Combining Steganography and Biometric Cryptosystems for Secure Mutual Authentication and Key Exchange

被引:0
|
作者
Al-Assam, Hisham [1 ]
Rashid, Rasber [1 ]
Jassim, Sabah [1 ]
机构
[1] Univ Buckingham, Dept Appl Comp, Buckingham, England
关键词
component; mutual authentication; biometrics; steganography key agreement; challenge-response; multi-factor authentication;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Although biometric authentication is perceived to be more reliable than traditional authentication schemes, it becomes vulnerable to several attacks when it comes to remote authentication over open networks. Steganography based techniques have been used in the context of remote authentication to hide biometric feature vectors. Biometric cryptosystems, on the other hand, are proposed to enhance the security of biometric systems and to create revocable representations of individuals. However, neither steganography nor biometric cryptosystems are immune against replay attack and other remote attacks. This paper proposes a novel approach that combines steganography with biometric cryptosystems effectively to establish robust remote mutual authentication between two parties as well as key exchange that facilitates one-time stego-keys. The proposal involves the use of random orthonormal projection and multi-factor biometric key binding techniques, and relies on a mutual challenge/response and one-time stego-keys to prevent replay attacks and provide non-repudiation feature. Implementation details and simulation results based on face biometric show the viability of our proposal. Furthermore, we argue that the proposed scheme enhances security while it can be both user-friendly and cost-effective.
引用
收藏
页码:369 / 374
页数:6
相关论文
共 50 条
  • [1] Towards a Secure Mutual Authentication and Key Exchange Protocol for Mobile Communications
    He, Yijun
    Lee, Moon-Chuen
    [J]. 2008 6TH INTERNATIONAL SYMPOSIUM ON MODELING AND OPTIMIZATION IN MOBILE, AD HOC AND WIRELESS NETWORKS AND WORKSHOPS, VOLS 1 AND 2, 2008, : 216 - 222
  • [2] A secure key exchange and mutual authentication protocol for wireless mobile communications
    He Yijun
    Xu Nan
    Li Jie
    [J]. ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 558 - +
  • [3] Cracking Biometric Authentication Cryptosystems
    Lafkih, Maryam
    [J]. VISAPP: PROCEEDINGS OF THE 15TH INTERNATIONAL JOINT CONFERENCE ON COMPUTER VISION, IMAGING AND COMPUTER GRAPHICS THEORY AND APPLICATIONS, VOL 4: VISAPP, 2020, : 514 - 522
  • [4] A secure key authentication scheme for cryptosystems based on GDLP and IFP
    Meshram, Chandrashekhar
    Lee, Cheng-Chi
    Li, Chun-Ta
    Chen, Chin-Ling
    [J]. SOFT COMPUTING, 2017, 21 (24) : 7285 - 7291
  • [5] A secure key authentication scheme for cryptosystems based on GDLP and IFP
    Chandrashekhar Meshram
    Cheng-Chi Lee
    Chun-Ta Li
    Chin-Ling Chen
    [J]. Soft Computing, 2017, 21 : 7285 - 7291
  • [6] Enhanced Security Mechanism In Public Key Cryptosystems Using Biometric Person Authentication
    Laser, Jitendra Singh
    Jain, Vinay
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTATION OF POWER, ENERGY INFORMATION AND COMMUNICATION (ICCPEIC), 2016, : 170 - +
  • [7] Password based key exchange with mutual authentication
    Jiang, SQ
    Gong, G
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, 2005, 3357 : 267 - 279
  • [8] Secure Methods for Fuzzy Key Binding in Biometric Authentication Applications
    Bui, Francis Minhthang
    Hatzinakos, Dimitrios
    [J]. 2008 42ND ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS, VOLS 1-4, 2008, : 1363 - 1367
  • [9] Integrating Biometric Cryptosystem with Steganography for Authentication
    Peethala, Manjari Benhar
    Kulkarni, Sujata
    [J]. 2016 IEEE INTERNATIONAL WIE CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (IEEE WIECON-ECE 2016), 2016, : 28 - 31
  • [10] A Secure Mutual Authentication Protocol for Cloud Computing using Secret Sharing and Steganography
    Sarvabhatla, Mrudula
    Giri, M.
    Vorugunti, Chandra Sekhar
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING IN EMERGING MARKETS (CCEM), 2014, : 9 - 16