Skip to main content
Log in

A one-card-pass user authentication scheme using image morphing

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

A novel smart card user authentication scheme is proposed in this paper. It is the first authentication scheme that can achieve “one-card-pass” functionality, that is, an authorized card user may register with any department in an organization, and then, by just passing the face-to-face authentication but without conducting any extra registration, the card user can use his/her card to gain different services from all authorized departments in this organization. To enhance the security, image morphing and de-morphing techniques are used in our proposed scheme. Both the theoretical analyses and experimental results show that our proposed scheme is secure and very simple to implement.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Lamport L (1981) Password authentication with insecure communication. Commun ACM 24:770–772

    Article  Google Scholar 

  2. Hwang MS, Li LH (2000) A new remote user authentication scheme using smart card. IEEE Trans Consum Electron 46:28–30

    Article  Google Scholar 

  3. Sun HM (2000) An efficient remote user authentication scheme using smart cards. IEEE Transon Consum Electron 46:958–961

    Article  Google Scholar 

  4. Juang WS, Chen ST, Liaw HT (2008) Robust and efficient password-authenticated key agreement using smart card. IEEE Trans Ind Electron 55:2551–2556

    Article  Google Scholar 

  5. Kim SK, Chung MG (2009) More secure remote user authentication scheme. Comput Commun 32:1018–1021

    Article  Google Scholar 

  6. Song R (2010) Advanced smart card based password authentication protocol. Comput Stand Interfaces 32:321–325

    Article  Google Scholar 

  7. Li X, Niu J, Khan MK, Liao J (2013) An enhanced smart card based remote user password authentication scheme. J Netw Comput Appl 36:1365–1371

    Article  Google Scholar 

  8. Li CT (2013) A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card. IET Inf Secur 7:3–10

    Article  Google Scholar 

  9. Yu PL, Sadler BM (2011) MIMO authentication via deliberate fingerprinting at the physical layer. IEEE Trans Inf Forensics Secur 6:606–615

    Article  Google Scholar 

  10. Kim DJ, Chung KW, Hong KS (2010) Person authentication using face, teeth and voice modalities for mobile device security. IEEE Trans Consum Electron 56:2678–2685

    Article  Google Scholar 

  11. Huang X, Xiang Y, Chonka A, Zhou J, Deng RH (2011) A generic framework for three-factor authentication: preserving security and privacy in distributed systems. IEEE Trans Parallel Distrib Syst 22:1390–1397

    Article  Google Scholar 

  12. Li X, Niu J, Wang Z, Chen C (2014) Applying biometrics to design three-factor remote user authentication scheme with key agreement. Secur Commun Netw 7:1488–1497

    Google Scholar 

  13. Yu J, Wang G, Mu Y, Gao W (2014) An efficient generic framework for three-factor authentication with provably secure instantiation. IEEE Trans Inf Forensics Secur 9:2302–2313

    Article  Google Scholar 

  14. Zhao Q (2009) Technique, method, and system for card holder authentication. Tokugan 2009–144420

  15. Zhao Q, Akatsuka M, Hsieh CH (2012) Generating facial images for steganography based on IGA and image morphing. IEEE Int Conf Syst Man Cybern 364–369

  16. Zhao Q, Hsieh CH (2011) Card user authentication based on generalized image morphing. The 3rd Int Conf Aware Sci Technol 117–122

  17. Beier T, Neely S (1992) Feature-based image metamorphosis. Proc 19th Annu Conf Comput Gr Interact Tech 35–42

  18. Wolberg G (1989) Skeleton-based image warping. Vis Comput 5:95–108

    Article  Google Scholar 

  19. Zhu L, Yang Y, Haker S, Tannenbaum A (2007) An image morphing technique based on optimal mass preserving mapping. IEEE Trans Image Process 16:1481–1495

    Article  MathSciNet  Google Scholar 

  20. Mao Q, Bharanitharan K, Chang CC (2010) Edge directed automatic control point selection algorithm for image morphing. IETE Tech Rev 30:343–243

    Google Scholar 

  21. Mao Q, Chang CC, Harn L, Chang SC (2015) An image-based key agreement protocol using the morphing technique. Multimed Tools Appl 74:3207–3229

    Article  Google Scholar 

  22. Mao Q, Bharanitharan K, Chang CC (2014) A proxy user authentication protocol using source-based image morphing. Comput J. doi:10.1093/comjnl/bxu094

    Google Scholar 

  23. AT&T face database, http://www.cl.cam.ac.uk/research/dtg/attarchive/facedatabase.html

  24. Yale face database, http://cvc.yale.edu/projects/yalefaces/yalefaces.html

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chin-Chen Chang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, Y., Chang, CC. A one-card-pass user authentication scheme using image morphing. Multimed Tools Appl 76, 21247–21264 (2017). https://doi.org/10.1007/s11042-016-4077-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-4077-8

Keywords

Navigation