An Improved Authentication System Using Hybrid of Biometrics and Cryptography

被引:0
|
作者
Oluwadamilola, Oyetola K. [1 ]
Ayodeji, Okubanjo A. [1 ]
Martins, Osifeko O. [1 ]
Olufunmi, Sanusi, I [1 ]
Rapheal, Abolade O. [1 ]
机构
[1] Olabisi Onabanjo Univ, Dept Comp & Elect Engn, Ago Iwoye, Nigeria
关键词
Authentication; Biometric; Biometric templates; Cryptography; Data Security;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Data security is indispensable in our society, as human activities are increasingly becoming computerized and are transferred through complex communication networks across the globe. Existing methods used in securing data include cryptography and biometrics. However, the main shortcoming of cryptography is poorly-chosen or forgotten password while challenges with biometrics include interclass similarities in the feature sets used to represent trait and storing of biometric templates in clear unprotected format. This paper presents combination of cryptography and biometrics; a bimodal biometric Cryptosystem, using fingerprint and face as trait for authentication. Subjects' information were encrypted using Advanced Encryption Standard (AES) and biometric templates were stored as Binary Large Object (BLOB) in MYSQL database secured with Message Digest 5 (MD 5) Hashing Algorithm. The system was developed and implemented to operate on one-try, two-try and three-try configurations at varying threshold values. The developed system's performance was evaluated using False Reject Rate (FRR), False Accept Rate (FAR) and Receiver Operating Characteristic Curve (ROC graph) as performance metrics. On ROC graph, three-try configuration gave optimal performance at all threshold values.
引用
收藏
页码:457 / 463
页数:7
相关论文
共 50 条
  • [1] Smartphone Authentication System Using Periocular Biometrics
    Raja, Kiran B.
    Raghavendra, R.
    Stokkenes, Martin
    Busch, Christoph
    [J]. 2014 INTERNATIONAL CONFERENCE OF THE BIOMETRICS SPECIAL INTEREST GROUP (BIOSIG), 2014,
  • [2] A Robust Authentication System Using Multiple Biometrics
    Monwar, Md. Maruf
    Gavrilova, Marina
    [J]. COMPUTER AND INFORMATION SCIENCE, 2008, 131 : 189 - 201
  • [3] Authentication using cryptography
    Mitchell, Chris
    [J]. Information Security Technical Report, 1997, 2 (02): : 25 - 32
  • [4] Cryptography Key Generation using Biometrics
    Singhvi, R. Sashank
    Venkatachalam, S. P.
    Kannan, P. Muthu
    Palanisamy, V.
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION, COMMUNICATION AND ENERGY CONSERVATION INCACEC 2009 VOL 1, 2009, : 312 - 317
  • [5] Preventing Identity Theft Using Biometrics Based Authentication System
    Zahrouni, Lamjed
    Blackwood, Dayton
    Rizvi, Syed
    Gualdoni, Joseph
    Almiani, Muder
    [J]. 2017 IEEE JORDAN CONFERENCE ON APPLIED ELECTRICAL ENGINEERING AND COMPUTING TECHNOLOGIES (AEECT), 2017,
  • [6] A biometrics-based mutual authentication and key agreement protocol for TMIS using elliptic curve cryptography
    Chen, Yulei
    Chen, Jianhua
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (11) : 16009 - 16032
  • [7] An Improved Secure RFID Authentication Protocol Using Elliptic Curve Cryptography
    Liu, Wan-Rong
    Ji, Zhi-Yong
    Chu, Cheng-Chen
    [J]. International Journal of Network Security, 2024, 26 (01) : 106 - 115
  • [8] An Improved Remote User Authentication Scheme Using Elliptic Curve Cryptography
    Chaudhry S.A.
    Naqvi H.
    Mahmood K.
    Ahmad H.F.
    Khan M.K.
    [J]. Wireless Personal Communications, 2017, 96 (04) : 5355 - 5373
  • [9] An Elliptic Curve Cryptography-Based Multi-Server Authentication Scheme Using Cancelable Biometrics
    Barman, Subhas
    Chaudhuri, Abhisek
    Chatterjee, Atanu
    Raza, Md Ramiz
    [J]. INTELLIGENT COMPUTING AND COMMUNICATION, ICICC 2019, 2020, 1034 : 153 - 163
  • [10] A biometrics-based mutual authentication and key agreement protocol for TMIS using elliptic curve cryptography
    Yulei Chen
    Jianhua Chen
    [J]. Multimedia Tools and Applications, 2023, 82 : 16009 - 16032