
The global market for DePIN projects is expected to surpass $32 billion by the end of the year, driven by growing interest in decentralizing critical physical infrastructure such as energy grids, wireless networks, and data storage.
DePIN is forecasted for exponential growth over the next 3 to 5 years. One of the most anticipated applications is biometric authentication. Unlike traditional KYC models, biometric verification built on the Blockchain significantly helps mitigate risk factors.
Imagine a blockchain that supports social login and biometric authentication — yet in a self-custodial manner. Imagine being able to recover a lost account/wallet without compromising security or your phrase key. Imagine a system where sponsored transactions are natively built-in, so every user without native tokens can interact seamlessly.
Beyond this, Cyberk is also advancing its prots with initiatives that raise the bar even higher: high-performance programmable storage protocols, frameworks that ensure data privacy and access control, and a next-gen network that enables validators to communicate more securely.
To understand this approach deeply, it is necessary to review the fundamentals of DePIN and Zk-proof technology — the two building blocks underpinning this framework.
DePIN (Decentralized Physical Infrastructure Network) is a network of blockchain protocols engineered to facilitate the entire lifecycle management (including development, maintenance, and operation) of physical hardware infrastructure via a decentralized and open-source architecture.
zk-proof (Zero-Knowledge Proof) is a cryptographic primitive where a Prover can mathematically demonstrate to a Verifier that a specific statement (or “witness”) is true, without revealing any information about the statement itself beyond its validity.
Consequently, ZKP is widely applied in authentication, biometrics, and security.
DePIN and Zero-Knowledge Proof (ZKP) technology are intimately linked in building secure and robust decentralized systems. ZKP helps DePIN verify user data and access rights without disclosing sensitive information, thereby enhancing privacy and mitigating security risks within decentralized physical infrastructure networks.
In the field of biometrics and DePIN, Zero-Knowledge Proof (ZKP) technology is utilized to encrypt private data by employing a hashing algorithm, transforming the face into an encrypted vector without revealing the user’s actual image or identity.
This data is then confirmed by validators using ZKP, which helps protect privacy and ensure security during identity verification without exposing personal information, while simultaneously maintaining transparency and trust within the decentralized network.
The process of encrypting Face ID using hashing and vectorization begins with the system capturing the user’s face image. The recognition algorithm then extracts essential features from this image and converts them into a numerical vector () that represents the facial features.
This vector is passed through a cryptographic hash function, create a unique and fixed encrypted string (hash) that is irreversible — it cannot be used to reconstruct the original face, thereby protecting the user’s identity from exposure.
The hash string is then stored or transmitted in an encrypted state, allowing the system or the auditor to confirm the data’s validity without direct access to the original image, ensuring security and privacy via the Zero-Knowledge Proof method.
The process includes the following steps:
This ensures that biometric data is processed securely, accurately, and transparently while preserving user privacy.
Instead of immediately opening the door upon touch, the device scans the palm and converts this image into a facier (a vector representation of biometric features such as skin patterns and vascular structure).
This facier data is then sent to verification protocols (for instance, Humanity Protocol, a decentralized consensus mechanism where validators use Zero-Knowledge Proof (ZKP) technology to verify the data’s validity without exposing the original information).
Once the validators reach a consensus confirming correctness, the result is returned to the device to open the door. This approach ensures high security, avoids the risk of direct biometric data leakage, and leverages the transparency and decentralization of the blockchain, offering users confidence in their privacy and personal data security.
The process of creating a facier from a palm image includes the following key steps:
1. Palm image capture: Using a scanning device or camera to capture the palm image in a raster format (typically grayscale or color). 2. Image pre-processing: The captured image is processed to eliminate noise, adjust brightness, and highlight biometric features such as friction ridges, vascular lines, and other distinctive palm characteristics. The palm area is precisely cropped to standardize size and ratio. 3. Feature extraction: Machine learning or pattern recognition algorithms analyze the pre-processed palm to extract crucial biometric features. Data on lines, veins, intersections, and texture patterns are converted into numerical representations, forming a feature vector (facier). **4. Standardization and vectorization: **These features are digitized as a multi-dimensional vector representing the specific biometric information of the user’s palm. 5. Secure encryption: The biometric vector then undergoes a cryptographic hash function to create a unique, secure hash string that is irreversible to the original image, ensuring user privacy.
This process ensures that within the DePIN biometric technology framework, the palm is processed into a secure, digitized data form (facier) that can be used in conjunction with security protocols like Zero-Knowledge Proof and decentralized validators for authentication without revealing the original data.
The Facier and Zero-Knowledge Proof technologies, combined with decentralized validators, provide developers with a robust framework for secure biometric authentication in DePIN systems. By converting hand palm images into encrypted vectors using cryptographic hashes, and verifying them via validators through ZKP, developers effectively mitigate risks of spoofing and data leakage. This approach opens new possibilities for building scalable, privacy-preserving identity solutions, empowering devs to design innovative protocols on top of decentralized infrastructure with enhanced security and trust.
If you found it to be helpful, all amplification and all feedback would be greatly appreciated!