A robust embedded biometric authentication system based on fingerprint and chaotic encryption

被引:70
|
作者
Murillo-Escobar, M. A. [1 ]
Cruz-Hernandez, C. [2 ]
Abundiz-Perez, F. [1 ]
Lopez-Gutierrez, R. M. [1 ]
机构
[1] Univ Autonoma Baja California, Engn Architecture & Design Fac, Ensenada, BC, Mexico
[2] Sci Res & Adv Studies Ctr Ensenada CICESE, Elect & Telecommun Dept, Ensenada, BC, Mexico
关键词
Chaotic encryption; Embedded expert system; Fingerprint template protection; Microcontroller; Security; CRYPTANALYSIS; TRANSMISSION;
D O I
10.1016/j.eswa.2015.06.035
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Fingerprint recognition is a reliable solution in user authentication systems. Nevertheless, the security and secrecy of the users data are a concern in today's biometric systems and most of the security attention is focused in biometric template protection to avoid identity theft. In recent years, several approaches have been presented where the main objective is to have the biometric revocable, but almost all them have failed in verify their security and robustness. In last years, chaotic systems have been proposed in cryptography due they have several properties related with cryptography properties such as extreme sensibility on initial conditions with confusion and ergodicity with diffusion. In this paper, we present a novel fingerprint template protection scheme based on chaotic encryption by using the logistic map and Murillo-Escobar's algorithm (Murillo-Escobar et al., 2014). In addition, we present a novel implementation of our scheme in a 32 bit microcontroller for secure authentication systems to show its application on embedded expert systems. In contrast with recent approaches presented in literature, we present a complete security analysis in both statistical and implementation level, to justify the proposed scheme in a real application. Based in the results, the proposed embedded authentication system is secure, effective and at low cost, and it could be implemented on real secure access control systems. (C) 2015 Elsevier Ltd. All rights reserved.
引用
收藏
页码:8198 / 8211
页数:14
相关论文
共 50 条
  • [1] Chaotic Encryption for Fingerprint Authentication
    Aarthi, N. Ganitha
    Jeyaseelan, W. R. Salem
    Oviya, K.
    [J]. BIOSCIENCE BIOTECHNOLOGY RESEARCH COMMUNICATIONS, 2019, 12 (02): : 70 - 75
  • [2] THREE-FACTOR AUTHENTICATION SCHEME BASED ON SEARCHABLE ENCRYPTION AND BIOMETRIC FINGERPRINT
    Mihailescu, Marius Iulian
    Nita, Stefania Loredana
    [J]. 2020 13TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2020, : 139 - 144
  • [3] An Embedded Fingerprint Authentication System
    Shinde, Archana S.
    Bendre, Varsha
    [J]. 1ST INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION ICCUBEA 2015, 2015, : 205 - 208
  • [4] Can We Use Biometric Authentication on Cloud?: Fingerprint Authentication Using Homomorphic Encryption
    Kim, Taeyun
    Kim, Hyoungshick
    [J]. PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18), 2018, : 813 - 815
  • [5] Biometric Encryption using Fingerprint Fuzzy Vault for FPGA-based Embedded Systems
    Bakhteri, Rabia
    Hani, Mohamed Khalil
    [J]. TENCON 2009 - 2009 IEEE REGION 10 CONFERENCE, VOLS 1-4, 2009, : 1618 - 1622
  • [6] A Novel Fingerprint-Based Biometric Encryption
    Liang, Bin
    Wu, Zhendong
    LinYou
    [J]. 2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 146 - 150
  • [7] A linear convolution-based cancelable fingerprint biometric authentication system
    Yang, Wencheng
    Wang, Song
    Kang, James Jin
    Johnstone, Michael N.
    Bedari, Aseel
    [J]. COMPUTERS & SECURITY, 2022, 114
  • [8] A Prototype Biometric Security Authentication System Based upon Fingerprint Recognition
    Xiang, Wei
    Desai, Bhavin
    Wen, Paul
    Wang, Yafeng
    Peng, Tianshu
    [J]. ROUGH SETS AND KNOWLEDGE TECHNOLOGY, PROCEEDINGS, 2009, 5589 : 264 - +
  • [9] Robust Multimodal Biometric Verification System based on Face and Fingerprint
    Gowda, Supreetha H. D.
    Kumar, Hemantha G.
    Imran, Mohammad
    [J]. 2017 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2017, : 243 - 247
  • [10] Biometric Authentication using Steganography via Chaotic Encryption and Data Hiding
    Bharathi, M. K.
    Nagarajan, E.
    [J]. RESEARCH JOURNAL OF PHARMACEUTICAL BIOLOGICAL AND CHEMICAL SCIENCES, 2016, 7 (04): : 277 - 283