T17:05:59Z) - Benchmarking Quality-Dependent and Cost-Sensitive Score-Level Multimodal
Biometric Fusion Algorithms [58.156733807470395]
This paper reports a benchmarking study carried out within the framework of the BioSecure DS2 (Access Control) evaluation campaign.
The campaign targeted the application of physical access control in a medium-size establishment with some 500 persons.
To the best of our knowledge, this is the first attempt to benchmark quality-based multimodal fusion algorithms.
arXiv Detail & Related papers (2021-11-17T13:39:48Z) - Data-driven behavioural biometrics for continuous and adaptive user
verification using Smartphone and Smartwatch [0.0]
We propose an algorithm to blend behavioural biometrics with multi-factor authentication (MFA)
This work proposes a two-step user verification algorithm that verifies the user's identity using motion-based biometrics.
arXiv Detail & Related papers (2021-10-07T02:46:21Z) - Sample-efficient device-independent quantum state verification and
certification [68.8204255655161]
Authentication of quantum sources is a crucial task in building reliable and efficient protocols for quantum-information processing.
We develop a systematic approach to device-independent verification of quantum states free of IID assumptions in the finite copy regime.
We show that device-independent verification can be performed with optimal sample efficiency.
arXiv Detail & Related papers (2021-05-12T17:48:04Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.