Biometric Hash Algorithm for Dynamic Handwriting Embedded on a Java']Java Card

被引:0
|
作者
Kuemmel, Karl [1 ]
Vielhauer, Claus [1 ]
机构
[1] Brandenburg Univ Appl Sci, D-14737 Brandenburg, Germany
来源
BIOMETRICS AND ID MANAGEMENT | 2011年 / 6583卷
关键词
biometrics; handwriting; on-card matching; !text type='java']java[!/text] card; AUTHENTICATION;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In some biometric verification systems smart cards are used to store personal biometric data of a person instead of storing them in a database. If smart cards are correctly authenticated such as with cryptographic signatures, attacks to biometric databases are reduced like template replacement or cross-matching of biometric databases. Furthermore, smart cards are used to match reference data with the actual data of a claimed identity (e.g. [1], [2] and [3]); these systems are called matching-on-card (MOC). In this paper we present a system which besides matching, storing and decision of biometric templates also implements the feature extractor on a smart card to increase the security level and therefore minimize attack possibilities. In this work a exemplary Java Card as widely deployed smart card environment in today business applications is used as implementation platform and a biometric hash algorithm for dynamic handwriting introduced in [4] as biometric user authentication method. Our goal is to evaluate the processing time performance and EER to show the overall tendency. Due to the limited hard- and software resources of a Java Card, a feature extractor with reduced features (9 features). selected based on uncomplex implementation and fast determination time, is deployed. First experimental results show that a biometric hash algorithm for dynamic handwriting, embedded on a Java Card including the feature extraction, is capable of biometric user verification. However, processing time measurements of the first experimental non-time-optimized test system show that real-time applications are not suitable. To show the verification performance we use 500 raw data sets. Test results show an average EER of 28.5%, whereas a reference biometric hash algorithm (103 features) executed on a standard computer achieves an average EER of 4.86%. Furthermore we compare the performance with an existing DSP (digital signal processor) implementation.
引用
收藏
页码:61 / 72
页数:12
相关论文
共 50 条
  • [1] Embedded Eavesdropping on Java']Java Card
    Barbu, Guillaume
    Giraud, Christophe
    Guerin, Vincent
    [J]. INFORMATION SECURITY AND PRIVACY RESEARCH, 2012, 376 : 37 - 48
  • [2] Is Java']Java Card Ready for Hash-Based Signatures?
    van der Laan, Ebo
    Poll, Erik
    Rijneveld, Joost
    de Ruiter, Joeri
    Schwabe, Peter
    Verschuren, Jan
    [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2018, 2018, 11049 : 127 - 142
  • [3] Reverse-engineer Methods on a Biometric Hash Algorithm for Dynamic Handwriting
    Kuemmel, Karl
    Vielhauer, Claus
    [J]. MM&SEC 2010: 2010 ACM SIGMM MULTIMEDIA AND SECURITY WORKSHOP, PROCEEDINGS, 2010, : 67 - 72
  • [4] The synthesis of a Java']Java Card tokenisation algorithm
    Denney, E
    [J]. 16TH ANNUAL INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE 2001), PROCEEDINGS, 2001, : 43 - 50
  • [5] An asymmetric fingerprint matching algorithm for Java']Java Card™
    Bistarelli, Stefano
    Santini, Francesco
    Vaccarelli, Anna
    [J]. PATTERN ANALYSIS AND APPLICATIONS, 2006, 9 (04) : 359 - 376
  • [6] An asymmetric fingerprint matching algorithm for Java']Java Card™
    Bistarelli, S
    Santini, F
    Vaccarelli, A
    [J]. AUDIO AND VIDEO BASED BIOMETRIC PERSON AUTHENTICATION, PROCEEDINGS, 2005, 3546 : 279 - 288
  • [7] Comparison Analysis of Acorn Algorithm and Snow Algorithm on Smart Card using Java']Java Card
    Nurwarsito, Heru
    Ayu, Sarah Kusuma
    [J]. 2021 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATICS ENGINEERING (IC2IE 2021), 2021, : 429 - 434
  • [8] Formal development of an embedded verifier for Java']Java card byte code
    Casset, L
    Burdy, L
    Requet, A
    [J]. INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2002, : 51 - 56
  • [9] Reverse engineering a Java']Java Card memory management algorithm
    Mesbah, Abdelhak
    Lanet, Jean-Louis
    Mezghiche, Mohamed
    [J]. COMPUTERS & SECURITY, 2017, 66 : 97 - 114
  • [10] A dynamic Logic for the formal verification of Java']Java Card programs
    Beckert, B
    [J]. JAVA ON SMART CARDS: PROGRAMMING AND SECURITY, 2001, 2041 : 6 - 24