PalmHashing: A novel approach for dual-factor authentication

Many systems require a reliable personal authentication infrastructure to recognise the identity of a claimant before granting access to him/her. Conventional secure measures include the possession of an identity card or special knowledge like password and personal identification numbers (PINs). These methods are insecure as they can be lost, forgotten and potentially be shared among a group of co-workers for a long time without change. The fact that biometric authentication is convenient and non-refutable makes it a popular approach for a personal identification system. Nevertheless, biometric methods suffer from some inherent limitations and security threats. A more practical approach is to combine two-factor or mor authenticators to achieve a higher level of security. This paper proposes a novel dual-factor authenticator based on the iterated inner product between tokenised pseudorandom numbers and user-specific palmprint features. This process generates a set of user-specific compact code called PalmHash, which is highly tolerant of data offset. There is no deterministic way to get the userspecific code without having both PalmHash and the user palmprint feature. This offers strong protection against biométrie fabrication. Furthermore, the proposed PalmHashing technique is able to produce zero equal error rate (EER) and yields clean separation of the genuine and imposter populations. Hence, the false acceptance rate (FAR) can be eliminated without suffering from the increased occurrence of the false rejection rate (FRR).

[1]  Purdy Ho,et al.  Biometric Authentication in Infrastructure Security , 2002, InfraSec.

[2]  Yoshiaki Isobe,et al.  Development of personal authentication system using fingerprint with digital signature technologies , 2001, Proceedings of the 34th Annual Hawaii International Conference on System Sciences.

[3]  John Daugman,et al.  Biometric decision landscapes , 2000 .

[4]  S. Mallat A wavelet tour of signal processing , 1998 .

[5]  Raul Sánchez-Reillo Including Biometric Authentication in a Smart Card Operating System , 2001, AVBPA.

[6]  David Zhang,et al.  Palmprint recognition using eigenpalms features , 2003, Pattern Recognit. Lett..

[7]  Arun Ross,et al.  Information fusion in biometrics , 2003, Pattern Recognit. Lett..

[8]  John Daugman,et al.  How iris recognition works , 2002, IEEE Transactions on Circuits and Systems for Video Technology.

[9]  Tieniu Tan,et al.  Combining Face and Iris Biometrics for Identity Verification , 2003, AVBPA.

[10]  David Zhang,et al.  Two novel characteristics in palmprint verification: datum point invariance and line feature matching , 1999, Pattern Recognit..

[11]  Masanori Mizoguchi,et al.  Feature extraction method for palmprint considering elimination of creases , 1998, Proceedings. Fourteenth International Conference on Pattern Recognition (Cat. No.98EX170).

[12]  Luciano Rila Denial of Access in Biometrics-Based Authentication Systems , 2002, InfraSec.

[13]  Gian Luca Marcialis,et al.  Experimental Results on Fusion of Multiple Fingerprint Matchers , 2003, AVBPA.

[14]  M. Turk,et al.  Eigenfaces for Recognition , 1991, Journal of Cognitive Neuroscience.

[15]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[16]  Josef Kittler,et al.  Proceedings of the 4th international conference on Audio- and video-based biometric person authentication , 2003 .

[17]  David J. Kriegman,et al.  Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection , 1996, ECCV.

[18]  Anil K. Jain,et al.  Matching of palmprints , 2002, Pattern Recognit. Lett..

[19]  Nalini K. Ratha,et al.  Biometric perils and patches , 2002, Pattern Recognit..

[20]  Kuldip K. Paliwal,et al.  Feature extraction and dimensionality reduction algorithms and their applications in vowel recognition , 2003, Pattern Recognit..

[21]  Purdy Ho,et al.  A Dual-Factor Authentication System Featuring Speaker Verification and Token Technology , 2003, AVBPA.

[22]  Sharath Pankanti,et al.  Evaluation techniques for biometrics-based authentication systems (FRR) , 2000, Proceedings 15th International Conference on Pattern Recognition. ICPR-2000.

[23]  David Zhang,et al.  Palmprint feature extraction using 2-D Gabor filters , 2003, Pattern Recognit..

[24]  David Zhang,et al.  Fisherpalms based palmprint recognition , 2003, Pattern Recognit. Lett..