Начиная с начала 2000 года осуществляется внедрение GHIS в здравоохранении, в рамках принятого проекта о реформирование информ Mathematical Problems of Computer Science 48, 74--81, 2017. Graphical Representations of E-Achievability Region for Identification and Secret-Key Generation System Lilit A. Ter-Vardanyan Institute for Informatics and Automation Problems of NAS RA e-mail: lilit@sci.am Abstract In this paper we represent the computations of theoretical results, obtained in [1], on the example of binary symmetric channel. The computations and graphical representations are realized using the “Advanced Inftheo” module, created in 2015 [2, 3] for R environment. Keywords: Biometric identification system, Secret key, Rate-reliability, R environment. 1. Introduction Nowadays the research of different biometric systems is one of the most important parts of the development of safety measures. Any biometric system may provide a certain degree of confidentiality in terms of information theory. Depending on applications, different models of biometric identification and secret-key generation were considered [4]. For each model one of the most important tasks is to determine the identification rate or the achievable rate of a secret. The next most important task is the study of the rate-reliability or E-achievability region, which is not an easy task [5, 6]. Some outer and inner bounds of that region for various models of biometric settings were obtained in [1, 7-10]. Alongside with difficulties in theoretical research, difficulties in applying the theoretical results also arise. Since the obtained mathematical formulas are complex and difficult to calculate, a module for R was created to perform such calculations. R is a programming language and software environment for statistical analysis, graphics representation and reporting. R was created by Ross Ihaka and Robert Gentleman at the University of Auckland, New Zealand, and is currently developed by the R Development Core Team. The core of R is an interpreted computer language which allows branching and looping as well as modular programming using functions. R allows integration with procedures written in the C, C++, .Net, Python or FORTRAN languages for efficiency. 74 L. Ter-Vardanyan 75 The use of R environment in modern society is growing very fast due to a number of advantages it has, compared to other statistical tools. The module “Advanced Inftheo” for R was developed for estimation and computation of complex formulas of Information Theory. In this paper we use this module for computation of outer and inner bounds of E-achievability region for identification and secret-key generation system. 2. The Model of Biometric Identification and Secret-Key Generation System The Biometric identification and secret-key generation system was considered in [4, 1] (Fig.1). In [1] the inner and outer bounds of E-achievable rates region of this model were obtained. To formulate that result we remind the notations and definitions. The model of biometric identification and secret-key generation system consists of enrollment and identification procedures. In an enrollment phase 𝒱𝒱 individuals are observed. For each individual 𝑣𝑣 = {1, 2, . . . , |𝒱𝒱|} in the system the biometric source produces a biometric enrollment sequence x(v) = (𝑥𝑥1, 𝑥𝑥2, … , 𝑥𝑥𝑁𝑁) ∈ 𝒳𝒳𝑁𝑁. All these sequences are supposed to be generated at random with a given probability distribution (PD) 𝑄𝑄𝑁𝑁(𝐱𝐱) = �𝑄𝑄(𝑥𝑥𝑛𝑛), 𝑁𝑁 𝑛𝑛=1 x ∈ 𝒳𝒳𝑁𝑁 . During the enrollment procedure the biometric sequence x(v) of individual 𝑣𝑣 = {1, 2, . . . , 𝒱𝒱} is encoded into helper data 𝑚𝑚(𝑣𝑣) ∈ {1, 2, . . . , |ℳ|} and a secret key 𝑠𝑠(𝑣𝑣) ∈ {1, 2, . . . , |𝒮𝒮|}, hence the encoder mapping is e(x(v)) = (𝑚𝑚(𝑣𝑣); 𝑠𝑠(𝑣𝑣)) for 𝑣𝑣 = {1, 2, . . . , |𝒱𝒱|}. Fig. 1. The Model of Biometric Identification and Secret-key Generation System. Graphical Representations of E-achievability Region for Identification and Secret-key System 76 The helper data 𝑚𝑚(𝑣𝑣) is then stored in a (public) database at position 𝑣𝑣 and the generated secret key 𝑠𝑠(𝑣𝑣) is handed over to the individual. The helper data makes the reliable identification possible. During the identification procedure a biometric identification sequence 𝒚𝒚 = (y1, y2, . . . , yN) ∈ 𝒴𝒴𝑁𝑁 is observed. If individual 𝑣𝑣 was observed, the sequence 𝒚𝒚(𝑣𝑣) occurs with probability 𝑊𝑊𝑁𝑁(𝐲𝐲|𝐱𝐱) = �𝑊𝑊(𝑦𝑦𝑛𝑛| 𝑥𝑥𝑛𝑛) 𝑁𝑁 𝑛𝑛=1 , 𝐲𝐲 ∈ 𝒴𝒴𝒩𝒩 , 𝐱𝐱 ∈ 𝒳𝒳𝒩𝒩, since the biometric channel 𝑊𝑊𝑁𝑁(𝐲𝐲|𝐱𝐱) is memoryless. During identification, upon observing the biometric identification sequence 𝐲𝐲, the decoder forms an estimate 𝑣𝑣� of the identity of the observed individual as well as an estimate of his secret key s(𝑣𝑣�), �𝑣𝑣�, s(𝑣𝑣�)� = 𝑑𝑑(𝐲𝐲, 𝑚𝑚(1), 𝑚𝑚(2), … , 𝑚𝑚(𝒱𝒱)), where 𝑑𝑑 is the decoder mapping. Definition (E-achievability): For 𝐸𝐸 > 0 an identification and secret-key rate pair 𝑅𝑅𝐼𝐼, 𝑅𝑅𝑆𝑆 with 𝑅𝑅𝐼𝐼 ≥ 0 and 𝑅𝑅𝐼𝐼 ≥ 0 is 𝐸𝐸-achievable in a biometric identification setting, if for all 𝛿𝛿 > 0 for all 𝑁𝑁 large enough, there exists an encoder and a decoder such that Pr {(𝑣𝑣�, �̂�𝑠) ≠ (𝑣𝑣, 𝑠𝑠)} ≤ exp{−𝑁𝑁(𝐸𝐸 − 𝛿𝛿)}, 1 𝑁𝑁 log |𝒱𝒱| ≥𝑅𝑅𝐼𝐼 − 𝛿𝛿, 1 𝑁𝑁 log |𝒮𝒮| ≥𝑅𝑅𝑆𝑆 − 𝛿𝛿, 1 𝑁𝑁 𝐼𝐼(𝑆𝑆 ∧ 𝑀𝑀) ≤ 𝛿𝛿. We use the following PD in the formulation of result: 𝑃𝑃 = {𝑃𝑃(𝑥𝑥), 𝑥𝑥 ∈ 𝒳𝒳}; 𝑉𝑉 = {𝑉𝑉 (𝑦𝑦 | 𝑥𝑥), 𝑦𝑦 ∈ 𝒴𝒴, 𝑥𝑥 ∈ 𝒳𝒳}. For information-theoretic quantities, such as entropy 𝐻𝐻𝑃𝑃(𝑋𝑋), mutual information 𝐼𝐼𝑃𝑃,𝑉𝑉(𝑋𝑋 ∧ 𝑌𝑌), divergence 𝐷𝐷(𝑉𝑉||𝑊𝑊|𝑃𝑃) we refer to [5, 6, 11]. The main result of [1] is the following theorem. Theorem 1: For the biometric identification and secret-key generation system with the given 𝑄𝑄, 𝑊𝑊 and for all 𝐸𝐸 > 0 ℛ𝑟𝑟(𝐸𝐸, 𝑄𝑄, 𝑊𝑊 ) ⊆ ℛ(𝐸𝐸, 𝑄𝑄, 𝑊𝑊) ⊆ ℛ𝑠𝑠𝑠𝑠(𝐸𝐸, 𝑄𝑄, 𝑊𝑊 ), where ℛ𝑟𝑟(𝐸𝐸, 𝑄𝑄, 𝑊𝑊) = {(𝑅𝑅𝐼𝐼, 𝑅𝑅𝑆𝑆): 𝑅𝑅𝐼𝐼 + 𝑅𝑅𝑆𝑆 ≤ 𝑚𝑚𝑚𝑚𝑚𝑚𝑃𝑃,𝑉𝑉:𝐷𝐷(𝑃𝑃∘𝑉𝑉||𝑄𝑄∘𝑊𝑊)≤𝐸𝐸 |𝐼𝐼𝑃𝑃,𝑉𝑉(𝑋𝑋 ∧ 𝑌𝑌) + 𝐷𝐷(𝑃𝑃 ∘ 𝑉𝑉||𝑄𝑄 ∘ 𝑊𝑊) − 𝐸𝐸|+} ℛ𝑠𝑠𝑠𝑠(𝐸𝐸, 𝑄𝑄, 𝑊𝑊) = {(𝑅𝑅𝐼𝐼, 𝑅𝑅𝑆𝑆): 𝑅𝑅𝐼𝐼 + 𝑅𝑅𝑆𝑆 ≤ 𝑚𝑚𝑚𝑚𝑚𝑚𝑃𝑃,𝑉𝑉:𝐷𝐷(𝑃𝑃∘𝑉𝑉||𝑄𝑄∘𝑊𝑊)≤𝐸𝐸 𝐼𝐼𝑃𝑃,𝑉𝑉(𝑋𝑋 ∧ 𝑌𝑌)}. The notation |𝑎𝑎|+ is used for 𝑚𝑚𝑎𝑎𝑥𝑥 (𝑎𝑎, 0). L. Ter-Vardanyan 77 3. Graphical Representation of Computations Let's consider a binary symmetric channel with the parameter d, it means that 𝑊𝑊(𝑦𝑦|𝑥𝑥) conditional distribution matrix is defined as 𝑊𝑊(1|1) = 𝑊𝑊(0|0) = 1 − 𝑑𝑑, 𝑊𝑊(1|0) = 𝑊𝑊(0|1) = 𝑑𝑑. We have performed computations of above formulas in the theorem using “Advanced Inftheo” module. Figure 2 shows the dependence of the 𝑅𝑅𝐼𝐼+𝑅𝑅𝑆𝑆 from E for the parameter 𝑑𝑑 = 0.2. The calculations are realized with the step 0.003. Fig.2. The bounds of E-achievable rate region, when d=0.2 with step 0.003 Graphical Representations of E-achievability Region for Identification and Secret-key System 78 Figure 3 shows the dependence of identification rate 𝑅𝑅𝐼𝐼 on E and Figure 4 shows the dependence of secret-key rate 𝑅𝑅𝑆𝑆 on E for the same parameter d=0.2. Fig. 3. The bounds of E-achievable identification rate Fig. 4. The bounds of E-achievable secret key rate L. Ter-Vardanyan 79 In Figure 5 the dependence of 𝑅𝑅𝐼𝐼 on𝑅𝑅𝑆𝑆 is represented for various E. In other words Figure 5 shows the trade-off between identification and secret-key rates. It means that the more individuals would like to be able to reliably identify, the smaller secret keys can be assigned to individuals for identification purposes and the identification system becomes less secure. It means that it becomes easier to get access to the systems that deploy biometric identification, since smaller secrets are easier to guess and also require less biometric information for their reconstruction. 4. Conclusion The outer and inner bounds for E-achievability region for the model of biometric identification system and secret-key generation is investigated by constructing graphics for binary symmetric channel. Fig. 5. Identification versus secret-key rate projection, d=0.2 Graphical Representations of E-achievability Region for Identification and Secret-key System 80 References [1] M. Haroutunian, L. Ter-Vardanyan, “Investigation of E-achievability region for identification and secret-key generation system”, CSIT-2013 The 9th International Conference on Computer Science and Information Technologies (Dedicated to the 70th anniversary of the National Academy of Sciences of Armenia), Yerevan, Armenia, pp. 107-110 , 2013. [2] N. Pahlevanyan and M. Haroutunian, "Technical solutions of developing Advanced Inftheo new module for R," CSIT-2015 The 10th International Conference on Computer Science and Information Technologies, Yerevan, Armenia, pp. 306-309, 2015. [3] N. Pahlevanyan and M. Haroutunian, "Results of performance analysis of Advanced Inftheo new package for R," Transactions of IIAP of NAS of RA, Mathematical Problems of Computer Science, vol. 45, pp. 5-13, 2016. [4] T. Ignatenko and F. M. Willems, "Biometric security from an information-theoretical perspective," Foundations and Trends in Communications and Information Theory, vol. 7, no. 2-3, pp. 135-316, 2012. [5] E. A. Haroutunian, M. E. Haroutunian and A. N. Harutyunyan, "Reliability criteria in information theory and in statistical hypothesis testing," Foundations and Trends in Communications and Information Theory, vol. 4, no. 23, pp. 97–263, 2008. [6] E. Haroutunian, "On bounds for E - capacity of DMC," IEEE Transactions on Information Theory, vol. 53, no. 11, pp. 4210–4220, 2007. [7] M. Haroutunian, A. Muradyan and L. Ter- Vardanyan, “On the E-capacity of a biometric identification system”, CSIT-2011 The 8th International Conference on Computer Science and Information Technologies, Yerevan, Armenia, pp. 132-134, 2011. [8] M. E. Haroutunian, A. Muradyan and L. Ter-Vardanyan, "Upper and lower bounds of biometric identification E-capacity", Transactions of IIAP of NAS RA, Mathematical Problems of Computer Science, vol. 36, pp .1-10, 2012. [9] M. Haroutunian and N. Pahlevanyan "Information theoretical analysis of biometric secret key sharing model," Transactions of IIAP of NAS RA, Mathematical Problems of Computer Science, vol. 42, pp. 17-27, 2014. [10] M. Haroutunian and L. Ter-Vardanyan, “Rate-reliability for protected biometric identification system with secret generation”, From Information Age to Big Data Era, Yerevan, Armenia, pp. 54-68, 2016. [11] T. M. Cover and J. A. Thomas, Elements of Information Theory, 2nd Edition, New York, NY, USA: Wiley-Interscience, 2006. Submitted 05.08.2017, accepted 04. 12.2017. L. Ter-Vardanyan 81 Նույնականացման և գաղտնի բանալի գեներացման համակարգի համար E-հասանելի տիրույթի գրաֆիկական ներկայացումները Լ. Տեր-Վարդանյան Ամփոփոում Հոդվածում ներկայացված են [1]-ում ստացված տեսական արդյունքների հաշվարկները երկուական սիմետրիկ կապուղու օրինակով: Հաշվարկները և գրաֆիկները կատարվել են 2015թ.-ին R միջավայրի համար ստեղծված «Advanced Inftheo» մոդուլի միջոցով [2, 3]: Графические представления области E-достижимости для системы идентификации и генерации секретного ключа Л. Тер-Варданян Аннотация В статье представлены расчеты теоретических результатов, полученных в [1], на примере двоичного симметричного канала. Вычисления и графические представления реализованы с использованием модуля «Advanced Inftheo», созданного в 2015 году для среды R [2, 3].