Simple and secured access to networked home appliances via internet using SSL, BioHashing and single Authentication Server

This thesis describes a web-based application that will enable users to access their networked home appliances over the Internet in an easy, secured, accessible and cost effective manner, using the user's iris image only for authentication. As Internet is increasingly gaining significance and popularity in our daily lives, various home networking technologies also started gaining importance from consumers, which helped in facilitating interoperability, sharing of services and exchange of information between different electronic devices at home. As a result, the demand to be able to access home appliances or security cameras over the Internet gradually grew. In this research, we propose an efficient, secured, low-cost and user-friendly method to access networked home appliances over the Internet, providing strong, well integrated, three levels of security to the whole application and user data. According to our design, the user's iris data after hashing (using BioHashing) is sent through a secure communication channel utilizing Secure Sockets Layer v-3.0. The deterministic feature sequence from the iris image is extracted using 1D log-Gabor filters and while performing BioHashing, the orthonormalization of the pseudorandom number is implemented employing Gram-Schmidt orthonormalization algorithm. In addition to this protected data transfer mechanism, we propose the design of an Authentication Server that can be shared among multiple homes, allowing numerous users to access their home appliances in a trouble-free and secured manner. It can also bring down the cost of commercial realization of this endeavor and increase its accessibility without compromising on system security. We demonstrate that the recognition efficiency of this system is computationally effective with equal error rate (EER) of 0% and 6.75% (average) in two separate conditions on CASIA 1 and CASIA 2 iris image datasets.

[1]  Gerard O'Driscoll The Essential Guide to Home Networking , 2000 .

[2]  Theodore Antonakopoulos,et al.  Intelligent devices for appliances control in home networks , 2003, IEEE Trans. Consumer Electron..

[3]  Tieniu Tan,et al.  Iris recognition using circular symmetric filters , 2002, Object recognition supported by user interaction for service robots.

[4]  Andrew Beng Jin Teoh,et al.  High security Iris verification system based on random secret integration , 2006, Comput. Vis. Image Underst..

[5]  Lionel Torres,et al.  Person Identification Technique Using Human Iris Recognition , 2002 .

[6]  David Zhang,et al.  Automated Biometrics: Technologies and Systems , 2000 .

[7]  Carmen Sánchez Ávila,et al.  Iris Recognition with Low Template Size , 2001, AVBPA.

[8]  Vishal Monga,et al.  Perceptual Image Hashing Via Feature Points: Performance Evaluation and Tradeoffs , 2006, IEEE Transactions on Image Processing.

[9]  Ying Han Pang,et al.  Palmprint based Cancelable Biometric Authentication System , 2007 .

[10]  Prabir Bhattacharya,et al.  Remote access and networked appliance control using biometrics features , 2003, IEEE Trans. Consumer Electron..

[11]  Dexin Zhang,et al.  Personal Identification Based on Iris Texture Analysis , 2003, IEEE Trans. Pattern Anal. Mach. Intell..

[12]  John Daugman,et al.  Statistical Richness of Visual Phase Information: Update on Recognizing Persons by Iris Patterns , 2001, International Journal of Computer Vision.

[13]  Samy Bengio,et al.  Compensating User-Specific Information with User-Independent Information in Biometric Authentication Tasks , 2005 .

[14]  Thian Song Ong,et al.  Secure biometric template protection via randomized dynamic quantization transformation , 2008, 2008 International Symposium on Biometrics and Security Technologies.

[15]  B. V. K. Vijaya Kumar,et al.  Iris Verification Using Correlation Filters , 2003, AVBPA.

[16]  Mariana Nikolova,et al.  Remote mobile control of home appliances , 2002, 2002 Digest of Technical Papers. International Conference on Consumer Electronics (IEEE Cat. No.02CH37300).

[17]  Vishal Monga,et al.  Perceptually based methods for robust image hashing , 2005 .

[18]  V. Monga,et al.  Clustering algorithms for perceptual image hashing , 2004, 3rd IEEE Signal Processing Education Workshop. 2004 IEEE 11th Digital Signal Processing Workshop, 2004..

[19]  Derrick Vail Physiology of the Eye: Clinical Application , 1960 .

[20]  Theodore Zahariadis Home Networking Technologies and Standards , 2003 .

[21]  Eric Rescorla,et al.  The Secure HyperText Transfer Protocol , 1999, RFC.

[22]  David Zhang,et al.  A Palmprint Cryptosystem , 2007, ICB.

[23]  Yair Frankel,et al.  On the Relation of Error Correction and Cryptography to an Off Line Biometric Based Identification S , 1999 .

[24]  Boualem Boashash,et al.  A human identification technique using images of the iris and wavelet transform , 1998, IEEE Trans. Signal Process..

[25]  Reoven Cohen On the establishment of an access VPN in broadband access networks , 2003, IEEE Commun. Mag..

[26]  Jiri Fridrich,et al.  Image watermarking for tamper detection , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[27]  王朔中,et al.  Recent development of perceptual image hashing , 2007 .

[28]  Andrew Beng Jin Teoh,et al.  PalmHashing: a novel approach for cancelable biometrics , 2005, Inf. Process. Lett..

[29]  Thomas Wetter,et al.  Data security and protection in cross-institutional electronic patient records , 2003, Int. J. Medical Informatics.

[30]  R. Graczyk The eye. , 1955, Radiography.

[31]  Oswald Drobnik,et al.  An HTTP-Based Infrastructure for Mobile Agents , 1995, World Wide Web J..

[32]  Ramarathnam Venkatesan,et al.  Robust image hashing , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[33]  Rishi Gupta,et al.  Iris Recognition System , 2010 .

[34]  Ingrid Verbauwhede,et al.  Automatic secure fingerprint verification system based on fuzzy vault scheme , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..

[35]  Nasir D. Memon,et al.  A secure biometric authentication scheme based on robust hashing , 2005, MM&Sec '05.

[36]  G. O. Williams Iris recognition technology , 1997 .

[37]  Oliver Paridaens,et al.  Scalability implications of virtual private networks , 2002, IEEE Commun. Mag..

[38]  Ramarathnam Venkatesan,et al.  New Iterative Geometric Methods for Robust Perceptual Image Hashing , 2001, Digital Rights Management Workshop.

[39]  Hao Feng,et al.  Private key generation from on-line handwritten signatures , 2002, Inf. Manag. Comput. Secur..

[40]  Dexin Zhang,et al.  Efficient iris recognition by characterizing key local variations , 2004, IEEE Transactions on Image Processing.

[41]  Amir Herzberg Why Johnny can't surf (safely)? Attacks and defenses for web users , 2009, Comput. Secur..

[42]  Georgios Kambourakis,et al.  Using SSL/TLS in authentication and key agreement procedures of future mobile networks , 2002, 4th International Workshop on Mobile and Wireless Communications Network.

[43]  T. Charles Clancy,et al.  Secure smartcardbased fingerprint authentication , 2003, WBMA '03.

[44]  Paul F. Syverson,et al.  Onion routing , 1999, CACM.

[45]  Min Wu,et al.  Image hashing resilient to geometric and filtering operations , 2004, IEEE 6th Workshop on Multimedia Signal Processing, 2004..

[46]  Rolf Oppliger,et al.  SSL/TLS session-aware user authentication - Or how to effectively thwart the man-in-the-middle , 2006, Comput. Commun..

[47]  Jafar M. H. Ali,et al.  An Iris Recognition System to Enhance E-security Environment Based on Wavelet Theory , 2003 .

[48]  Jaihie Kim,et al.  Iris Feature Extraction Using Independent Component Analysis , 2003, AVBPA.

[49]  David Chandler,et al.  Biometric Product Testing Final Report , 2001 .

[50]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[51]  John Daugman,et al.  The importance of being random: statistical principles of iris recognition , 2003, Pattern Recognit..

[52]  Nalini K. Ratha,et al.  Biometric perils and patches , 2002, Pattern Recognit..

[53]  Bhagavatula Vijaya Kumar,et al.  Biometric Encryption using image processing , 1998, Electronic Imaging.

[54]  John Viega,et al.  Network Security with OpenSSL , 2002 .

[55]  Min Wu,et al.  Security of feature extraction in image hashing , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..

[56]  Jiri Fridrich,et al.  Robust hash functions for digital watermarking , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).

[57]  Yoonsik Choe,et al.  Home server for home digital service environments , 2003, IEEE Trans. Consumer Electron..

[58]  Carmen Sanchez-Avila,et al.  Iris-based biometric recognition using dyadic wavelet transform , 2002 .

[59]  Alan B. Johnston,et al.  SIP: Understanding the Session Initiation Protocol , 2001 .

[60]  Arun Ross,et al.  An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.

[61]  John Daugman,et al.  High Confidence Visual Recognition of Persons by a Test of Statistical Independence , 1993, IEEE Trans. Pattern Anal. Mach. Intell..

[62]  Prabir Bhattacharya,et al.  Secure biometric system for accessing home appliances via Internet , 2009, 2009 International Conference for Internet Technology and Secured Transactions, (ICITST).

[63]  J. L. Wayman,et al.  Best practices in testing and reporting performance of biometric devices. , 2002 .

[64]  John Daugman,et al.  How iris recognition works , 2002, IEEE Transactions on Circuits and Systems for Video Technology.

[65]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[66]  Alan B. Johnston,et al.  Internet Communications Using SIP: Delivering VoIP and Multimedia Services with Session Initiation Protocol , 2006 .

[67]  Seongwon Cho,et al.  Iris Recognition Using a Low Level of Details , 2006, ISVC.

[68]  Qi Li,et al.  Cryptographic key generation from voice , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[69]  Tee Connie,et al.  Remarks on BioHashing based cancelable biometrics in verification system , 2006 .

[70]  T. Markham,et al.  Security at the network edge: a distributed firewall architecture , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.

[71]  Okhwan Byeon,et al.  Efficient Iris Recognition through Improvement of Feature Vector and Classifier , 2001 .

[72]  Chen Yan-ping Personal identification based on iris recognition technology , 2009 .

[73]  T. Tan,et al.  Iris Recognition Based on Multichannel Gabor Filtering , 2002 .

[74]  Ashok A. Ghatol,et al.  Iris recognition: an emerging biometric technology , 2007 .

[75]  Simon Garrett,et al.  Broadband Applications and the Digital Home , 2002 .

[76]  Sushil K. Bhattacharjee,et al.  Compression tolerant image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[77]  Kuanquan Wang,et al.  A Novel Cryptographic Algorithm Based on Iris Feature , 2008, 2008 International Conference on Computational Intelligence and Security.

[78]  Yair Frankel,et al.  On enabling secure applications through off-line biometric identification , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).

[79]  Shu Lin,et al.  An Extendible Hash for Multi-Precision Similarity Querying of Image Databases , 2001, VLDB.

[80]  Y. Jang,et al.  Implementation of Home Network Security System based on Remote Management Server , 2007 .

[81]  Ralf Steinmetz,et al.  Content-based digital signature for motion pictures authentication and content-fragile watermarking , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[82]  David Chek Ling Ngo,et al.  Computation of Cryptographic Keys from Face Biometrics , 2003, Communications and Multimedia Security.

[83]  Loris Nanni,et al.  An advanced multi-modal method for human authentication featuring biometrics data and tokenised random numbers , 2006, Neurocomputing.

[84]  John Daugman,et al.  Demodulation by Complex-Valued Wavelets for Stochastic Pattern Recognition , 2003, Int. J. Wavelets Multiresolution Inf. Process..

[85]  Loris Nanni,et al.  An improved BioHashing for human authentication , 2007, Pattern Recognit..

[86]  Diane J. Cook,et al.  Smart environments - technology, protocols and applications , 2004 .

[87]  J. Triñanes Database security in high risk environments , 2001 .

[88]  Rolf Oppliger,et al.  SSL/TLS Session-Aware User Authentication , 2008, Computer.

[89]  James H. Burrows,et al.  Secure Hash Standard , 1995 .

[90]  Mark J. T. Smith,et al.  Iris-Based Personal Authentication Using a Normalized Directional Energy Feature , 2003, AVBPA.

[91]  Sharath Pankanti,et al.  Fuzzy Vault for Fingerprints , 2005, AVBPA.

[92]  Richard P. Wildes,et al.  A machine-vision system for iris recognition , 2005, Machine Vision and Applications.

[93]  Luminita Vasiu,et al.  Biometric Recognition - Security and Privacy Concerns , 2004, ICETE.

[94]  Arun Ross,et al.  Information fusion in biometrics , 2003, Pattern Recognit. Lett..

[95]  Feng Hao,et al.  Combining Crypto with Biometrics Effectively , 2006, IEEE Transactions on Computers.

[96]  David Zhang,et al.  Detecting Eyelash and Reflection for Accurate Iris Segmentation , 2003, Int. J. Pattern Recognit. Artif. Intell..

[97]  Kannan Ramchandran,et al.  Dither-based secure image hashing using distributed coding , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).

[98]  Andrew Beng Jin Teoh,et al.  Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..

[99]  Andrew Beng Jin Teoh,et al.  Cancellable biometrics and annotations on BioHash , 2008, Pattern Recognit..