Iris based authentication mechanism for e-Passports

E-Passports are widely issued all over the world, although they suffer from security flaws. Many guidelines were proposed to solve these security considerations, like the guideline of the International Civil Aviation Organization (ICAO), the Extended Access Control (EAC), and other solutions for the third e-Passport generation. In this paper, an iris based authentication mechanism for e-Passport is proposed and validated. This mechanism is based on Elliptic Curve Cryptography (ECC). The iris based cryptographic key regeneration scheme is used to obtain a stable input from biometric data which is used to generate the security parameters of the elliptic curve. Another important aspect of this work is that it is evaluated on a publicly available biometric database. The results show a good performance especially from a biometric point of view (False Acceptance Rate of 0.2% and False Rejection Rate of 3.6%) on a subset of the NIST-ICE database.

[1]  Anil K. Jain,et al.  Securing Fingerprint Template: Fuzzy Vault with Helper Data , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).

[2]  Nalini K. Ratha,et al.  Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[3]  Loris Nanni,et al.  An improved BioHashing for human authentication , 2007, Pattern Recognit..

[4]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[5]  S. Kanade,et al.  Three factor scheme for biometric-based cryptographic key regeneration using iris , 2008, 2008 Biometrics Symposium.

[6]  Kevin Barraclough,et al.  I and i , 2001, BMJ : British Medical Journal.

[7]  Mohamed Abid,et al.  Towards a secure E-passport protocol based on biometrics , 2009 .

[8]  Huaxiong Wang,et al.  An On-Line Secure E-Passport Protocol , 2008, ISPEC.

[9]  Tim Kerins,et al.  An Elliptic Curve Processor Suitable For RFID-Tags , 2006, IACR Cryptol. ePrint Arch..

[10]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[11]  Bernadette Dorizzi,et al.  Guide to Biometric Reference Systems and Performance Evaluation , 2009 .

[12]  David A. Wagner,et al.  Security and Privacy Issues in E-passports , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[13]  Rishab Nithyanand A Survey on the Evolution of Cryptographic Protocols in ePassports , 2009, IACR Cryptol. ePrint Arch..

[14]  Andrew Beng Jin Teoh,et al.  Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..

[15]  Feng Hao,et al.  Combining Crypto with Biometrics Effectively , 2006, IEEE Transactions on Computers.