Improving biometrics authentication with a multi-factor approach based on optical interference and chaotic maps

We propose a method to improve biometric authentication systems using a multifactor approach. For this security scheme a user authenticates successfully using a set of three characteristics related to physical, possession and knowledge factors. Besides biometric authentication representing the physical factor, we propose the use of an optical authentication technique based on two-beam interference and chaotic maps. In this sense, the seed of a chaotic map represents a user password corresponding to a knowledge factor and a resultant interferogram from optical authentication technique is used as a possession factor. The feasibility of our method is tested using numerical simulation. Moreover, key space and statistical analysis are performed to demonstrate the effectiveness of the solution.

[1]  Muhammad Rafiq Abuturab Information authentication system using interference of two beams in gyrator transform domain. , 2013, Applied optics.

[2]  T. Geisel,et al.  Statistical properties of chaos in Chebyshev maps , 1984 .

[3]  Muhammad Khurram Khan,et al.  Multimodal face and fingerprint biometrics authentication on space-limited tokens , 2008, Neurocomputing.

[4]  Peng Zhang,et al.  Known-plaintext attack on optical encryption based on double random phase keys. , 2006, Optics letters.

[5]  Jin Kwak,et al.  Construction of a secure two-factor user authentication system using fingerprint information and password , 2014, J. Intell. Manuf..

[6]  Mark Manulis,et al.  A Modular Framework for Multi-Factor Authentication and Key Exchange , 2014, SSR.

[7]  Muhammad Khurram Khan,et al.  Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks , 2016, Comput. Networks.

[8]  Wenqi He,et al.  Multiple-image authentication with a cascaded multilevel architecture based on amplitude field random sampling and phase information multiplexing. , 2015, Applied optics.

[9]  Ann Cavoukian,et al.  Biometric Encryption Chapter from the Encyclopedia of Biometrics , 2009 .

[10]  Tran Khanh Dang,et al.  A Multi-factor Biometric Based Remote Authentication Using Fuzzy Commitment and Non-invertible Transformation , 2015, ICT-EurAsia/CONFENIS.

[11]  Hua Zhang,et al.  Novel image encryption/decryption based on quantum Fourier transform and double phase encoding , 2013, Quantum Inf. Process..

[12]  B Javidi,et al.  Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.

[13]  H. Al-Assam,et al.  Improving performance and security of biometrics using efficient and stable random projection techniques , 2009, 2009 Proceedings of 6th International Symposium on Image and Signal Processing and Analysis.

[14]  Frederic P. Miller,et al.  Advanced Encryption Standard , 2009 .

[15]  Rong Li,et al.  Optical image hiding with a modified Mach–Zehnder interferometer , 2014 .

[16]  Di Xiao,et al.  Double optical image encryption using discrete Chirikov standard map and chaos-based fractional random transform , 2013 .

[17]  Nirmala Saini,et al.  Biometrics based key management of double random phase encoding scheme using error control codes , 2013 .

[18]  Pong C. Yuen,et al.  A Hybrid Approach for Generating Secure and Discriminating Face Template , 2010, IEEE Transactions on Information Forensics and Security.

[19]  Huaisheng Wang A No Interference Method for Image Encryption and Decryption by an Optical System of a Fractional Fourier Transformation and a Fourier Transformation , 2011 .

[20]  Muhammad Ali Akbar,et al.  Secure biometric template generation for multi-factor authentication , 2015, Pattern Recognit..

[21]  Xin Wang,et al.  Multi-image encryption based on interference of computer generated hologram , 2014 .

[22]  Lei Tian,et al.  Chaotic secure content-based hidden transmission of biometric templates , 2007 .

[23]  Yong Man Ro,et al.  Multi-Factor Authentication Using Fingerprints and User-Specific Random Projection , 2010, 2010 12th International Asia-Pacific Web Conference.

[24]  Lihua Gong,et al.  Quantum image encryption based on generalized Arnold transform and double random-phase encoding , 2015, Quantum Information Processing.

[25]  Anil K. Jain,et al.  Multibiometric systems: fusion strategies and template security , 2008 .

[26]  Hengjian Li,et al.  Generating cancelable palmprint templates via coupled nonlinear dynamic filters and multiple orientation palmcodes , 2010, Inf. Sci..

[27]  Nam Kim,et al.  Digital holographic security system based on random phase encoded reference beams and fingerprint identification , 2005 .

[28]  Muhammad Rafiq Abuturab,et al.  Color image security system based on discrete Hartley transform in gyrator transform domain , 2013 .

[29]  Nirmala Saini,et al.  Soft biometrics in conjunction with optics based biohashing , 2011 .

[30]  Wenqi He,et al.  Optical identity authentication scheme based on elliptic curve digital signature algorithm and phase retrieval algorithm. , 2013, Applied optics.

[31]  KyungHee Lee,et al.  Two-factor face authentication using matrix permutation transformation and a user password , 2014, Inf. Sci..

[32]  刘雪梅,et al.  An optical authentication system based on encryption technique and multimodal biometrics , 2013 .

[33]  Hongjun Liu,et al.  Color image encryption based on one-time keys and robust chaotic maps , 2010, Comput. Math. Appl..

[34]  Naveen K Nishchal,et al.  Known-plaintext attack-based optical cryptosystem using phase-truncated Fresnel transform. , 2013, Applied optics.

[35]  Andreas Uhl,et al.  A survey on biometric cryptosystems and cancelable biometrics , 2011, EURASIP J. Inf. Secur..

[36]  Jean-Pierre Seifert,et al.  Fault Based Cryptanalysis of the Advanced Encryption Standard (AES) , 2003, Financial Cryptography.

[37]  Robert H. Deng,et al.  A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems , 2011, IEEE Transactions on Parallel and Distributed Systems.

[38]  Mohammad Eshghi,et al.  Chaotic image encryption system using phase-magnitude transformation and pixel substitution , 2011, Telecommunication Systems.

[39]  Hoon-Jae Lee,et al.  Multi-Factor Authentication Process Using More than One Token with Watermark Security , 2013 .

[40]  Nirmala Saini,et al.  Optics based biometric encryption using log polar transform , 2010 .

[41]  Safya Belghith,et al.  OCML-based colour image encryption , 2009 .

[42]  Naveen K Nishchal,et al.  An optical encryption and authentication scheme using asymmetric keys. , 2014, Journal of the Optical Society of America. A, Optics, image science, and vision.

[43]  Jun Li,et al.  Double-image encryption on joint transform correlator using two-step-only quadrature phase-shifting digital holography , 2012 .

[44]  Junbin Gao,et al.  Fingerprint Matching using A Hybrid Shape and Orientation Descriptor , 2011 .

[45]  Liansheng Sui,et al.  Color image encryption based on gyrator transform and Arnold transform , 2013 .

[46]  Todd Mozer,et al.  Assessing biometric authentication: a holistic approach to accuracy , 2015 .

[47]  Lu Leng,et al.  Dual-key-binding cancelable palmprint cryptosystem for palmprint protection and information security , 2011, J. Netw. Comput. Appl..

[48]  Xiaoling Wang,et al.  Multiple-image hiding based on interference principle , 2012 .

[49]  Ming Li,et al.  A remote cancelable palmprint authentication protocol based on multi-directional two-dimensional PalmPhasor-fusion , 2014, Secur. Commun. Networks.

[50]  L. Leng,et al.  Cancelable PalmCode generated from randomized Gabor Filters for palmprint protection , 2010, 2010 25th International Conference of Image and Vision Computing New Zealand.

[51]  B. Javidi,et al.  Optical Security System with Fourier Plane encoding. , 1998, Applied optics.

[52]  Bahram Javidi,et al.  Fully phase encoded key and biometrics for security verification , 1997 .

[53]  Ayman Alfalou,et al.  Double random phase encryption scheme to multiplex and simultaneous encode multiple images. , 2009, Applied optics.

[54]  Anil K. Jain,et al.  A hybrid biometric cryptosystem for securing fingerprint minutiae templates , 2010, Pattern Recognit. Lett..

[55]  Hai Yu,et al.  Analysis and improvement of a double-image encryption scheme using pixel scrambling technique in gyrator domains , 2015 .

[56]  Wen Chen,et al.  Optical binary image encryption using aperture-key and dual wavelengths. , 2014, Optics express.

[57]  Wenqi He,et al.  Optical hierarchical authentication based on interference and hash function. , 2012, Applied optics.

[58]  Wen Chen,et al.  Optical information authentication using compressed double-random-phase-encoded images and quick-response codes. , 2015, Optics express.

[59]  Zhengjun Liu,et al.  A novel double-image encryption scheme based on cross-image pixel scrambling in gyrator domains. , 2014, Optics express.

[60]  Lu Leng,et al.  PalmHash Code vs. PalmPhasor Code , 2013, Neurocomputing.

[61]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .

[62]  Naveen K. Nishchal,et al.  Fresnel domain nonlinear optical image encryption scheme based on Gerchberg-Saxton phase-retrieval algorithm. , 2014, Applied optics.

[63]  Y. Mu,et al.  Optical Image Encryption Based on Chaotic Baker Map and Double Random Phase Encoding , 2013, Journal of Lightwave Technology.

[64]  Bahram Javidi,et al.  Optical encryption using a joint transform correlator architecture , 2000 .

[65]  Zhengjun Liu,et al.  Image encryption algorithm by using fractional Fourier transform and pixel scrambling operation based on double random phase encoding , 2013 .

[66]  Jingjuan Zhang,et al.  A lensless optical security system based on computer-generated phase only masks , 2004 .

[67]  Kehar Singh,et al.  Optical image encryption using a jigsaw transform for silhouette removal in interference-based methods and decryption with a single spatial light modulator. , 2011, Applied optics.

[68]  Junbin Gao,et al.  Fingerprint Matching using Enhanced Shape Context , 2006 .

[69]  Bo Wang,et al.  Optical image encryption based on interference. , 2008, Optics letters.

[70]  Ahmed Ben Jmaa,et al.  2DPCA fractal features and genetic algorithm for efficient face representation and recognition , 2011, EURASIP J. Inf. Secur..

[71]  Jun Li,et al.  Image encryption with two-step-only quadrature phase-shifting digital holography , 2012 .

[72]  Rafail Ostrovsky,et al.  Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..