BC4004 Biometric Security Syllabus:

BC4004 Biometric Security Syllabus – Anna University PG Syllabus Regulation 2021

COURSE OBJECTIVES:

 To understand the various attacks in biometric systems.
 To acquire knowledge on biometric authentication protocols
 To understand the various key distribution and management strategies.
 To understand how to deploy encryption techniques to secure data using biometric
 To gain knowledge on security criteria and adopt security measures for a biometric system

UNIT I ATTACKS IN BIOMETRIC

Adversary attacks-attacks at the user Interface-Attacks on the biometric processing, Attacks on template database –system security analysis – spoofing and mimicry attacks

UNIT II BIOMETRIC AUTHENTICATION PROTOCOLS

Introduction-biometric based secure cryptographic protocols – biometrics based cryptographic key Regeneration and sharing – Biometrics based session key generation and sharing protocol – performance evaluation strategies.

UNIT III BIOMETRIC CRYPTOGRAPHY

Protection of biometric data –biometric data shuffling scheme- experimental results –security analysis – cryptographic key Reservation – cryptographic key with biometrics-Revocability in key generation system-Adaptations of Generalized key Regeneration scheme –IRIS Biometrics –Face Biometrics –Extension of Key Regeneration scheme.

UNIT IV BIOMETRIC DATA PROTECTION

Biometric data – Concept of personal data – Data protection and privacy – Security criteria for Biometric system – Adoption of security – Revocation procedures – Security and organizational aspects of biometric system.

UNIT V BIOMETRIC MULTIMODAL APPLICATIONS

Integration – Multiple traits – Multiple snapshots – Score fusion methods – Applications – Board Security – Identification cards – Biometrics on smart cards – Overview of local and global structure – Mechanism for on card comparison – Off card and On card alignment – Smart textile sensors – Bio signals – Biometrics and intelligence services.

COURSE OUTCOMES:

CO1: Implement basic security algorithms required by the biometric system
CO2: Analyze the vulnerabilities in biometric system and hence be able to design a security Solution
CO3: Analyze the possible security attacks in complex real time systems and their effective Countermeasures
CO4: Identify the security issues in the network and resolve it
CO5: Formulate research problems in the biometric security field

TOTAL: 45 PERIODS

REFERENCES

1. David Check Ling Ngo, Andrew Beng Jin Teoh, Jiankun Hu “Biometric Security”, Cambridge Scholars,2015
2. Els. J.Kindt, “Privacy and data protection issues of Biometric Applications “, Springer,2013.
3. Eliza Yinzi Du, “Biometrics from fiction to practice”, Panstandford Publishers 2012
4. James wayman, “Introduction to Biometrics”, Springer 2011
5. Liangwang,Xin Geng “Behavioral Biometrics for Human Identifications Intelligent Applications” Medical Information Science Reference, IGI Global 2010
6. Patrizio campisi “Security and Privacy in Biometrics”, Springer 2013
7. Sanjay G.Kanade “Enhancing Information Security and Privacy”, by combining Biometrics with Cryptography, Morgan and Claypool Publishers,2012