Biometric authentication for border control applications

被引:10
|
作者
Kwon, Taekyoung [1 ]
Moon, Hyeonjoon [1 ]
机构
[1] Sejong Univ, Dept Comp Engn, Seoul 143747, South Korea
关键词
security informatics; homeland security; biometrics; public-key infrastructure; border control application;
D O I
10.1109/TKDE.2007.190716
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We propose an authentication methodology that combines multimodal biometrics and cryptographic mechanisms for border control applications. We accommodate faces and fingerprints without a mandatory requirement of (tamper-resistant) smart-card-level devices on e-passports for easier deployment. It is even allowable to imprint (publicly readable) bar codes on the passports. Additionally, we present a solution based on the certification and key management method to control the validity of passports within the current Public-Key Infrastructure (PKI) technology paradigm.
引用
收藏
页码:1091 / 1096
页数:6
相关论文
共 50 条
  • [31] An Efficient Multi-Modal Biometric Sensing and Authentication Framework for Distributed Applications
    Tarannum, Ayesha
    Rahman, Zia Ur
    Rao, L. Koteswara
    Srinivasulu, T.
    Lay-Ekuakille, Aime
    IEEE SENSORS JOURNAL, 2020, 20 (24) : 15014 - 15025
  • [32] A Video-Based Biometric Authentication for e-Learning Web Applications
    Penteado, Bruno Elias
    Marana, Aparecido Nilceu
    ENTERPRISE INFORMATION SYSTEMS-BK, 2009, 24 : 770 - 779
  • [33] Biometric authentication in infrastructure security
    Armington, J
    Ho, P
    Koznek, P
    Martinez, R
    INFRASTRUCTURE SECURITY, PROCEEDINGS, 2002, 2437 : 1 - 18
  • [34] Privacy-preserving Biometric Authentication Model for e-Finance Applications
    Toli, Christina-Angeliki
    Preneel, Bart
    ICISSP: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, : 353 - 360
  • [35] Biometric Authentication on Mobile Devices
    Mayron, Liam M.
    IEEE SECURITY & PRIVACY, 2015, 13 (03) : 70 - 73
  • [36] Cracking Biometric Authentication Cryptosystems
    Lafkih, Maryam
    VISAPP: PROCEEDINGS OF THE 15TH INTERNATIONAL JOINT CONFERENCE ON COMPUTER VISION, IMAGING AND COMPUTER GRAPHICS THEORY AND APPLICATIONS, VOL 4: VISAPP, 2020, : 514 - 522
  • [37] Biometric Liveness Authentication Detection
    Sundaran, Sreejit
    Antony, Joycy K.
    Vipin, K.
    2017 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION, EMBEDDED AND COMMUNICATION SYSTEMS (ICIIECS), 2017,
  • [38] Biometric authentication -: Security and usability
    Matyas, V
    Ríha, Z
    ADVANCED COMMUNICATIONS AND MULTIMEDIA SECURITY, 2002, 100 : 227 - 239
  • [39] AUTHENTICATION BY BIOMETRIC VERIFICATION INTRODUCTION
    Vetter, Ron
    COMPUTER, 2010, 43 (02) : 28 - 29
  • [40] Cognition for Enhanced Biometric Authentication
    Zivic, Natasa
    Ruland, Christoph
    2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 241 - 244