A Study on the Convergence of FingerHashing and a Secured Biometric System

Because biometrics-based authentication offers several advantages face to other authentication methods, it is important that such systems be designed to withstand attacks. Reliability and privacy for the public acceptance of the system are also important factors. BioHashing is presented as a new technique to moderate the impact of susceptible threats. The acceptance of this approach depends on whether it has low error rates and is tamper proof. We study so in this paper, the relevant advances in this area being more focused on fingerprint modality due to its widespread usage. We also consider a FingerHashing smartcard-based implementation and try to emphasize how this system can meet a secured biometric system.

[1]  Andrew Beng Jin Teoh,et al.  PalmHashing: a novel approach for dual-factor authentication , 2004, Pattern Analysis and Applications.

[2]  Raul Sánchez-Reillo Including Biometric Authentication in a Smart Card Operating System , 2001, AVBPA.

[3]  Michael K. Reiter,et al.  Password hardening based on keystroke dynamics , 2002, International Journal of Information Security.

[4]  Yair Frankel,et al.  On enabling secure applications through off-line biometric identification , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).

[5]  David Chek Ling Ngo,et al.  PalmHashing: A novel approach for dual-factor authentication , 2004, Pattern Analysis and Applications.

[6]  Markus G. Kuhn,et al.  Tamper resistance: a cautionary note , 1996 .

[7]  Loris Nanni,et al.  Empirical tests on BioHashing , 2006, Neurocomputing.

[8]  Qi Li,et al.  Cryptographic key generation from voice , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[9]  Loris Nanni,et al.  An efficient fingerprint verification system using integrated gabor filters and Parzen Window Classifier , 2005, Neurocomputing.

[10]  Yoshiaki Isobe,et al.  Development of personal authentication system using fingerprint with digital signature technologies , 2001, Proceedings of the 34th Annual Hawaii International Conference on System Sciences.

[11]  Venu Govindaraju,et al.  Symmetric Hash Functions for Fingerprint Minutiae , 2005, ICAPR.

[12]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[13]  Ross J. Anderson,et al.  Combining cryptography with biometrics effectively , 2005 .

[14]  Sharath Pankanti,et al.  Filterbank-based fingerprint matching , 2000, IEEE Trans. Image Process..

[15]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[16]  Luciano Rila Denial of Access in Biometrics-Based Authentication Systems , 2002, InfraSec.

[17]  Andrew Beng Jin Teoh,et al.  Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..

[18]  Nalini K. Ratha,et al.  Biometric perils and patches , 2002, Pattern Recognit..

[19]  David Zhang,et al.  An analysis of BioHashing and its variants , 2006, Pattern Recognit..

[20]  Mohammed Yakoob Siyal,et al.  Novel biometric digital signatures for Internet-based applications , 2001, Inf. Manag. Comput. Secur..

[21]  David Chek Ling Ngo,et al.  Computation of Cryptographic Keys from Face Biometrics , 2003, Communications and Multimedia Security.

[22]  T. Charles Clancy,et al.  Secure smartcardbased fingerprint authentication , 2003, WBMA '03.

[23]  Loris Nanni,et al.  Letters Empirical tests on BioHashing , 2006 .