Security and performance evaluation platform of biometric match on card

In order to verify the identity of a cardholder user, the typing of a PIN code is usually required, but this method does not guarantee the verification result. Only biometrics is able to authenticate an user as this information is strongly related to the user. To ensure security and privacy issues (such as the protection of the biometric data), Match On Card (MOC) solutions have been proposed. This approach consists in storing the biometric user's reference and computing the verification decision in a Secure Element (SE). The purpose of this paper is to propose an evaluation platform on biometric MOC for testing its performance and security. This platform allows to perform tests given scenarios and benchmarks for comparing MOCs. We illustrate the usefulness of this platform on a commercial MOC.

[2]  Baptiste Hemery,et al.  A study of users' acceptance and satisfaction of biometric systems , 2010, 44th Annual 2010 IEEE International Carnahan Conference on Security Technology.

[3]  Patrick J. Grother,et al.  Performance of Fingerprint Match-on-Card Algorithms Phase II / III Report NIST Interagency Report 7477 (Revision I) , 2009 .

[4]  Siva Sai Yerubandi,et al.  Differential Power Analysis , 2002 .

[5]  Sylvain Vernois,et al.  Analyse de la sécurité de transactions à puce avec le framework WinSCard Tools , 2011 .

[6]  J. Fierrez-Aguilar,et al.  Hill-Climbing and Brute-Force Attacks on Biometric Systems: A Case Study in Match-on-Card Fingerprint Verification , 2006, Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology.

[7]  Julian Fiérrez,et al.  A Comparative Study of Fingerprint Image-Quality Estimation Methods , 2007, IEEE Transactions on Information Forensics and Security.

[8]  Ernst Bovelander Smart Card Security , 1997, State of the Art in Applied Cryptography.

[9]  Robert W. Proctor,et al.  Human-Biometric Sensor Interaction: Impact of Training on Biometric System and User Performance , 2009, HCI.

[10]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[11]  Charles L. Wilson,et al.  A novel approach to fingerprint image quality , 2005, IEEE International Conference on Image Processing 2005.

[12]  Elham Tabassi,et al.  Performance of Biometric Quality Measures , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[13]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[14]  Paul C. Kocher,et al.  Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.

[15]  Anil K. Jain,et al.  FVC2004: Third Fingerprint Verification Competition , 2004, ICBA.

[16]  Mike Bond,et al.  2010 IEEE Symposium on Security and Privacy Chip and PIN is Broken , 2022 .

[17]  Sharath Pankanti,et al.  Biometrics: a grand challenge , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..

[18]  Chulhan Lee,et al.  Model-Based Quality Estimation of Fingerprint Images , 2006, ICB.

[19]  M. Kuhn,et al.  The Advanced Computing Systems Association Design Principles for Tamper-resistant Smartcard Processors Design Principles for Tamper-resistant Smartcard Processors , 2022 .