A Three Factor Authentication System for Smartcard Using Biometric, Visual Cryptography and OTP

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 324)


In this paper, we use an authentication system that combines Biometrics, Visual cryptography and One-Time password (OTP). We propose a basis matrix construction method for generating shares in visual cryptography technique. Generated shares are in mutually orthogonal groups so that only shares from the same group can reveal the original image. The system provides the user a share of the biometric data and keeps the other share in the server itself. The security of our scheme is based on biometric verification using visual cryptography and hash of a OTP. Therefore, the scheme is appropriate to be used in applications such as smart card and device authentication systems.


Biometrics Visual cryptography Optical character recognition 


  1. 1.
    L. Rila, C.J. Mitchell, Security protocols for biometrics-based cardholder authentication in smartcards, in Proceedings of Applied Cryptography and Network Security, First International Conference, ACNS,(2003)Google Scholar
  2. 2.
    R. Mukeshi, V.J. Subashini,Fingerprint based authentication system using threshold visual cryptographic technique, in IEEE-International Conference on Advances In Engineering, Science And Management,(2012)Google Scholar
  3. 3.
    Chang-Chou Lin, Wen-Hsiang Tsai.: Secret image sharing with steganography and authentication. J. Syst. Softw. 73(3), 405–414 (2004)CrossRefGoogle Scholar
  4. 4.
    M. Naor, A. Shamir, Visual cryptography, in.Advances in Cryptology Eurocrypt 1994, vol.950 (Springer, Heidelberg, 1995), p.1-12Google Scholar
  5. 5.
    J. Abraham, P. Kwan, J. Gao, Fingerprint matching using a hybrid shape and orientation descriptor, State of the art in Biometrics, (2011), p.25-56Google Scholar
  6. 6.
    N. Agrawal, M. Savvides, Biometric data hiding: A 3 factor authentication approach to verify identity with a single image using steganography, encryption and matching, in Proceedings of Computer. Vision.and Pattern Recognition Workshop, (2009) p.85–92Google Scholar
  7. 7.
    A. Rossand, A. Othman, Visual cryptography for biometric privacy, IEEE Transactions on Information Forensics Security, 6(1) (2011)Google Scholar
  8. 8.
    K. Safronov, I. Tchouchenkov, H. Worn, Optical character recognition using optimisation algorithms, In Proceedings of Computer Science and Information Technologies, (Ufa, 2007)Google Scholar

Copyright information

© Springer India 2015

Authors and Affiliations

  1. 1.TIFAC CORE in Cyber SecurityAmrita Vishwa VidyapeethamCoimbatoreIndia

Personalised recommendations