Skip to main content
Aller à la page d’accueil de la Commission européenne (s’ouvre dans une nouvelle fenêtre)
français français
CORDIS - Résultats de la recherche de l’UE
CORDIS
Contenu archivé le 2024-05-27

VIrtual Pin Based On Biometrics

Objectif

Secure networking is a major key for communications in our society, whereas biometrics are the only authentication methods that can verify the identity of a person. However, due to incompatibility with existing infrastructure biometrics are often not introduced. The Virtual Pin links biometrics and cryptographic authentication to solve the problem. Even though the Virtual Pin is calculated from biometrics, it may be chosen freely and changed as often as desired.

The Virtual Pin offers two unique benefits over conventional biometric methods:
1. No templates have to be stored. (Templates might be read out by attackers);
2. The Virtual Pin can be linked to cryptographic infrastructure. It can for example emulate a Pin to the ATM. It can as well be used as a DES and encrypt a Keberos ticket.

Objectives:
The Virtual PIN (later on VP) solves compatibility & privacy issues. An obstacle of biometric methods is that they are incompatible with existing infrastructure. The VP links biometrics with cryptographic authentication. Conventional methods compare a biometric trait with a stored sample (template). The VP maps a user' s biometric trait to a unique number, no template has to be stored. The VP is obtained by mapping a vector from fingerprints onto a unique value using error correcting codes . The feature extraction algorithm follows a suggestion by Jain; other possibilities should be explored. The error correcting codes employed are algebraic codes.

Work description:
The work consists of the following steps:
WPl Image Processing: Preprocess the images read from the fingerprint scanner to generate appropriate input to the feature extraction algorithm, e.g. noise reduction, smoothing, and scaling. Find the support, orientation field, and a reference frame of the image;
WP2 Design masks and filters used to extract local features. Examine the suitability of global fingerprint properties;
WP3 Functional test frame: Supply a base for system and subsystem evaluation tests. Collect the images needed for testing. Measure performance of subsystems. Determine false acceptance rate and false rejection rates;
WP4 Statistical, Analysis of Feature Vectors: Assure that the representation of the parameter values harvest maximum amount of information. Analysis of the statistical properties of the errors of the feature vectors. Examination of the clustering of the feature vectors of an individual in the feature space;
WP5 Error Correcting Codes : Construct suitable error correcting codes Compare linear and non - linear codes with short block length. Iterative decoding;
WP6 Cryptography: Define protocol that prescribes how to deal with: The fingerprints; The correction information; The feature vector; The secret keys which are to protected biometrically, and maybe additional objects;
WP7 Application Concept: An actual implementation should be sketched discussed with prospective sponsors;
WP8 System Evaluation and Optimisation. Determine overall system performance with respect to performance and security needs of targeted applications using the test framework of WPJ;
WP9 Application Prototype: A prototype, demonstrating the feasibility of the method, should be developed;
WP10 Project Management: Insure that work packages are completed in time and quality requirements are met.

Milestones:
M1: Implementation of reference points within defined margin of error;
M2: Version 2.0 of the feature extraction software;
M3: Testsuite covering all submodules;
M4 : Thorough understanding of channel properties;
M5: Enhanced version of the error correcting module;
M6: Document assessing the security;
M7: Concept of introduction within existing application;
M8: Reliable system concept;
M9: Application prototype;
M10: Timely reports to EU.

Programme(s)

Programmes de financement pluriannuels qui définissent les priorités de l’UE en matière de recherche et d’innovation.

Thème(s)

Les appels à propositions sont divisés en thèmes. Un thème définit un sujet ou un domaine spécifique dans le cadre duquel les candidats peuvent soumettre des propositions. La description d’un thème comprend sa portée spécifique et l’impact attendu du projet financé.

Appel à propositions

Procédure par laquelle les candidats sont invités à soumettre des propositions de projet en vue de bénéficier d’un financement de l’UE.

Données non disponibles

Régime de financement

Régime de financement (ou «type d’action») à l’intérieur d’un programme présentant des caractéristiques communes. Le régime de financement précise le champ d’application de ce qui est financé, le taux de remboursement, les critères d’évaluation spécifiques pour bénéficier du financement et les formes simplifiées de couverture des coûts, telles que les montants forfaitaires.

CSC - Cost-sharing contracts

Coordinateur

GIESECKE & DEVRIENT GMBH
Contribution de l’UE
Aucune donnée
Adresse
PRINZREGENTENSTRASSE 159
800729 MUENCHEN
Allemagne

Voir sur la carte

Coût total

Les coûts totaux encourus par l’organisation concernée pour participer au projet, y compris les coûts directs et indirects. Ce montant est un sous-ensemble du budget global du projet.

Aucune donnée

Participants (2)

Mon livret 0 0