Volume 5, Issue 1 (January 2018), Pages: 66-72
----------------------------------------------
Original Research Paper
Title: Biometric covert acquisition protection by enhancing sweat glands and cryptography
Author(s): Noor-Ul-Qamar *, Kamran Mustafa
Affiliation(s):
Computer Science Department, Lahore Garrison University, Lahore, Pakistan
https://doi.org/10.21833/ijaas.2018.01.009
Full Text - PDF XML
Abstract:
Various biometric technologies were developed and effectively used around the world which includes fingerprints, face, iris, palm-print, speech and signatures. Fingerprints are most preferred mainly due to low cost of algorithms and sensors. Spoof attacks and template leakage are the major vulnerabilities to biometric authentication system. A biometric authentication plan with template protection is an opposition to almost all types of adversaries. If someone's biometric template which is stored in the database of the system is compromised, it might result in identification theft of that person. In this paper template protection scheme with security approaches and effective preventions regarding spoof attacks are proposed having possible secure authentication through detection of sweat glands and application of cryptography techniques.
© 2017 The Authors. Published by IASE.
This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
Keywords: Covert, Spoof attacks, Rejection of service, Biometric cryptosystems, Template protection scheme
Article History: Received 25 July 2017, Received in revised form 19 October 2017, Accepted 19 November 2017
Digital Object Identifier:
https://doi.org/10.21833/ijaas.2018.01.009
Citation:
Ul-Qamar N and Mustafa K (2018). Biometric covert acquisition protection by enhancing sweat glands and cryptography. International Journal of Advanced and Applied Sciences, 5(1): 66-72
Permanent Link:
http://www.science-gate.com/IJAAS/2018/V5I1/Noor.html
----------------------------------------------
References (10)
- Chuah CW, Deris MM, and Dawson E (2017). On the Security analysis of weak cryptographic primitive based key derivation function. In: Kim K and Joukov N (Eds.), Information Science and Applications 2017. ICISA 2017. Lecture Notes in Electrical Engineering, 424. Springer, Singapore. https://doi.org/10.1007/978-981-10-4154-9_27
- Coakley MJ, Monaco JV, and Tappert CC (2016). Keystroke biometric studies with short numeric input on smartphones. In the IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS), IEEE, Niagara Falls, NY, USA: 1-6. https://doi.org/10.1109/BTAS.2016.7791181
- De P, Ghoshal D, and Deb T (2016). Dual authentication of a human being from simultaneous study of palm pattern and iris recognition. Indian Journal of Science and Technology, 9(35): 1-6. https://doi.org/10.17485/ijst/2016/v9i35/95759
- Nagar A, Nandakumar K, and Jain AK (2010). Biometric template transformation: a security analysis. In the SPIE Media Forensics and Security, Electronic Imaging, San Jose, USA. https://doi.org/10.1117/12.839976
- Rani S and Kaur H (2017). Technical review on symmetric and asymmetric cryptography algorithms. International Journal, 8(4): 182-186.
- Robinson TL, Schildt BR, Goff TV, and Corwin DJ (2017). System and method for enrolling in a biometric system (U.S. Patent No. 9,544,309). U.S. Patent and Trademark Office, Washington, D.C., USA.
- Scherhag U, Raghavendra R, Raja KB, Gomez-Barrero M, Rathgeb C, and Busch C (2017). On the vulnerability of face recognition systems towards morphed face attacks. In the 5th International Workshop on Biometrics and Forensics (IWBF), IEEE, Coventry, UK: 1-6. https://doi.org/10.1109/IWBF.2017.7935088
- Selwal A and Gupta SK (2017). Low overhead octet indexed template security scheme for multi-modal biometric system. Journal of Intelligent and Fuzzy Systems, (Preprint), 32(5): 3325-3337. https://doi.org/10.3233/JIFS-169274
- Sharma S and Rajawat AS (2016). A review on possible attack in privacy model and modification technique. Imperial Journal of Interdisciplinary Research, 2(12): 1972-1975.
- Zhou Y, Zhao B, Han J, and Zheng J (2016). An effective scheme for biometric cryptosystems. In 2nd IEEE International Conference on Computer and Communications (ICCC), IEEE, Chengdu, China: 241-244. https://doi.org/10.1109/CompComm.2016.7924701
|