Advertisement

From Features Extraction to Strong Security in Mobile Environment: A New Hybrid System

  • Stéphane Cauchie
  • Thierry Brouard
  • Hubert Cardot
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4277)

Abstract

This article describes a complete original biometric system named Tactim based on the skin reaction coupled with security concepts. Even if the experiments showed that there is much work left, our approach has many advantages. Security and biometry are strongly linked together, the biometric features are original and strongly depend of the user’s will, it can be easily interfaced to existing systems, so we finally propose a way to integrate this system in a Service Oriented Architecture and analyze its advantages and drawbacks.

Keywords

Smart Card Authentication Scheme Dynamic Time Warping Mutual Authentication Mobile Environment 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Rila, L., Mitchell, C.J.: Security analysis of smartcard to card reader communications for biometric cardholder authentication. In: Proc. 5th Smart Card Research and Advanced Application Conference (CARDIS 2002), pp. 19–28. USENIX Association, San Jose, California (2002)Google Scholar
  2. 2.
    Bovenlander, E., van Renesse, R.L.: Smartcards and Biometrics: An Overview. In: Computer Fraud and Security Bulletin, pp. 8–12 (1995)Google Scholar
  3. 3.
    Rila, L.: Denial of Access in Biometrics-Based Authentication Systems. In: Infrastructure Security: International Conference (InfraSec 2002), Bristol, UK, October 1-3, pp. 19–29 (2002)Google Scholar
  4. 4.
    Li, Y.-P.: Biometric technology overview. Nuclear Science and Techniques 17(2), 97–105 (2006)CrossRefGoogle Scholar
  5. 5.
    Barral, C., Coron, J.-S., Naccache, D.: Externalized Fingerprint Matching. In: Zhang, D., Jain, A.K. (eds.) ICBA 2004. LNCS, vol. 3072, pp. 215–309. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  6. 6.
    Hachez, G., Koeune, F., Quisquater, J.: Biometrics, Access Control, Smart Cards: A Not So Simple Combination. In: Proc. fourth working conference on smart card research and advanced applications on Smart card research and advanced applications, pp. 273–288 (2001)Google Scholar
  7. 7.
    Nilsson, J., Harris, M.: Match-on-Card for Java Cards. White paper, Precise Biometrics (2004)Google Scholar
  8. 8.
    Teoh Beng Jin, A., Ngo Chek Ling, D., Alwyn Goh, A.: Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recognition 37(11), 2245–2255 (2004)CrossRefGoogle Scholar
  9. 9.
    Cheung, K.H., Kong, A., Zhang, D., Kamel, M., You, J.: Revealing the Secret of FaceHashing. In: ICB 2006, pp. 106–112 (2006)Google Scholar
  10. 10.
    Kong, A., Cheung, K.-H., Zhang, D., Kamel, M., You, J.: An analysis of BioHashing and its variants. Pattern Recognition 39(7), 1359–1368 (2006)MATHCrossRefGoogle Scholar
  11. 11.
    Bolle, R.M., Connell, J.H., Ratha, N.K.: Biometric perils and patches. Pattern Recognition 35(12), 2727–2738 (2002)MATHCrossRefGoogle Scholar
  12. 12.
    Peyravian, M., Matyas, S.M., Roginsky, A., Zunic, N.: Generating user-based cryptographic keys and random numbers. Computers & Security 18(7), 619–626 (1999)CrossRefGoogle Scholar
  13. 13.
    Monrose, F., Reiter, M.K., Wetzel, S.: Password Hardening based on Keystroke Dynamics. International Journal of Information Security 1(1), 69–83 (2001)Google Scholar
  14. 14.
    Monrose, F., Reiter, M.K., Li, Q., Wetzel, S.: Using voice to generate cryptographic keys. In: Proc. of Odyssey 2001, The speaker recognition workshop, pp. 237–242 (2001)Google Scholar
  15. 15.
    Sweeney, P.: Error Control Coding - From theory to practice. Wiley, Chichester (2002)Google Scholar
  16. 16.
    Hao, F., Anderson, R., Daugman, J.: Combining cryptography with biometrics effectively. Technical Report UCAM-CL-TR-640 (2005)Google Scholar
  17. 17.
    Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523–540. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  18. 18.
    Tuyls, P., Goseling, J.: Capacity and Examples of Template-Protecting. In: Maltoni, D., Jain, A.K. (eds.) BioAW 2004. LNCS, vol. 3087, pp. 158–170. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  19. 19.
    Teoh, A.B.J., Ngo, D.C.L., Goh, A.: Personalised cryptographic key generation based on FaceHashing. Computers & Security 23(7), 606–614 (2004)CrossRefGoogle Scholar
  20. 20.
    Endrei, M., Ang, J., Arsanjani, A., Sook, C., Compte, P., Luo, M., Newling, T. (eds.): Patterns: Service-Oriented Architecture and Web Services. IBM redbook (2004) ISBN:073845317X Google Scholar
  21. 21.
    Malayath, N., Hermansky, H.: Data-driven spectral basis functions for automatic speech recognition. Speech Communication 40(4), 449–466 (2003)CrossRefGoogle Scholar
  22. 22.
    Booth, I., Barlow, M., Warson, B.: Enhancements to DTW and VQ decision algorithms for speaker recognition. Speech Communication 13(4), 427–433 (1993)CrossRefGoogle Scholar
  23. 23.
    McAulay, R., Quatieri, T.: Speech Analysis Synthesis Based on a Sinusoidal Representation. IEEE Transactions on Acoustics, Speech and Signal Processing 34, 744–754 (1986)CrossRefGoogle Scholar
  24. 24.
    Brouard, T.: Contribution of dermo-science to secure personal electronic identification. In: 5th world conference and exhibition on the practical application of biometrics (Biometrics 2002) (2002)Google Scholar
  25. 25.
    Daugman, J.: Biometric decision landscapes. Technical Report UCAM-CL-TR-482 (2000)Google Scholar
  26. 26.
    Jain, A., Pankanti, S., Prabhakar, S., Hong, L., Ross, A.: Biometrics: A Grand Challenge. ICPR 2, 935–942 (2004)Google Scholar
  27. 27.
    Bruck, J., Naor, M.: The hardness of decoding linear codes with preprocessing. IEEE Trans. Inform. Theory, 381–385 (1990)Google Scholar
  28. 28.
    Nunes, S.: DGOV - A secure and generic services platform for the e-Government. Master Thesis (in preparation)Google Scholar
  29. 29.
    Cauchie, S., Brouard, T., De sousa, S.: Deux approches de l’acquisition et du traitement d’un signal biométrique cutané. In: Proc. of Capteurs 2005, pp. 101–111 (2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Stéphane Cauchie
    • 1
  • Thierry Brouard
    • 1
  • Hubert Cardot
    • 1
  1. 1.Computer Science Lab.University of ToursToursFrance

Personalised recommendations