A Novel Hybrid Crypto-Biometric Authentication Scheme for ATM Based Banking Applications

  • Fengling Han
  • Jiankun Hu
  • Xinhuo Yu
  • Yong Feng
  • Jie Zhou
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3832)


This paper studies the smartcard based fingerprint encrytion/auth-entication scheme for ATM banking systems. In this scheme, the system authenticates each user by both his/her possession (smartcard) and biometrics (fingerprint). A smartcard is used for the first layer of authentication. Based on the successful pass of the first layer authentication, a subsequent process of the biometric fingerprint authentication proceeds. The proposed scheme is fast and secure. Computer simulations and statistical analyze are presented.


Smart Card Authentication Scheme Authentication Protocol Image Encryption Encrypt Image 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Soutar, C., Roberge, D., Stoianov, A., Gilory, R., Kumar, B.V.: Biometric encryption,
  2. 2.
    Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.K.: Biometric cryptosystems: Issue and challenges. Proceedings of the IEEE 92, 948–960 (2004)CrossRefGoogle Scholar
  3. 3.
    Jain, A.K., Prabhakar, S., Hong, L., Pankanti, S.: Filterbank-based fingerprint matching. IEEE Trans. on Image Processing 9, 846–859 (2000)CrossRefGoogle Scholar
  4. 4.
    Lee, J.K., Ryu, S.R., Yoo, K.Y.: Fingerprint-based remote user authentication scheme using smart cards. Electronics Lett. 38, 554–555 (2002)CrossRefGoogle Scholar
  5. 5.
    Clancy, T.C., Kiyavash, N., Lin, D.J.: Secure smartcard-based fingerprint authentication. In: ACM workshop on Biometric Methods and Applications, Berkeley, California (November 2003)Google Scholar
  6. 6.
    Waldmann, U., Scheuermann, D., Eckert, C.: Protect transmission of biometric user authentication data for oncard-matching. In: ACM symp. on Applied Computing, Nicosia, Cyprus (March 2004)Google Scholar
  7. 7.
    Jain, A.K., Prabhakar, S., Hong, L.: A multichannel approach to fingerprint classification. IEEE Trans. on Pattern Anal. Machine Intell. 21, 348–359 (1999)CrossRefGoogle Scholar
  8. 8.
    Kocarev, L., Jakimoski, G., Stojanovski, T., Parlitz, U.: From chaotic maps to encryption schemes. In: Proc. IEEE Sym. Circuits and Syst, Monterey, California, June 1998, pp. 514–517 (1998)Google Scholar
  9. 9.
    Chen, G., Mao, Y., Chui, C.: A symmetric encryption scheme based on 3D chaotic cat map. Chaos, Solitons & Fractals 21, 749–761 (2004)zbMATHCrossRefMathSciNetGoogle Scholar
  10. 10.
    Fridrich, J.: Symmetric Ciphers Based on two-dimensional chaotic maps. Int. J. Bifurcation and Chaos 8, 1259–1284 (1998)zbMATHCrossRefMathSciNetGoogle Scholar
  11. 11.
    Menezes, A., Oorschot, P., Vanston, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)CrossRefGoogle Scholar
  12. 12.
    Uludag, U., Ross, A., Jain, A.K.: Biometric template selection and update: a case study in fingerprints. Pattern Recognit. 37, 1533–1542 (2004)CrossRefGoogle Scholar
  13. 13.
    Ratha, N.K., Karu, K., Chen, S., Jain, A.K.: A real-time matching system for large fingerprint databases. IEEE Trans. on Pattern Anal. Machine Intell. 18, 799–813 (1996)CrossRefGoogle Scholar
  14. 14.
    Zhou, J., Gu, J.: A model-based method for the computation of fingerprints’ orientation field. IEEE Trans. on Image Processing 13, 821–835 (2004)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Fengling Han
    • 1
  • Jiankun Hu
    • 1
  • Xinhuo Yu
    • 2
  • Yong Feng
    • 2
  • Jie Zhou
    • 3
  1. 1.School of Computer Science and Information TechnologyRoyal Melbourne Institute of TechnologyMelbourneAustralia
  2. 2.School of Electrical and Computer EngineeringRoyal Melbourne Institute of TechnologyMelbourneAustralia
  3. 3.Department of AutomationTsinghua UniversityBeijingChina

Personalised recommendations