Authentication for ID Cards based on Colour Visual Cryptography and Facial Recognition

被引:3
|
作者
Ibrahim, D. R. [1 ]
Abdullah, R. [1 ]
Teh, J. S. [2 ]
Alsalibi, B. [2 ]
机构
[1] Univ Sains Malaysia, Natl Adv IPv6 Ctr Excellence, George Town, Malaysia
[2] Univ Sains Malaysia, Sch Comp Sci, George Town, Malaysia
基金
中国国家自然科学基金;
关键词
Visual cryptography; facial recognition; biometric template protection; two-factor authentication methods; color visual cryptography;
D O I
10.1145/3309074.3309077
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Modem identification cards can be used for a myriad of applications such as electronic passports, ATM cards or payment cards for public transportation. Despite their ease of use, user authentication is an important factor that must be taken into consideration. In addition to the use of passwords, biometric data such as fingerprints or iris images can also be included as part of a multi-factor authentication system. However, these methods require secure storage of the biometric template and active participation from the user. In this paper, we propose a new method of authentication for identification cards based on colour visual cryptography and facial recognition. A colour image of the user will be encrypted using visual cryptography and split into two share images, one of which will be stored on the database and the other will be stored in the card. When the card is placed onto a sensor, the two shares will overlap to uncover the original image. The recovered image is then fed into a trained facial recognition algorithm to verify the user's identity. The proposed method is evaluated based on recognition rate and runtime. Experimental results indicate the feasibility of the proposed method for practical application and can be used as a starting point for future work in the area.
引用
收藏
页码:164 / 167
页数:4
相关论文
共 50 条
  • [41] Collusive Attacks to Partition Authentication Visual Cryptography Scheme
    Ren, Yawei
    Liu, Feng
    Wang, Wen
    DIGITAL FORENSICS AND WATERMARKING, IWDW 2016, 2017, 10082 : 238 - 250
  • [42] Impersonation attack on a dynamic ID-based remote user authentication scheme using smart cards
    Ku, WC
    Chang, ST
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (05) : 2165 - 2167
  • [43] A Robust and Novel Dynamic-ID-based Authentication Scheme for Care Team Collaboration with Smart Cards
    Chang, Ya-Fen
    Chen, Chia-Chen
    Chang, Pei-Yu
    JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (02)
  • [44] Dynamic Id Based Remote User Authentication In Multi Server Environment Using Smart Cards: A Review
    Gaharana, Shanu
    Anand, Darpan
    2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN), 2015, : 1081 - 1084
  • [45] Enabling secure authentication using fingerprint and visual cryptography
    Annappanavar, Sneha Manohar
    Chavan, Pallavi Vijay
    INTERNATIONAL JOURNAL OF BIOMETRICS, 2024, 16 (06) : 614 - 639
  • [46] Optimizing authentication mechanisms using ID-based cryptography in ad hoc wireless mobile networks
    Lee, WJ
    Sriborrirux, W
    INFORMATION NETWORKING: NETWORKING TECHNOLOGIES FOR BROADBAND AND MOBILE NETWORKS, 2004, 3090 : 925 - 934
  • [47] Dynamic ID-based remote user password authentication schemes using smart cards: A review
    Madhusudhan, R.
    Mittal, R. C.
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (04) : 1235 - 1248
  • [48] Design of an Authentication System Based on Face Recognition and the Second Generation ID Detection
    Han, Pengwu
    Ji, Cong
    Wang, Siming
    Zhang, Daixing
    Yang, Dong
    AUTOMATIC MANUFACTURING SYSTEMS II, PTS 1 AND 2, 2012, 542-543 : 968 - 971
  • [49] A Secure Mutual Authentication Protocol Based on Visual Cryptography Technique for IoT-Cloud
    Brou Bernard Ehui
    Chen CHEN
    Shirui WANG
    Hua GUO
    Jianwei LIU
    Chinese Journal of Electronics, 2024, 33 (01) : 43 - 57
  • [50] An Efficient ID Based Security Algorithm for Mutual Node Authentication and Key Management: An Elliptic Curve Cryptography Based Approach
    Sen, Nilanjan
    APPLIED ALGORITHMS, 2014, 8321 : 110 - 121