Skip to main content

Biometric Hash Algorithm for Dynamic Handwriting Embedded on a Java Card

  • Conference paper
Biometrics and ID Management (BioID 2011)

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 6583))

Included in the following conference series:

Abstract

In some biometric verification systems smart cards are used to store personal biometric data of a person instead of storing them in a database. If smart cards are correctly authenticated such as with cryptographic signatures, attacks to biometric databases are reduced like template replacement or cross-matching of biometric databases. Furthermore, smart cards are used to match reference data with the actual data of a claimed identity (e.g. [1], [2] and [3]); these systems are called matching-on-card (MOC). In this paper we present a system which besides matching, storing and decision of biometric templates also implements the feature extractor on a smart card to increase the security level and therefore minimize attack possibilities. In this work a exemplary Java Card as widely deployed smart card environment in today business applications is used as implementation platform and a biometric hash algorithm for dynamic handwriting introduced in [4] as biometric user authentication method. Our goal is to evaluate the processing time performance and EER to show the overall tendency. Due to the limited hard- and software resources of a Java Card, a feature extractor with reduced features (9 features), selected based on uncomplex implementation and fast determination time, is deployed. First experimental results show that a biometric hash algorithm for dynamic handwriting, embedded on a Java Card including the feature extraction, is capable of biometric user verification. However, processing time measurements of the first experimental non-time-optimized test system show that real-time applications are not suitable. To show the verification performance we use 500 raw data sets. Test results show an average EER of 28.5%, whereas a reference biometric hash algorithm (103 features) executed on a standard computer achieves an average EER of 4.86%. Furthermore we compare the performance with an existing DSP (digital signal processor) implementation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Struif, B., Scheuermann, D.: Smartcards with Biometric User Verification. In: Proceedings of IEEE International Conference on Multimedia and Expo 2002, vol. 2, pp. 589–592. Swiss Federal Institute of Technology, Lausanne (2002)

    Google Scholar 

  2. Henniger, O., Franke, K.: Biometric User Authentication on Smart Cards by Means of Handwritten Signatures. In: Zhang, D., Jain, A.K. (eds.) ICBA 2004. LNCS, vol. 3072, pp. 547–554. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  3. Choi, W.Y., Ahn, D., Pan, S.B., Chung, K.I., Chung, Y., Chung, S.H.: SVM-based speaker verification system for match-on-card and its hardware implementation. Electronics and Telecommunications Research Institute Journal 28(3), 320–328 (2006)

    Google Scholar 

  4. Vielhauer, C.: Biometric User Authentication for IT Security: From Fundamentals to Handwriting. Springer, New York (2006)

    Google Scholar 

  5. Ratha, N.K., Connell, J.H., Bolle, R.M.: An analysis of minutiae matching strength. In: Bigun, J., Smeraldi, F. (eds.) AVBPA 2001. LNCS, vol. 2091, pp. 223–228. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  6. Kümmel, K., Vielhauer, C.: Reverse-engineer methods on a biometric hash algorithm for dynamic handwriting. In: Proceedings of the 12th ACM Workshop on Multimedia and Security (MM&Sec 2010), Italy, Rom, pp. 67–72 (2010)

    Google Scholar 

  7. Kümmel, K., Vielhauer, C., Scheidat, T., Franke, D., Dittmann, J.: Handwriting Biometric Hash Attack: A Genetic Algorithm with User Interaction for Raw Data Reconstruction. In: De Decker, B., Schaumüller-Bichl, I. (eds.) CMS 2010. LNCS, vol. 6109, pp. 178–190. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  8. Vielhauer, C., Steinmetz, R., Mayerhoefer, A.: Biometric Hash based on Statistical Features of Online Signatures. In: Proceedings of the IEEE International Conference on Pattern Recognition (ICPR), Quebec City, vol. 1, pp. 123–126 (2002)

    Google Scholar 

  9. Philips SmartMX Contact and Dual Interface PKI Controllers, http://www.nxp.com/acrobat_download2/other/identification/smartmx_pki_controllers_0.18_um_line_card.pdf

  10. Dullink, H., van Daalen, B., Nijhuis, J., Spaanenburg, L., Zuidhof, H.: Implementing a DSP Kernel for Online Dynamic Handwritten Signature Verification Using the TMS320 DSP Family. In: DSP Solution Challenge 1995 European Team Papers, SPRA304, EFRIE, France (1995)

    Google Scholar 

  11. Croce Ferri, L., Mayerhöfer, A., Frank, M., Vielhauer, C., Steinmetz, R.: Biometric authentication for ID cards with Hologram Watermarks. In: Proc. of Security and Watermarking of Multimedia Contents IV, vol. 4675, pp. 629–640. SPIE, Bellingham (2002)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kümmel, K., Vielhauer, C. (2011). Biometric Hash Algorithm for Dynamic Handwriting Embedded on a Java Card. In: Vielhauer, C., Dittmann, J., Drygajlo, A., Juul, N.C., Fairhurst, M.C. (eds) Biometrics and ID Management. BioID 2011. Lecture Notes in Computer Science, vol 6583. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-19530-3_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-19530-3_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-19529-7

  • Online ISBN: 978-3-642-19530-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics