Combining Steganography and Biometric Cryptosystems for Secure Mutual Authentication and Key Exchange

被引:0
|
作者
Al-Assam, Hisham [1 ]
Rashid, Rasber [1 ]
Jassim, Sabah [1 ]
机构
[1] Univ Buckingham, Dept Appl Comp, Buckingham, England
关键词
component; mutual authentication; biometrics; steganography key agreement; challenge-response; multi-factor authentication;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Although biometric authentication is perceived to be more reliable than traditional authentication schemes, it becomes vulnerable to several attacks when it comes to remote authentication over open networks. Steganography based techniques have been used in the context of remote authentication to hide biometric feature vectors. Biometric cryptosystems, on the other hand, are proposed to enhance the security of biometric systems and to create revocable representations of individuals. However, neither steganography nor biometric cryptosystems are immune against replay attack and other remote attacks. This paper proposes a novel approach that combines steganography with biometric cryptosystems effectively to establish robust remote mutual authentication between two parties as well as key exchange that facilitates one-time stego-keys. The proposal involves the use of random orthonormal projection and multi-factor biometric key binding techniques, and relies on a mutual challenge/response and one-time stego-keys to prevent replay attacks and provide non-repudiation feature. Implementation details and simulation results based on face biometric show the viability of our proposal. Furthermore, we argue that the proposed scheme enhances security while it can be both user-friendly and cost-effective.
引用
收藏
页码:369 / 374
页数:6
相关论文
共 50 条
  • [21] Secure biometric authentication with improved accuracy
    Barbosa, Manuel
    Brouard, Thierry
    Cauchie, Stephane
    de Sousa, Simao Melo
    [J]. INFORMATION SECURITY AND PRIVACY, 2008, 5107 : 21 - +
  • [22] A secure biometric authentication based on PEKS
    Zhang, Yue
    Qin, Jing
    Du, Lihua
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (04): : 1111 - 1123
  • [23] FULL SECURE KEY EXCHANGE AND AUTHENTICATION WITH NO PREVIOUSLY SHARED SECRETS
    FERRER, JDI
    ROTGER, LHI
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1990, 434 : 665 - 670
  • [24] Image based Authentication with Secure Key Exchange Mechanism in Cloud
    Tomar, Anurag Singh
    Tak, Gaurav Kumar
    Chaudhary, Ruchi
    [J]. 2014 INTERNATIONAL CONFERENCE ON MEDICAL IMAGING, M-HEALTH & EMERGING COMMUNICATION SYSTEMS (MEDCOM), 2015, : 428 - 431
  • [25] BioSAKE: Biometrics-based Secure Authentication and Key Exchange
    Nandakumar, Karthik
    [J]. 2013 INTERNATIONAL CONFERENCE ON BIOMETRICS (ICB), 2013,
  • [26] Improved Biometric-Based Mutual Authentication and Key Agreement Scheme Using ECC
    Sahoo, Shreeya Swagatika
    Mohanty, Sujata
    Majhi, Banshidhar
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2020, 111 (02) : 991 - 1017
  • [27] Improved Biometric-Based Mutual Authentication and Key Agreement Scheme Using ECC
    Shreeya Swagatika Sahoo
    Sujata Mohanty
    Banshidhar Majhi
    [J]. Wireless Personal Communications, 2020, 111 : 991 - 1017
  • [28] A Provably Secure and Practical PUF-Based End-to-End Mutual Authentication and Key Exchange Protocol for IoT
    Li, Sensen
    Zhang, Tikui
    Yu, Bin
    He, Kuan
    [J]. IEEE SENSORS JOURNAL, 2021, 21 (04) : 5487 - 5501
  • [29] Provably Secure Nested One-Time Secret Mechanisms for Fast Mutual Authentication and Key Exchange in Mobile Communications
    Fan, Chun-I
    Ho, Pei-Hsiu
    Hsu, Ruei-Hau
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2010, 18 (03) : 996 - 1009
  • [30] Improved and Innovative Key Generation Algorithms for Biometric Cryptosystems
    Ranjan, R.
    Singh, Sanjay Kumar
    [J]. PROCEEDINGS OF THE 2013 3RD IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2013, : 943 - 946