Authentication for ID Cards based on Colour Visual Cryptography and Facial Recognition

被引:3
|
作者
Ibrahim, D. R. [1 ]
Abdullah, R. [1 ]
Teh, J. S. [2 ]
Alsalibi, B. [2 ]
机构
[1] Univ Sains Malaysia, Natl Adv IPv6 Ctr Excellence, George Town, Malaysia
[2] Univ Sains Malaysia, Sch Comp Sci, George Town, Malaysia
基金
中国国家自然科学基金;
关键词
Visual cryptography; facial recognition; biometric template protection; two-factor authentication methods; color visual cryptography;
D O I
10.1145/3309074.3309077
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Modem identification cards can be used for a myriad of applications such as electronic passports, ATM cards or payment cards for public transportation. Despite their ease of use, user authentication is an important factor that must be taken into consideration. In addition to the use of passwords, biometric data such as fingerprints or iris images can also be included as part of a multi-factor authentication system. However, these methods require secure storage of the biometric template and active participation from the user. In this paper, we propose a new method of authentication for identification cards based on colour visual cryptography and facial recognition. A colour image of the user will be encrypted using visual cryptography and split into two share images, one of which will be stored on the database and the other will be stored in the card. When the card is placed onto a sensor, the two shares will overlap to uncover the original image. The recovered image is then fed into a trained facial recognition algorithm to verify the user's identity. The proposed method is evaluated based on recognition rate and runtime. Experimental results indicate the feasibility of the proposed method for practical application and can be used as a starting point for future work in the area.
引用
下载
收藏
页码:164 / 167
页数:4
相关论文
共 50 条
  • [1] Multifactor authentication system based on color visual cryptography, facial recognition, and dragonfly optimization
    Ibrahim, D. R.
    Teh, J. S.
    Abdullah, R.
    INFORMATION SECURITY JOURNAL, 2021, 30 (03): : 149 - 159
  • [2] Fingerprint based authentication application using visual cryptography methods (Improved ID card)
    Rao, Y. V. Subba
    Sukonkina, Yulia
    Bhagwati, Chakravarthy
    Singh, Umesh Kumar
    2008 IEEE REGION 10 CONFERENCE: TENCON 2008, VOLS 1-4, 2008, : 2133 - 2137
  • [3] ID-based remote authentication with smart cards on open distributed system from Elliptic Curve Cryptography
    Wu, Shyi-Tsong
    Chiu, Jung-Hui
    Chieu, Bin-Chang
    2005 IEEE INTERNATIONAL CONFERENCE ON ELECTRO/INFORMATION TECHNOLOGY (EIT 2005), 2005, : 323 - 327
  • [4] Id-based remote authentication on open distributed systems with smart cards from elliptic curve cryptography
    Department of Electronic Engineering, National Ilan University, Taiwan
    不详
    不详
    Int. J. Electr. Eng., 2007, 6 (401-407):
  • [5] Content based authentication of visual cryptography
    G. Wang
    W. Yan
    M. Kankanhalli
    Multimedia Tools and Applications, 2017, 76 : 9427 - 9441
  • [6] Content based authentication of visual cryptography
    Wang, G.
    Yan, W.
    Kankanhalli, M.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (07) : 9427 - 9441
  • [7] Facial Images Authentication In Visual Cryptography Using Sterilization Algorithm
    Dalvi, Gopal D.
    Wakde, D. G.
    2017 2ND INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2017, : 951 - 955
  • [8] Biometric authentication for ID cards with hologram watermarks
    Ferri, LC
    Mayerhöfer, A
    Frank, M
    Vielhauer, C
    Steinmetz, R
    SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS IV, 2002, 4675 : 629 - 640
  • [9] Colour visual cryptography schemes
    Liu, F.
    Wu, C. K.
    Lin, X. J.
    IET Information Security, 2008, 2 (04) : 151 - 165
  • [10] Zero-Knowledge Authentication Based on Visual Cryptography
    Han, Yan-Yan
    Zhang, Yao
    He, Wen-Cai
    Xu, Zhuo-Lin
    INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 406 - 411