What is it about?

Biometrics security is a dynamic research area spurred by the need to protect personal traits from threats like theft, non-authorised distribution, reuse and so on. A widely investigated solution to such threats consists of processing the biometric signals under encryption, in order to avoid any leakage of information towards non-authorised parties. In this study, the authors propose to leverage on the superior performance of multimodal biometric recognition to improve the efficiency of a biometric based authentication protocol operating on encrypted data under the malicious security model. In the proposed protocol, authentication relies on both facial and iris biometrics, whose representation accuracy is specifically tailored to the trade-off between recognition accuracy and efficiency.

Featured Image

Why is it important?

In this paper, we have proposed a multimodal authentication protocol based on a protocol secure against a malicious party. We have shown that by using a multi-modal system it is possible to improve the efficiency of the recognition process in terms of number of multiplications and evaluation time, without any loss of accuracy. In the same way, it is also possible to improve accuracy at the cost of a negligible increase of complexity.


Due to the recently widespread use of biometric authentication on laptops and smartphones, it would also be interesting to evaluate the possibility to apply our system to mobile devices. In those devices, fingerprint or face readers and extractors are often already in place, but since their only scope is to confirm owner identification, templates are matched in plain domain. Readers on mobile devices could also be used to access remote services through biometric authentication. In this scenario, SEMBA could be used to enhance security during match computation.

Giulia Droandi

Read the Original

This page is a summary of: SEMBA: SEcure Multi-Biometric Authentication, IET Biometrics, June 2019, the Institution of Engineering and Technology (the IET),
DOI: 10.1049/iet-bmt.2018.5138.
You can read the full text:



The following have contributed to this page