Analysis of Multimodal Biometric Fusion Based Authentication Techniques for Network Security
|
|
|
- Shon Hardy
- 10 years ago
- Views:
Transcription
1 , pp Analysis of Multimodal Biometric Fusion Based Authentication Techniques for Network Security R.Divya #1 and V.Vijayalakshmi #2 #1 Research Scholar, Department of ECE, Pondicherry Engineering College, Puducherry #2 Assistant Professor, Department of ECE, Pondicherry Engineering College, Puducherry. 1 [email protected]; 2 [email protected] Abstract Multibiometrics is the usage of more than one physiological or behavioral characteristic to identify an individual. Multibiometrics is advantageous over unibiometrics as it is resilience to spoofing and has low False Acceptance Rate (FAR). However Multibiometrics requires storage of multiple biometric templates for each user, which results in increased risk to user privacy and system security. This paper will discuss the concept off biometrics and biometric system, multimodal biometric fusion techniques, crypto-biometrics and an algorithm for session key generation for secure communication of data. Keyword: Biometrics, multibiometric fusion, cryptobiometrics, security. 1. Introduction Biometric systems operate under the premise that many of the physical or behavioral characteristics of humans are distinctive to an individual, and that they can be reliably acquired via appropriately designed sensors and represented in a numerical format that lends itself to automatic decision-making in the context of identity management. Thus, these systems may be viewed as pattern recognition engines that can be incorporated in diverse markets. Traditional methods of establishing a person s identity include knowledge-based (e.g., passwords) and token-based (e.g., ID cards) mechanisms, but these surrogate representations of identity can easily be lost, shared, manipulated or stolen thereby compromising the intended security. By using biometrics it is possible to establish an identity based on who you are, rather than by what you possess, such as an ID card, or what you remember, such as a password. In some applications, biometrics may be used to supplement ID cards and passwords thereby imparting an additional level of security. Such an arrangement is often called a dual-factor authentication scheme. 2. Strength of Biometrics Biometric identifiers are difficult to be lost or forgotten, difficult to be copied/shared, and require the person to be authenticated to be present at the time and point of authentication (a user cannot claim his password was stolen and misused). Instead of passwords, biometric systems could be used to protect the strong cryptographic keys. For a given biometric identifier, all users have a relatively equal security. There cannot be many users who have easy to guess biometrics that can be used to mount an attack against them. 3. Biometric System In a biometric system, a physical trait needs to be recorded. The recording is referred to as an enrollment. This enrollment is based on the creation of a template. A template is the digital ISSN: IJSIA Copyright c 2015 SERSC
2 representation of a physical trait. The template is normally a long string of alphanumeric characters that describe, based on a biometric algorithm, characteristics or features of the physical trait. The basic block diagram of an biometric system is shown in Fig.1 The biometric algorithm can be viewed as the recipe for turning raw ingredients like a physical trait into a digital representation in the form of a template. The algorithm will also allow the matching of an enrolled template with a new template just created for verifying an identity, called a live template. When a stored template and a live template are compared, the system calculates how closely they match. If the match is close enough, a person will be verified. If the match is not close enough, a person will not be verified. Figure 1. Block Diagram of Biometric System Sensor: The sensor is an interface between the real world and the system. It is used to acquire all the necessary data, depending on the characteristic in consideration. Pre-processing : This block is needed to enhance the input (i.e., remove all the background noise and unnecessary artifacts during data collection) and also to use some kind of normalization, if needed. Feature Extractor : This block is responsible to extract the necessary features from the preprocessed input in the correct and in the optimal way. Template Generator : The template is typically a vector of numbers or an image with particular properties, and is generally a synthesis of the relevant characteristics extracted from the source. Elements of the biometric measurement that are not used in the comparison algorithm are discarded in the template to reduce the file size and to protect the identity of the enrollee. If an enrollment is performed, the template is typically stored in a central database. If a matching is being performed, the obtained template is passed to a matcher that compares it with other relevant templates in the database and estimates the distance between them using any specific algorithm (e.g., the Hamming Distance metric) and returns the result. 240 Copyright c 2015 SERSC
3 4.1. Performance Metrics for Biometric Systems The different performance metrics for evaluating the biometric system are as follows False Acceptance Rate ( FAR) : The FAR is defined as the probability that a user making a false claim about his/her identity will be verified as that false identity. The importance of the FAR is the strength of the matching algorithm. The stronger the algorithm, the less likely that a false authentication will happen. FRR (False Rejection Rate): The FRR is defined as the probability that a user making a true claim about his/her identity will be rejected as him/herself. The strength of the FRR is the robustness of the algorithm. The more accurate the matching algorithm, the less likely a false rejection will happen. Crossover Error Rate (CER): The rate at which both the accept and reject errors are equal. A lower value for the CER is desired for a biometric system in order to be considered more accurate as well as convenient for its users. Failure to Enroll Rate (FER): The rate at which attempts to create a template from an input is not successful. This is most commonly caused by low quality inputs that are insufficiently distinctive biometric samples or from a system design that makes it difficult to provide consistent biometric data. Failure to Capture Rate (FCR): Applicable for automated systems, the probability that the system fails to detect a biometric input when presented correctly. Template Capacity: The number of unique users that can be represented by its contents Tradeoff: Larger the FER, lower the FAR and FRR; and vice-versa. The graphical representation of relationship between FRR, FAR and CER is shown in Fig.2. Figure 2. Typical Relationship between FRR, FAR and CER Copyright c 2015 SERSC 241
4 4.2. Biometric System Evaluation The biometric system can be evaluated with the help of these factors Universality: Can everyone provide the considered biometric. Uniqueness: How well the biometric separates individually from another. Permanence : Stability along life time. Collectability : Ease of capture for measurement. Performance : Accuracy, speed, and robustness of technology used. Acceptability : Degree of approval of a technology by end user. Circumvention : How hard to fool the system Different Biometric Traits The biometric trait can be classified into two different categories as Physical / Physiological Biometrics Behavioural Biometrics The traits that comes by birth with the individual like finger print, face, iris, retinal pattern, ear, voice, hand, DNA, vein, tongue etc. can be classified as Physical / Physiological Biometrics and the traits that can be developed as the grows up like signature, keystroke, gait etc.can be classified as Behavioural Biometrics. 5. Multi-Biometric Systems While every user is expected to possess the biometric identifier being acquired, in reality, it is possible for a subset of the users to be not able to provide a particular biometric. An impostor may attempt to spoof the biometric identifier of a legitimate enrolled user in order to circumvent the system. So multimodal biometric system is an advantage when compared to unimodal system. A Multi-biometric system could address the problem of non-universality, since multiple biometric identifiers would ensure sufficient population coverage. Provide anti-spoofing measures by making it difficult for an intruder to simultaneously spoof the multiple biometric identifiers of a legitimate user. Ensure a live user is present at the point of data acquisition by asking the user to present a random subset of the multiple biometric identifiers. Overall, multibiometric systems could facilitate a challenge-response kind of authentication Levels of Fusion in Multi-Biometric Systems The various fusion levels for a multi-biometric system is summarized in this section. They are as follows Sensor-Level Fusion Feature-Level Fusion Match Score-Level Fusion Decision-Level Fusion Sensor-Level Fusion: The raw data obtained from multiple sensors (one for each biometric identifier) can be processed and integrated to generate new data from which features can be extracted. Feature-Level Fusion: The feature sets extracted from each biometric identifier sources can be fused to create a new feature set to represent the individual. The block diagram of feature level fusion multi-biometric system is shown in Fig Copyright c 2015 SERSC
5 Figure 3. Block Representation of Feature Level Fusion Match Score-Level Fusion: The match scores obtained from each biometric classifier are normalized and the normalized scores are summed to obtain a new match score used to make the final decision. The block diagram of score level fusion multi-biometric system is shown in Fig.4. Figure 4. Block Representation of Score Level Fusion Decision-Level Fusion: The decisions (Accept/ Reject) made at each biometric system based on the individual scores are then combined (usually a majority voting approach) to arrive at a Copyright c 2015 SERSC 243
6 final decision. The block diagram of decision level fusion multi-biometric system is shown in Fig.5. Figure 5. Block Representation of Decision Level Fusion 6. Biometric for Network Security Combining Biometrics with Cryptography for secure data communication takes place with the help of two steps as Biometric-Key Release Biometric-Key Binding Biometric-Key Release: A legitimate user (say Alice ) wishes to access certain digital content. She offers her biometric sample to the system. If the biometric matcher successfully matches Alice s input biometric sample with her enrolled biometric template, then a cryptographic key can be released. The cryptographic key is used to decrypt the content and Alice is allowed to access the content. If an illegitimate user attempts to access the same digital content posing as Alice, his biometric match with the biometric template of Alice will fail and Alice s cryptographic key will not be released by the system. Figure 6. Biometric-Key Release 244 Copyright c 2015 SERSC
7 Biometric-Key Binding: The idea is to store only a hash of the biometric template (instead of the actual template) in the database, similar to the concept of cancellable biometric. If the hash function chosen is a one-way hash function, it may not be possible to use the hash value of the biometric template to extract the original biometric sample. So, even if the template hash database is stolen, it would not be a problem. In addition, a trusted and secret bit-replacement algorithm can be used to hide the cryptographic key within the user s biometric template itself rather than storing it separately. A simple bit-replacement algorithm could be to replace the least significant bits of the pixels values/features of the biometric template with the cryptographic key. Since the biometric matching and key extraction are integrated, it may not be possible for an attacker to compromise the biometric authentication system with a Trojan horse and expect the cryptographic key to be released. However, if the biometric smart card is stolen, the person who has the Smart card would be still able to extract the cryptographic key. Figure 6. Biometric-Key Binding 6.1 Biometrics based Session-key Generation and Sharing Protocol In this Biometrics based session-key generation and sharing protocol the enrollment is securely carried out off-line and cancelable template is generated using the biometric data of the user and it is stored in the database at the server. The cancelable template from biometric data is θ canc The shuffling of the enrollment biometric data is done by θ ref + shuffling key K sh. The shuffling key K sh is either stored on a smart card or can be generated from a password. The algorithm for generating session key is as follows When a client desires to securely communicate with the server, following steps are carried out: The client sends authentication request to the server. The server sends acknowledgement to the client. Shuffled test biometric data θʹcanc by client 1. Fresh biometric data θtest of the user is captured. 2. Shuffled using the shuffling key K sh 3. θʹcanc = θ test + K sh User ID of the user is sent to the server not the biometric Locked code θ lock is created by server 1. The server generates a random key K r 2. Stored cancelable template θ canc. 3. θ lock = E (K r, θ ref ) where E( ) indicates the encoding function. The locked code θ lock and H(H(K r )) is sent to the client. 1. The client regenerates a trial value of the random key Kʹr Kʹr = E-1 (θʹcanc, θ lock ) 2. Kʹr is made as H(H(Kʹr )) Copyright c 2015 SERSC 245
8 If H(H(K r )) = H(H(Kʹr )) Server Authentic then H(Kʹr ) is sent to server Server compares H(Kʹr) = H(K r ), to check the authenticity of the client. If H(Kʹr) = H (K r ) user Authentic - both parties - same key K r. Server sends the signal to start secure communication using the key Kr. The Client & server share the same key which is a concept of symmetric key cryptography. The key is temporary and it is destroyed at the end of the communication session. Next communication session, a new key Kr will be randomly generated. The data being transferred through the channel during the protocol are Request, user ID, locked code θlock, hash values H(H(Kr)) and H(Kʹr ). None of the data reveal the biometric information. 7. Conclusion The proposed algorithm can be illustrated with the practical example application like online secure transaction. It contains two ends namely Server and client which performs full duplex communication between them. With the proposed session key generation protocol mutual authentication can be achieved. With the help of session key generation protocol better security and enhanced operation between server and client using multibiometrics can be achieved. References [1] M. R. Ogiela and U. Ogiela, The use of mathematical linguistic methods in creating secret sharing threshold algorithms, Computers and Mathematics with Applications, vol. 60, no. 2, (2010), pp [2] M. Drahansky, Biometric Cryptography Based on Fingerprints : Combination of Biometrics and Cryptography Using Information from Fingerprints, LAP LAMBERT Academic Publishing, (2010). [3] M. Upmanyu, A. M. Narnboodiri, K. Srinathan and C. V. Jawahar, Blind Authentication: A Secure Crypto-Biometric Verification Protocol, IEEE Transactions on Information Forensics and Security, vol. 5, no. 2, (2010), pp [4] S. Kanade, D. P. Delacretaz and B. Dorizzi, Cancelable Iris Biometrics and Using Error Correcting Codes to Reduce Variability in Biometric Data, IEEE Computer Society Conference on Computer Vision and Pattern Recognition, (2009). [5] S. Argyropoulos, D. Tzovaras, D. Ioannidis and M. G. Strintzis, A Channel Coding Approach for Human Authentication From Gait Sequences, IEEE Transactions on Information Forensics and Security, vol. 4, no. 3, (2009), pp [6] S. Kanade, D. P. Delacretaz and B. Dorizzi, A Novel Crypto-Biometric Scheme for Establishing Secure Communication Sessions Between Two Clients, International Conference of the Biometrics Special Interest Group, (2012). [7] A. Nagar, K. Nandakumar and A. K. Jain, Multibiometric Cryptosystems Based on Feature- Level Fusion, IEEE Transactions On Information Forensics And Security, vol. 7, no.1, (2012), pp [8] N. Poh and J. Kittler, A Unified Framework for Biometric Expert Fusion Incorporating Quality Measures, IEEE Transactions On Pattern Analysis And Machine Intelligence, vol. 34, no. 1, (2012), pp [9] R. N. Rodrigues, L. L. Ling and V. Govindaraju, Robustness of Multimodal Biometric Fusion Methods Against Spoof Attacks, Journal on Visual Language Computation, vol. 20, no. 3, (2009), pp [10] A. Nagar and A. K. Jain, On the Security of Non-invertible Fingerprint Template Transforms, Proceedings of IEEE Workshop on Information Forensic sand Security, (2009); London, U.K.. [11] T. Ignatenko and F. M. J. Willems, Biometric Systems: Privacy and Secrecy Aspects, IEEE Transactions On Information Forensics And Security, vol. 4, no. 4, (2009), pp [12] W. Scheirer and T. Boult, Bio-Cryptographic Protocols with Bipartite Bio-Tokens, Proceedings of Biometric Symposium, (2008). [13] A. B. J. Teoh, K. A. Toh and W. K. Yip, Discretisation of Biophasor in Cancellable Biometrics, Proceedings of Second International Conference on Biometrics, (2007); Seoul, South Korea. [14] N. K. Ratha, S. Chikkerur, J. H. Connell and R. M. Bolle, Generating Cancelable Fingerprint Templates, IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 29, no. 4, (2007), pp Copyright c 2015 SERSC
Multimodal Biometric Recognition Security System
Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security
Application of Biometrics to Obtain High Entropy Cryptographic Keys
1 Application of Biometrics to Obtain High Entropy Cryptographic Keys Sanjay Kanade, Danielle Camara, Dijana Petrovska-Delacrétaz, and Bernadette Dorizzi Abstract In this paper, a two factor scheme is
Multi-Factor Biometrics: An Overview
Multi-Factor Biometrics: An Overview Jones Sipho-J Matse 24 November 2014 1 Contents 1 Introduction 3 1.1 Characteristics of Biometrics........................ 3 2 Types of Multi-Factor Biometric Systems
Three Factor Scheme for Biometric-Based Cryptographic Key Regeneration Using Iris
Three Factor Scheme for Biometric-Based Cryptographic Key Regeneration Using Iris Sanjay KANADE, Danielle CAMARA, Emine KRICHEN, Dijana PETROVSKA-DELACRÉTAZ, and Bernadette DORIZZI TELECOM & Management
Framework for Biometric Enabled Unified Core Banking
Proc. of Int. Conf. on Advances in Computer Science and Application Framework for Biometric Enabled Unified Core Banking Manohar M, R Dinesh and Prabhanjan S Research Candidate, Research Supervisor, Faculty
Application-Specific Biometric Templates
Application-Specific Biometric s Michael Braithwaite, Ulf Cahn von Seelen, James Cambier, John Daugman, Randy Glass, Russ Moore, Ian Scott, Iridian Technologies Inc. Introduction Biometric technologies
Identity theft is a growing concern
IDENTITY SCIENCES Authentication: System Security and User Privacy Anil K. Jain Michigan State University Karthik Nandakumar Institute for Infocomm Research, Singapore While biometric systems aren t foolproof,
Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human
Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative
Biometric For Authentication, Do we need it? Christophe Rosenberger GREYC Research Lab - France
Biometric For Authentication, Do we need it? Christophe Rosenberger GREYC Research Lab - France OUTLINE Le pôle TES et le sans-contact Introduction User authentication GREYC - E-payment & Biometrics Introduction
A Comparative Study on ATM Security with Multimodal Biometric System
A Comparative Study on ATM Security with Multimodal Biometric System K.Lavanya Assistant Professor in IT L.B.R.College of Engineering, Mylavaram. [email protected] C.Naga Raju Associate Professor
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management
Authentication Scheme for ATM Based On Biometric K. Kavitha, II-MCA IFET COLLEGE OF ENGINEERING DEPARTMENT OF COMPUTER APPLICATIONS
Authentication Scheme for ATM Based On Biometric K. Kavitha, II-MCA IFET COLLEGE OF ENGINEERING DEPARTMENT OF COMPUTER APPLICATIONS ABSTRACT: Biometrics based authentication is a potential candidate to
addressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from
Preface In the last decade biometrics has emerged as a valuable means to automatically recognize people, on the base is of their either physiological or behavioral characteristics, due to several inherent
Biometric Authentication using Online Signature
University of Trento Department of Mathematics Outline Introduction An example of authentication scheme Performance analysis and possible improvements Outline Introduction An example of authentication
Review Article Biometric Template Security
Hindawi Publishing Corporation EURASIP Journal on Advances in Signal Processing Volume 2008, Article ID 579416, 17 pages doi:10.1155/2008/579416 Review Article Biometric Template Security Anil K. Jain,
Multimedia Document Authentication using On-line Signatures as Watermarks
Multimedia Document Authentication using On-line Signatures as Watermarks Anoop M Namboodiri and Anil K Jain Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824
Biometrics and Cyber Security
Biometrics and Cyber Security Key Considerations in Protecting Critical Infrastructure Now and In The Future Conor White, Chief Technology Officer, Daon Copyright Daon, 2009 1 Why is Cyber Security Important
IDRBT Working Paper No. 11 Authentication factors for Internet banking
IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased
Biometric Authentication Platform for a Safe, Secure, and Convenient Society
472 Hitachi Review Vol. 64 (2015), No. 8 Featured Articles Platform for a Safe, Secure, and Convenient Society Public s Infrastructure Yosuke Kaga Yusuke Matsuda Kenta Takahashi, Ph.D. Akio Nagasaka, Ph.D.
CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity
CSC 474 -- Network Security Topic 6.2 User Authentication CSC 474 Dr. Peng Ning 1 User Authentication Basics CSC 474 Dr. Peng Ning 2 Authentication and Identity What is identity? which characteristics
BehavioSec participation in the DARPA AA Phase 2
BehavioSec participation in the DARPA AA Phase 2 A case study of Behaviometrics authentication for mobile devices Distribution Statement A (Approved for Public Release, Distribution Unlimited) 1 This paper
Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means.
Definition Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means. Description Physiological biometrics is based
Biometric Authentication using Online Signatures
Biometric Authentication using Online Signatures Alisher Kholmatov and Berrin Yanikoglu [email protected], [email protected] http://fens.sabanciuniv.edu Sabanci University, Tuzla, Istanbul,
NFC & Biometrics. Christophe Rosenberger
NFC & Biometrics Christophe Rosenberger OUTLINE GREYC - E-payment & Biometrics Contactless transactions Biometric authentication Solutions Perspectives 2 GREYC Research Lab Research Group in Computer science,
Dr.R.Venkatesan Professor and Head, Department of CSE, PSG College of Technology Coimbatore, Tamilnadu, India
A Survey on Biometrics based Cryptographic Key Generation Schemes Mr.P.Balakumar Associate Professor, Department of CSE, Selvam College of Technology, Namakkal, Tamilnadu, India Abstract - Need for information
Security of Biometric Authentication Systems Parvathi Ambalakat
Security of Biometric Authentication Systems Parvathi Ambalakat ABSTRACT Biometric based authentication, the science of using physical or behavioral characteristics for identity verification is becoming
May 2010. For other information please contact:
access control biometrics user guide May 2010 For other information please contact: British Security Industry Association t: 0845 389 3889 f: 0845 389 0761 e: [email protected] www.bsia.co.uk Form No. 181.
This method looks at the patterns found on a fingertip. Patterns are made by the lines on the tip of the finger.
According to the SysAdmin, Audit, Network, Security Institute (SANS), authentication problems are among the top twenty critical Internet security vulnerabilities. These problems arise from the use of basic
Two-Factor Authentication or How to Potentially Counterfeit Experimental Results in Biometric Systems
Two-Factor Authentication or How to Potentially Counterfeit Experimental Results in Biometric Systems Christian Rathgeb and Andreas Uhl University of Salzburg, Department of Computer Sciences, A-5020 Salzburg,
Automatic Biometric Student Attendance System: A Case Study Christian Service University College
Automatic Biometric Student Attendance System: A Case Study Christian Service University College Dr Thomas Yeboah Dr Ing Edward Opoku-Mensah Mr Christopher Ayaaba Abilimi ABSTRACT In many tertiary institutions
Securing Electronic Medical Records Using Biometric Authentication
Securing Electronic Medical Records Using Biometric Authentication Stephen Krawczyk and Anil K. Jain Michigan State University, East Lansing MI 48823, USA {krawcz10,jain}@cse.msu.edu Abstract. Ensuring
Securing Electronic Medical Records using Biometric Authentication
Securing Electronic Medical Records using Biometric Authentication Stephen Krawczyk and Anil K. Jain Michigan State University, East Lansing MI 48823, USA, [email protected], [email protected] Abstract.
3D Signature for Efficient Authentication in Multimodal Biometric Security Systems
3D Signature for Efficient Authentication in Multimodal Biometric Security Systems P. M. Rubesh Anand, Gaurav Bajpai, and Vidhyacharan Bhaskar Abstract Unimodal biometric systems rely on a single source
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE. [email protected]
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE 1 S.Manikandan, 2 S.Abirami, 2 R.Indumathi, 2 R.Nandhini, 2 T.Nanthini 1 Assistant Professor, VSA group of institution, Salem. 2 BE(ECE), VSA
MULTIMEDIA CONTENT PROTECTION VIA BIOMETRICS-BASED ENCRYPTION. Umut Uludag and Anil K. Jain
Copyright 22 IEEE. Published in the 23 International Conference on Multimedia and Expo (ICME 23), scheduled for July 6-9, 23 in Baltimore, Maryland, SA. Personal use of this material is permitted. However,
Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks
Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks Ph. D. Student, Eng. Eusebiu Marcu Abstract This paper introduces a new method of combining the
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage P. Selvigrija, Assistant Professor, Department of Computer Science & Engineering, Christ College
One Time Password Generation for Multifactor Authentication using Graphical Password
One Time Password Generation for Multifactor Authentication using Graphical Password Nilesh B. Khankari 1, Prof. G.V. Kale 2 1,2 Department of Computer Engineering, Pune Institute of Computer Technology,
Development of Attendance Management System using Biometrics.
Development of Attendance Management System using Biometrics. O. Shoewu, Ph.D. 1,2* and O.A. Idowu, B.Sc. 1 1 Department of Electronic and Computer Engineering, Lagos State University, Epe Campus, Nigeria.
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
MULTIMODAL BIOMETRICS IN IDENTITY MANAGEMENT
International Journal of Information Technology and Knowledge Management January-June 2012, Volume 5, No. 1, pp. 111-115 MULTIMODAL BIOMETRICS IN IDENTITY MANAGEMENT A. Jaya Lakshmi 1, I. Ramesh Babu 2,
Authentication. Computer Security. Authentication of People. High Quality Key. process of reliably verifying identity verification techniques
Computer Security process of reliably verifying identity verification techniques what you know (eg., passwords, crypto key) what you have (eg., keycards, embedded crypto) what you are (eg., biometric information)
An Enhanced Countermeasure Technique for Deceptive Phishing Attack
An Enhanced Countermeasure Technique for Deceptive Phishing Attack K. Selvan 1, Dr. M. Vanitha 2 Research Scholar and Assistant Professor, Department of Computer Science, JJ College of Arts and Science
FACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
Vulnerabilities of Biometric Authentication Threats and Countermeasures
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 10 (2014), pp. 947-958 International Research Publications House http://www. irphouse.com Vulnerabilities
Biometrics in Secure e-transaction
Biometrics in Secure e-transaction Ms. Swati S Bobde 1, Prof. D. N. Satange 2 1 Post Graduate Student, Dept of Computer Science, Arts, Commerce & Science College, Amravati 2 Asstt. Professor, Dept of Computer
Smart Cards and Biometrics in Privacy-Sensitive Secure Personal Identification Systems
Smart Cards and Biometrics in Privacy-Sensitive Secure Personal Identification Systems A Smart Card Alliance White Paper May 2002 Smart Card Alliance 191 Clarksville Road Princeton Junction, NJ 08550 www.smartcardalliance.org
INTEGRATION OF MULTIPLE CUES IN BIOMETRIC SYSTEMS
INTEGRATION OF MULTIPLE CUES IN BIOMETRIC SYSTEMS By Karthik Nandakumar A THESIS Submitted to Michigan State University in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE Department
A Generic Framework to Enhance Two- Factor Authentication in Cryptographic Smart-card Applications
A Generic Framework to Enhance Two- Factor Authentication in Cryptographic Smart-card Applications G.Prakash #1, M.Kannan *2 # Research Scholar, Information and Communication Engineering, Anna University
Security Model in E-government with Biometric based on PKI
Security Model in E-government with Biometric based on PKI Jaafar.TH. Jaafar Institute of Statistical Studies and Research Department of Computer and Information Sciences Cairo, Egypt Nermin Hamza Institute
Authentication protocol for fingerprint feature extraction and IBC in monitoring systems
Authentication protocol for fingerprint feature extraction and IBC in monitoring systems Changgeng Yu; Liping Lai School of Mechanical and Electronic Engineering, Hezhou University, No.8, xihuan Road,
De-duplication The Complexity in the Unique ID context
De-duplication The Complexity in the Unique ID context 1. Introduction Citizens in India depend on the Government for various services at various stages of the human lifecycle. These services include issuance
Capture Resilient ElGamal Signature Protocols
Capture Resilient ElGamal Signature Protocols Hüseyin Acan 1, Kamer Kaya 2,, and Ali Aydın Selçuk 2 1 Bilkent University, Department of Mathematics [email protected] 2 Bilkent University, Department
White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services. Table of Contents. 1. Two Factor and CJIS
White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services Over the past decade, the demands on government agencies to share information across the federal, state and local levels
A Various Biometric application for authentication and identification
A Various Biometric application for authentication and identification 1 Karuna Soni, 2 Umesh Kumar, 3 Priya Dosodia, Government Mahila Engineering College, Ajmer, India Abstract: In today s environment,
Assignment 1 Biometric authentication
Assignment 1 Biometric authentication Internet Security and Privacy Alexandre Fustier Vincent Burger INTRODUCTION:...3 I. TYPES AND DESCRIPTION OF BIOMETRICS...4 1. PHYSIOLOGICAL BIOMETRIC...4 a. Fingerprints...4
Advanced Authentication
White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is
A Novel Cryptographic Key Generation Method Using Image Features
Research Journal of Information Technology 4(2): 88-92, 2012 ISSN: 2041-3114 Maxwell Scientific Organization, 2012 Submitted: April 18, 2012 Accepted: May 23, 2012 Published: June 30, 2012 A Novel Cryptographic
An Algorithm for Electronic Money Transaction Security (Three Layer Security): A New Approach
, pp.203-214 http://dx.doi.org/10.14257/ijsia.2015.9.2.19 An Algorithm for Electronic Money Transaction Security (Three Layer Security): A New Approach Md. Syeful Islam Samsung Research Institute Bangladesh
ENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries
Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application
Smart Card in Biometric Authentication
Smart Card in Biometric Authentication Željka Požgaj, Ph.D. Faculty of Economics and Business 10000 Zagreb, Trg. J.F. Kennedy-a 6 E-mail: [email protected] Ivor Đurinek, Bs.C. 10090 Zagreb, Dvoriček 1 E-mail:
MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS Kanchupati Kondaiah 1, B.Sudhakar 2 1 M.Tech Student, Dept of CSE,
Design of Micro-payment to Strengthen Security by 2 Factor Authentication with Mobile & Wearable Devices
, pp.28-32 http://dx.doi.org/10.14257/astl.2015.109.07 Design of Micro-payment to Strengthen Security by 2 Factor Authentication with Mobile & Wearable Devices Byung-Rae Cha 1, Sang-Hun Lee 2, Soo-Bong
Fundamentals of Biometric System Design. Chapter 1 Introduction
Fundamentals of Biometric System Design by S. N. Yanushkevich Chapter 1 Introduction Biometric sensor Biometric sensor Computer platform Biometric sensor Biometric sensor Verification: Am I whom I claim
Keywords image processing, signature verification, false acceptance rate, false rejection rate, forgeries, feature vectors, support vector machines.
International Journal of Computer Application and Engineering Technology Volume 3-Issue2, Apr 2014.Pp. 188-192 www.ijcaet.net OFFLINE SIGNATURE VERIFICATION SYSTEM -A REVIEW Pooja Department of Computer
Biometrics for Global Web Authentication: an Open Source Java/J2EE-Based Approach
Biometrics for Global Web Authentication: an Open Source Java/J2EE-Based Approach Ruchir Choudhry [email protected]; Abstract. J2EE based Web applications have largely spread over our multiple
Support Vector Machines for Dynamic Biometric Handwriting Classification
Support Vector Machines for Dynamic Biometric Handwriting Classification Tobias Scheidat, Marcus Leich, Mark Alexander, and Claus Vielhauer Abstract Biometric user authentication is a recent topic in the
Voice Authentication for ATM Security
Voice Authentication for ATM Security Rahul R. Sharma Department of Computer Engineering Fr. CRIT, Vashi Navi Mumbai, India [email protected] Abstract: Voice authentication system captures the
Physical Security: A Biometric Approach Preeti, Rajni M.Tech (Network Security),BPSMV [email protected], [email protected]
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3864-3868 Abstract: Physical Security: A Approach Preeti, Rajni M.Tech (Network
Journal of Electronic Banking Systems
Journal of Electronic Banking Systems Vol. 2015 (2015), Article ID 614386, 44 minipages. DOI:10.5171/2015.614386 www.ibimapublishing.com Copyright 2015. Khaled Ahmed Nagaty. Distributed under Creative
Authentication Types. Password-based Authentication. Off-Line Password Guessing
Authentication Types Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4:
Enhanced Cloud Security through KFAC
Enhanced Cloud Security through KFAC Mahesh S Darak, Dr. N. K. Deshmukh Assistant Professor, School of Computational Sciences, S. R. T. M. University, Nanded, Maharashtra, India ABSTRACT: The current era
WHITE PAPER. Let s do BI (Biometric Identification)
WHITE PAPER Let s do BI (Biometric Identification) Fingerprint authentication makes life easier by doing away with PINs, passwords and hint questions and answers. Since each fingerprint is unique to an
Information Security
Information Security Dr. Vedat Coşkun Malardalen September 15th, 2009 08:00 10:00 [email protected] www.isikun.edu.tr/~vedatcoskun What needs to be secured? With the rapid advances in networked
ATM Transaction Security Using Fingerprint/OTP
ATM Transaction Security Using Fingerprint/OTP 1 Krishna Nand Pandey, 2 Md. Masoom, 3 Supriya Kumari, 4 Preeti Dhiman 1,2,3,4 Electronics & Instrumentation Engineering, Galgotias College of Engineering
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER Mrs. P.Venkateswari Assistant Professor / CSE Erode Sengunthar Engineering College, Thudupathi ABSTRACT Nowadays Communication
ADVANCE AUTHENTICATION TECHNIQUES
ADVANCE AUTHENTICATION TECHNIQUES Introduction 1. Computer systems and the information they store and process are valuable resources which need to be protected. With the current trend toward networking,
ISO 24745 - Biometric Template Protection
ISO 24745 - Biometric Template Protection Hochschule Darmstadt / Gjøvik University College / Fraunhofer IGD IBPC 2010 -Satellite Workshop II NIST March 5, 2010 PET for the Protection of Biometric data
Security Issues in Smart Infrastructures for MMBS of Wireless Images for ATM banking
Security Issues in Smart Infrastructures for MMBS of Wireless s for ATM banking S.Koteswari #1, Dr.P.John Paul *2,S.Indrani ~3 # 1 Associate. Professor, Dept of ECE, D.N.R Engineering College, Bhimavaram,W.G.Dist,
Very large scale systems
Very large scale systems - Challenges, needs and methods Ravindra Gadde Research Engineer Iris ID Systems, Inc. 1 Large scale biometric systems and philosophy 1 Million? 10 Million? 100 Million? Large
Securing MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 [email protected] 2
BIOMETRIC AUTHENTICATION SECURITY AND USABILITY
BIOMETRIC AUTHENTICATION SECURITY AND USABILITY Václav Matyáš and Zdeněk Říha Faculty of Informatics, Masaryk University Brno, Czech Republic {matyas, zriha} @fi.muni.cz Abstract We would like to outline
Fingerprint-based crypto-biometric system for network security
Barman et al. EURASIP Journal on Information Security (2015) 2015:3 DOI 10.1186/s13635-015-0020-1 RESEARCH Open Access Fingerprint-based crypto-biometric system for network security Subhas Barman 1, Debasis
AN INTRODUCTION TO MULTIBIOMETRICS
AN INTRODUCTION TO MULTIBIOMETRICS Arun Ross West Virginia University, Morgantown, WV 26506 USA [email protected], http://www.csee.wvu.edu/ ross ABSTRACT Information fusion refers to the reconciliation
Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER
with Convenience and Personal Privacy version 0.2 Aug.18, 2007 WHITE PAPER CONTENT Introduction... 3 Identity verification and multi-factor authentication..... 4 Market adoption... 4 Making biometrics
