Two-factor face authentication using matrix permutation transformation and a user password

被引:26
|
作者
Kang, Jeonil [1 ]
Nyang, DaeHun [2 ]
Lee, KyungHee [3 ]
机构
[1] Inha Univ, Sch Informat & Commun Engn, Inchon 402751, South Korea
[2] Inha Univ, Sch Comp & Informat Engn, Inchon 402751, South Korea
[3] Univ Suwon, Dept Elect Engn, Suwon, South Korea
关键词
Face authentication; Biometrics security; User privacy; DISCRIMINANT-ANALYSIS; SECURITY EVALUATION; FUZZY VAULT; RECOGNITION; BIOMETRICS; PCA;
D O I
10.1016/j.ins.2014.02.011
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Although authentication using biometric techniques is convenient, security issues such as the loss of personal bio-information are serious problems. However, the development of a secure biometrics scheme poses considerable challenges because users' bio-information is not precisely the same for each authentication attempt. This uncertainty during the authentication process obstructs direct application of cryptographic one-way functions in the authentication system. In this paper, we suggest a two-factor face authentication scheme using matrix transformations and a user password. Our scheme is designed with a secure cancellation feature, in that templates composed of permutation and feature vectors can be freely changed. Through experimental scenarios and results, we introduce the notable features of our scheme. Furthermore, we consider possible attacks on the proposed scheme and suggest security enhancement methods. (C) 2014 Elsevier Inc. All rights reserved.
引用
收藏
页码:1 / 20
页数:20
相关论文
共 50 条
  • [1] Two-factor authentication scheme using attribute and password
    Wei, Jianghong
    Hu, Xuexian
    Liu, Wenfen
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (01)
  • [2] Construction of a secure two-factor user authentication system using fingerprint information and password
    Woong Go
    Kwangwoo Lee
    Jin Kwak
    [J]. Journal of Intelligent Manufacturing, 2014, 25 : 217 - 230
  • [3] Construction of a secure two-factor user authentication system using fingerprint information and password
    Go, Woong
    Lee, Kwangwoo
    Kwak, Jin
    [J]. JOURNAL OF INTELLIGENT MANUFACTURING, 2014, 25 (02) : 217 - 230
  • [4] Two-factor authentication schemes based smart card and password with user anonymity
    Cao, Tianjie
    Huang, Shi
    [J]. Journal of Computational Information Systems, 2013, 9 (21): : 8831 - 8838
  • [5] User Perceptions of Security and Usability of Mobile-Based Single Password Authentication and Two-Factor Authentication
    Isler, Devris
    Kupcu, Alptekin
    Coskun, Aykut
    [J]. DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY, 2019, 11737 : 99 - 117
  • [6] Efficient Two-Factor Authentication Protocol Using Password and Smart Card
    Liu, Fenghua
    [J]. JOURNAL OF COMPUTERS, 2013, 8 (12) : 3257 - 3263
  • [7] Research on Two-Factor Identity Authentication System Based on Smart Phone and User Password
    Hou, Lin
    Wei, Laiwen
    Wang, Chen
    Wang, Andi
    Xu, Jian
    [J]. CLOUD COMPUTING AND SECURITY, PT V, 2018, 11067 : 712 - 723
  • [8] Two-Factor Authentication Scheme Using One Time Password in Cloud Computing
    El-sherif, Samar H.
    Abdel-kader, Rabab F.
    Rizk, Rawya Y.
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCED INTELLIGENT SYSTEMS AND INFORMATICS 2018, 2019, 845 : 425 - 434
  • [9] Two-Factor Authentication with End-to-End Password Security
    Jarecki, Stanislaw
    Krawczyk, Hugo
    Shirvanian, Maliheh
    Saxena, Nitesh
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT II, 2018, 10770 : 431 - 461
  • [10] One-Time Password Generation and Two-Factor Authentication Using Molecules and Light
    Naren, Gaowa
    Li, Shiming
    Andreasson, Joakim
    [J]. CHEMPHYSCHEM, 2017, 18 (13) : 1726 - 1729