Spectroscopically enhanced method and system for multi-factor biometric authentication

被引:3
|
作者
Pishva, Davar [1 ]
机构
[1] Ritsumeikan Asia Pacific Univ, Inst Info & Comm Tech, Beppu, Oita 8748577, Japan
关键词
aliveness detection; security; authentication; multi-factor authentication; biometrics; spectral biometrics;
D O I
10.1093/ietisy/e91-d.5.1369
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a spectroscopic method and system for preventing spoofing of biometric authentication. One of its focus is to enhance biometrics authentication with a spectroscopic method in a multi-factor manner such that a person's unique 'spectral signatures' or 'spectral factors' are recorded and compared in addition to a non-spectroscopic biometric signature to reduce the likelihood of imposter getting authenticated. By using the 'spectral factors' extracted from reflectance spectra of real fingers and employing cluster analysis, it shows how the authentic fingerprint image presented by a real finger can be distinguished from an authentic fingerprint image embossed on an artificial finger, or molded on a fingertip cover worn by an imposter. This paper also shows how to augment two widely used biometrics systems (fingerprint and iris recognition devices) with spectral biometrics capabilities in a practical manner and without creating much overhead or inconveniencing their users.
引用
收藏
页码:1369 / 1379
页数:11
相关论文
共 50 条
  • [21] CCTV-Based Multi-Factor Authentication System
    Kwon, Byoung-Wook
    Sharma, Pradip Kumar
    Park, Jong-Hyuk
    [J]. JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2019, 15 (04): : 904 - 919
  • [22] A PATTERN-BASED MULTI-FACTOR AUTHENTICATION SYSTEM
    Pankhuri
    Sinha, Akash
    Shrivastava, Gulshan
    Kumar, Prabhat
    [J]. SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2019, 20 (01): : 101 - 112
  • [23] Multi-Factor Authentication on Cloud
    Khan, Salman H.
    Akbar, M. Ali
    [J]. 2015 INTERNATIONAL CONFERENCE ON DIGITAL IMAGE COMPUTING: TECHNIQUES AND APPLICATIONS (DICTA), 2015, : 548 - 554
  • [24] Mobile Multi-Factor Authentication
    Bissada, Andrew
    Olmsted, Aspen
    [J]. 2017 12TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2017, : 210 - 211
  • [25] Bypassing Multi-Factor Authentication
    Russell S.
    [J]. ITNOW, 2023, 65 (01) : 42 - 45
  • [26] Multi-Factor Authentication Modeling
    Dostalek, Libor
    [J]. 2019 9TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER INFORMATION TECHNOLOGIES (ACIT'2019), 2019, : 443 - 446
  • [27] Security analysis and improvement of a multi-factor biometric-based remote authentication scheme
    Boonkrong, Sirapat
    [J]. IAENG International Journal of Computer Science, 2019, 46 (04): : 1 - 12
  • [28] A Score Fusion Method by Neural Network in Multi-Factor Authentication
    Matsuoka, Katsuya
    Irvan, Mhd
    Kobayashi, Ryosuke
    Yamaguchi, Rie Shigetomi
    [J]. PROCEEDINGS OF THE TENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, CODASPY 2020, 2020, : 147 - 149
  • [29] Enhanced secure data backup scheme using multi-factor authentication
    Hu, Huidan
    Lin, Changlu
    Chang, Chin-Chen
    Chen, Lanxiang
    [J]. IET INFORMATION SECURITY, 2019, 13 (06) : 649 - 658
  • [30] Multi-Factor Security Enhanced Authentication Protocol for Wireless Sensor Networks
    Zhang L.
    Liang H.
    Deng D.
    Liu Y.
    Tang C.
    Chang Z.
    Gui S.
    [J]. Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2023, 52 (05): : 699 - 708