Advertisement

A Simple Auditable Fingerprint Authentication Scheme Using Smart-Contracts

  • Xiaohu Zhou
  • Yousif Hafedh
  • Yonghao Wang
  • Vitor Jesus
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11373)

Abstract

Biometric authentication, and notably using fingerprints, are now common. Despite its usability, biometrics have however a caveat which is the impossibility of revocation: once the raw fingerprint is breached, and depending on the technology of the reader, it is impossible to stop an illegitimate authentication. This places a focus on auditing both to detect fraud and to have clear indications that the fingerprint has been breached. In this paper we show how to take advantage of the immutability property of Blockchains to design an auditable protocol based on Diffie-Hellman key exchange with applications to fingerprint authentication.

Keywords

Biometrics Authentication Security Blockchains Smart-contracts Auditing 

References

  1. 1.
    Jain, A.K., Nandakumar, K.: Biometric authentication: system security and user privacy. IEEE Comput. 45, 87–92 (2012)CrossRefGoogle Scholar
  2. 2.
    Ratha, N.K., Chikkerur, S., Connell, J.H., Bolle, R.M.: Generating cancelable fingerprint templates. IEEE Trans. Pattern Anal. Mach. Intell. 29(4), 561–572 (2007)CrossRefGoogle Scholar
  3. 3.
    Abreu, P., Aparicio, M., Costa, C.: Blockchain technology in the auditing environment. Caceres, CISTI (2018)Google Scholar
  4. 4.
    Pakutharivu, P., Srinath, M.V.: A Comprehensive survey on fingerprint recognition systems. Indian J. Sci. Technol. 8(35), 1–7 (2015)CrossRefGoogle Scholar
  5. 5.
    Meng, W., Wong, D.S., Furnell, S., Zhou, J.: Surveying the development of biometric user authentication on mobile phones. IEEE Commun. Surv. Tutor. 17(3), 1268–1293 (2015)CrossRefGoogle Scholar
  6. 6.
    Hammudoglu, J.S., et al.: Portable trust: biometric-based authentication and blockchain storage for self-sovereign identity systems, June 2017. http://cn.arxiv.org/pdf/1706.03744
  7. 7.
    Nandakumar, K., Ratha, N., Pankanti, S., Darnell, S.: Secure one-time biometric tokens for non-repudiable multi-party transactions. In: IEEE Workshop on Information Forensics and Security (WIFS), December 2017, Rennes, France (2017)Google Scholar
  8. 8.
    Vazan, R.: SourceAFIS. https://sourceafis.machinezoo.com. Accessed 26 Sept 2018

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  • Xiaohu Zhou
    • 1
  • Yousif Hafedh
    • 1
  • Yonghao Wang
    • 1
  • Vitor Jesus
    • 1
  1. 1.School of Computing and Digital TechnologyBirmingham City UniversityBirminghamUK

Personalised recommendations