Combining Steganography and Biometric Cryptosystems for Secure Mutual Authentication and Key Exchange

被引:0
|
作者
Al-Assam, Hisham [1 ]
Rashid, Rasber [1 ]
Jassim, Sabah [1 ]
机构
[1] Univ Buckingham, Dept Appl Comp, Buckingham, England
关键词
component; mutual authentication; biometrics; steganography key agreement; challenge-response; multi-factor authentication;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Although biometric authentication is perceived to be more reliable than traditional authentication schemes, it becomes vulnerable to several attacks when it comes to remote authentication over open networks. Steganography based techniques have been used in the context of remote authentication to hide biometric feature vectors. Biometric cryptosystems, on the other hand, are proposed to enhance the security of biometric systems and to create revocable representations of individuals. However, neither steganography nor biometric cryptosystems are immune against replay attack and other remote attacks. This paper proposes a novel approach that combines steganography with biometric cryptosystems effectively to establish robust remote mutual authentication between two parties as well as key exchange that facilitates one-time stego-keys. The proposal involves the use of random orthonormal projection and multi-factor biometric key binding techniques, and relies on a mutual challenge/response and one-time stego-keys to prevent replay attacks and provide non-repudiation feature. Implementation details and simulation results based on face biometric show the viability of our proposal. Furthermore, we argue that the proposed scheme enhances security while it can be both user-friendly and cost-effective.
引用
收藏
页码:369 / 374
页数:6
相关论文
共 50 条
  • [31] Combining biometric evidence for person authentication
    Bigun, J
    Fierrez-Aguilar, J
    Ortega-Garcia, J
    Gonzalez-Rodriguez, J
    [J]. ADVANCED STUDIES IN BIOMETRICS, 2005, 3161 : 1 - 18
  • [32] Enhancing Cybersecurity for LDACS: a Secure and Lightweight Mutual Authentication and Key Agreement Protocol
    Khan, Suleman
    Gaba, Gurjot Singh
    Gurtov, Andrei
    Maeurer, Nils
    Graeupl, Thomas
    Schmitt, Corinna
    [J]. 2023 IEEE/AIAA 42ND DIGITAL AVIONICS SYSTEMS CONFERENCE, DASC, 2023,
  • [33] Provably secure biometric based authentication and key agreement protocol for wireless sensor networks
    Srinivas, Jangirala
    Mishra, Dheerendra
    Mukhopadhyay, Sourav
    Kumari, Saru
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (04) : 875 - 895
  • [34] Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment
    Karuppiah, Marimuthu
    Das, Ashok Kumar
    Li, Xiong
    Kumari, Saru
    Wu, Fan
    Chaudhry, Shehzad Ashraf
    Niranchana, R.
    [J]. MOBILE NETWORKS & APPLICATIONS, 2019, 24 (03): : 1046 - 1062
  • [35] Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment
    Marimuthu Karuppiah
    Ashok Kumar Das
    Xiong Li
    Saru Kumari
    Fan Wu
    Shehzad Ashraf Chaudhry
    R. Niranchana
    [J]. Mobile Networks and Applications, 2019, 24 : 1046 - 1062
  • [36] Two-factor (Biometric and password) authentication key exchange on lattice based on key consensus
    Zongqu, Zhao
    Shaoti, Ma
    Yongjun, Wang
    Yongli, Tang
    Qing, Ye
    [J]. Journal of China Universities of Posts and Telecommunications, 2020, 27 (06): : 42 - 53
  • [37] Two-factor (biometric and password) authentication key exchange on lattice based on key consensus
    Zhao Zongqu
    Ma Shaoti
    Wang Yongjun
    Tang Yongli
    Ye Qing
    [J]. The Journal of China Universities of Posts and Telecommunications, 2020, 27 (06) : 42 - 53
  • [38] A probably secure biometric-based authentication and key agreement scheme for Internet of Drones
    Gautam, Deepika
    Rana, Aryan
    Obaidat, Mohammad S.
    Kumar, Pankaj
    Prajapat, Sunil
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2024, 35 (01):
  • [39] Provably secure biometric based authentication and key agreement protocol for wireless sensor networks
    Jangirala Srinivas
    Dheerendra Mishra
    Sourav Mukhopadhyay
    Saru Kumari
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2018, 9 : 875 - 895
  • [40] A hardware-implemented truly random key generator for secure biometric authentication systems
    Erat, Murat
    Danisman, Kenan
    Ergun, Salih
    Kanak, Alper
    [J]. MULTIMEDIA CONTENT REPRESENTATION, CLASSIFICATION AND SECURITY, 2006, 4105 : 128 - 135