Biometric authentication for border control applications

被引:10
|
作者
Kwon, Taekyoung [1 ]
Moon, Hyeonjoon [1 ]
机构
[1] Sejong Univ, Dept Comp Engn, Seoul 143747, South Korea
关键词
security informatics; homeland security; biometrics; public-key infrastructure; border control application;
D O I
10.1109/TKDE.2007.190716
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We propose an authentication methodology that combines multimodal biometrics and cryptographic mechanisms for border control applications. We accommodate faces and fingerprints without a mandatory requirement of (tamper-resistant) smart-card-level devices on e-passports for easier deployment. It is even allowable to imprint (publicly readable) bar codes on the passports. Additionally, we present a solution based on the certification and key management method to control the validity of passports within the current Public-Key Infrastructure (PKI) technology paradigm.
引用
收藏
页码:1091 / 1096
页数:6
相关论文
共 50 条
  • [21] Efficient Generalized Selective Private Function Evaluation with Applications in Biometric Authentication
    Lipmaa, Helger
    Zhang, Bingsheng
    INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 154 - 163
  • [22] Automated Border Control Systems: Biometric Challenges and Research Trends
    Labati, Ruggero Donida
    Genovese, Angelo
    Munoz, Enrique
    Piuri, Vincenzo
    Scotti, Fabio
    Sforza, Gianluca
    INFORMATION SYSTEMS SECURITY, (ICISS 2015), 2015, 9478 : 11 - 20
  • [23] Approximate message authentication and biometric entity authentication
    Di Crescenzo, G
    Graveman, R
    Ge, R
    Arce, G
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2005, 3570 : 240 - 254
  • [24] Biometric Authentication: A Trustworthy Technology for Improved Authentication
    Stanley, P.
    Jeberson, Wilson
    Klinsega, V. V.
    INTERNATIONAL CONFERENCE ON FUTURE NETWORKS, PROCEEDINGS, 2009, : 171 - 175
  • [25] BioShare: An Open Framework for Trusted Biometric Authentication under User Control
    Sun, Quan
    Wu, Jie
    Yu, Wenhai
    APPLIED SCIENCES-BASEL, 2022, 12 (21):
  • [26] Biometric person authentication for access control scenario based on face recognition
    Moon, Hyeonjoon
    Kwon, Taekyoung
    UNIVERSAL ACCESS IN HUMAN COMPUTER INTERACTION: COPING WITH DIVERSITY, PT 1, 2007, 4554 : 463 - +
  • [27] Multimodal cancelable biometric authentication system based on EEG signal for IoT applications
    Salama, Gerges M.
    El-Gazar, Safaa
    Omar, Basma
    Hassan, A. A.
    JOURNAL OF OPTICS-INDIA, 2023, 53 (3): : 1839 - 1853
  • [28] A Multifactor Biometric Authentication for the Cloud
    Ziyad, Shabana
    Kannammal, A.
    COMPUTATIONAL INTELLIGENCE, CYBER SECURITY AND COMPUTATIONAL MODELS, 2014, 246 : 395 - 403
  • [29] Keystroke dynamics as a biometric for authentication
    Monrose, F
    Rubin, AD
    FUTURE GENERATION COMPUTER SYSTEMS, 2000, 16 (04) : 351 - 359
  • [30] Anonymous and robust biometric authentication scheme for secure social IoT healthcare applications
    Arpitha T.
    Chouhan D.
    Shreyas J.
    Journal of Engineering and Applied Science, 2024, 71 (01):