Secure Cryptosystem with Blind Authentication

Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 131)

Abstract

Biometric authentication systems are primarily centered on template security, revocability, and privacy. The use of cryptographic primitives to enhance the authentication process addressed some of these concerns shown by biometric cryptosystems. The most common computer authentication method is to use alphanumerical usernames and passwords. This method has significant drawbacks. For example, users tend to pick passwords that can be easily guessed. On the other hand, if a password is hard to guess, then it is often hard to remember. In this paper work, we propose a provably secure and blind biometric authentication protocol, which addresses the concerns of user’s privacy, template protection, and trust issues.

Keywords

Blind RSA Template Privacy 

References

  1. 1.
    Upmanyu M, Namboodiri AM, Srinathan K, Jawahar CV (2004) Blind Authentication. IEEE Trans Inf Forensics Secur 5(2)Google Scholar
  2. 2.
    Ratha N, Chikkerur S, Connell J, Bolle R (2007) Generating cancelable fingerprint templates. IEEE Trans Pattern Anal Mach Intell 29(4):561–572Google Scholar
  3. 3.
    Savvides M, Kumar BV (2004) Cancellable biometric filters for face recognition. Int Conf Pattern Recogn (ICPR) 3:922–925Google Scholar
  4. 4.
    Kong A, Cheung K, Zhang D, Kamel M, You J (2006) An analysis of biohashing and its variants. Pattern Recogn 39(7):1359–1368Google Scholar
  5. 5.
    Biddle R, Chiasson S, van Oorschot PC (2009) Graphical passwords: learning from the first generation version: October 2 Technical report TR-09-09. Carleton University, Ottawa, Canada, School of Computer ScienceGoogle Scholar
  6. 6.
    Jain AK, Nandakumar K, Nagar A (2008) Biometric template security. EURASIP 8(2):1–17Google Scholar
  7. 7.
    Upmanyu M, Namboodiri AM, Srinathan K, Jawahar CV (2009) Efficient biometric verification in the encrypted domain. In: 3rd International conference biometrics, pp 906–915Google Scholar
  8. 8.
    Uludag U, Pankanti S, Prabhakar S, Jain AK (2004) Biometriccryptosystems: issues and challenges. Proc IEEE 92(6):948–960Google Scholar
  9. 9.
    Teoh A, Jin B, Connie T, Ngo D, Ling C (2006) Remarks on bioHash and its mathematical foundation. Inf Process Lett 100(4):145–150Google Scholar
  10. 10.
    Boult T, Scheirer W, Woodworth R (2007) Revocable fingerprint biotokens: accuracy and security analysis. In: IEEE conference computer vision and pattern recognition (CVPR), pp 1–8Google Scholar
  11. 11.
    Suo X, Zhu Y, Scott G Graphical passwords: A survey. Owen Department of Computer Science Georgia State University xsuo@student.gsu.edu, yzhu@cs.gsu.edu, owen@siggraph.orgGoogle Scholar
  12. 12.
    Bansal R, Sehgal P, Bedi P (2010) Effective morphological extraction of true fingerprint minutiae based on the hit or miss transform. Int J Biometrics Bioinform (IJBB) 4(2):71–85Google Scholar
  13. 13.
    Kaur M, Singh M, Girdhar A, Sandhu PS (2008) Fingerprint verification system using minutiae extraction technique. World Acad Sci Eng Technol 46:497–502Google Scholar

Copyright information

© Springer Science+Business Media New York 2013

Authors and Affiliations

  1. 1.Department of Computer EngineeringPillai’s Institute of Information TechnologyNavi MumbaiIndia

Personalised recommendations