Abstract
This article describes a complete original biometric system named Tactim based on the skin reaction coupled with security concepts. Even if the experiments showed that there is much work left, our approach has many advantages. Security and biometry are strongly linked together, the biometric features are original and strongly depend of the user’s will, it can be easily interfaced to existing systems, so we finally propose a way to integrate this system in a Service Oriented Architecture and analyze its advantages and drawbacks.
An erratum to this chapter can be found at http://dx.doi.org/10.1007/11915034_125.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Rila, L., Mitchell, C.J.: Security analysis of smartcard to card reader communications for biometric cardholder authentication. In: Proc. 5th Smart Card Research and Advanced Application Conference (CARDIS 2002), pp. 19–28. USENIX Association, San Jose, California (2002)
Bovenlander, E., van Renesse, R.L.: Smartcards and Biometrics: An Overview. In: Computer Fraud and Security Bulletin, pp. 8–12 (1995)
Rila, L.: Denial of Access in Biometrics-Based Authentication Systems. In: Infrastructure Security: International Conference (InfraSec 2002), Bristol, UK, October 1-3, pp. 19–29 (2002)
Li, Y.-P.: Biometric technology overview. Nuclear Science and Techniques 17(2), 97–105 (2006)
Barral, C., Coron, J.-S., Naccache, D.: Externalized Fingerprint Matching. In: Zhang, D., Jain, A.K. (eds.) ICBA 2004. LNCS, vol. 3072, pp. 215–309. Springer, Heidelberg (2004)
Hachez, G., Koeune, F., Quisquater, J.: Biometrics, Access Control, Smart Cards: A Not So Simple Combination. In: Proc. fourth working conference on smart card research and advanced applications on Smart card research and advanced applications, pp. 273–288 (2001)
Nilsson, J., Harris, M.: Match-on-Card for Java Cards. White paper, Precise Biometrics (2004)
Teoh Beng Jin, A., Ngo Chek Ling, D., Alwyn Goh, A.: Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recognition 37(11), 2245–2255 (2004)
Cheung, K.H., Kong, A., Zhang, D., Kamel, M., You, J.: Revealing the Secret of FaceHashing. In: ICB 2006, pp. 106–112 (2006)
Kong, A., Cheung, K.-H., Zhang, D., Kamel, M., You, J.: An analysis of BioHashing and its variants. Pattern Recognition 39(7), 1359–1368 (2006)
Bolle, R.M., Connell, J.H., Ratha, N.K.: Biometric perils and patches. Pattern Recognition 35(12), 2727–2738 (2002)
Peyravian, M., Matyas, S.M., Roginsky, A., Zunic, N.: Generating user-based cryptographic keys and random numbers. Computers & Security 18(7), 619–626 (1999)
Monrose, F., Reiter, M.K., Wetzel, S.: Password Hardening based on Keystroke Dynamics. International Journal of Information Security 1(1), 69–83 (2001)
Monrose, F., Reiter, M.K., Li, Q., Wetzel, S.: Using voice to generate cryptographic keys. In: Proc. of Odyssey 2001, The speaker recognition workshop, pp. 237–242 (2001)
Sweeney, P.: Error Control Coding - From theory to practice. Wiley, Chichester (2002)
Hao, F., Anderson, R., Daugman, J.: Combining cryptography with biometrics effectively. Technical Report UCAM-CL-TR-640 (2005)
Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523–540. Springer, Heidelberg (2004)
Tuyls, P., Goseling, J.: Capacity and Examples of Template-Protecting. In: Maltoni, D., Jain, A.K. (eds.) BioAW 2004. LNCS, vol. 3087, pp. 158–170. Springer, Heidelberg (2004)
Teoh, A.B.J., Ngo, D.C.L., Goh, A.: Personalised cryptographic key generation based on FaceHashing. Computers & Security 23(7), 606–614 (2004)
Endrei, M., Ang, J., Arsanjani, A., Sook, C., Compte, P., Luo, M., Newling, T. (eds.): Patterns: Service-Oriented Architecture and Web Services. IBM redbook (2004) ISBN:073845317X
Malayath, N., Hermansky, H.: Data-driven spectral basis functions for automatic speech recognition. Speech Communication 40(4), 449–466 (2003)
Booth, I., Barlow, M., Warson, B.: Enhancements to DTW and VQ decision algorithms for speaker recognition. Speech Communication 13(4), 427–433 (1993)
McAulay, R., Quatieri, T.: Speech Analysis Synthesis Based on a Sinusoidal Representation. IEEE Transactions on Acoustics, Speech and Signal Processing 34, 744–754 (1986)
Brouard, T.: Contribution of dermo-science to secure personal electronic identification. In: 5th world conference and exhibition on the practical application of biometrics (Biometrics 2002) (2002)
Daugman, J.: Biometric decision landscapes. Technical Report UCAM-CL-TR-482 (2000)
Jain, A., Pankanti, S., Prabhakar, S., Hong, L., Ross, A.: Biometrics: A Grand Challenge. ICPR 2, 935–942 (2004)
Bruck, J., Naor, M.: The hardness of decoding linear codes with preprocessing. IEEE Trans. Inform. Theory, 381–385 (1990)
Nunes, S.: DGOV - A secure and generic services platform for the e-Government. Master Thesis (in preparation)
Cauchie, S., Brouard, T., De sousa, S.: Deux approches de l’acquisition et du traitement d’un signal biométrique cutané. In: Proc. of Capteurs 2005, pp. 101–111 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Cauchie, S., Brouard, T., Cardot, H. (2006). From Features Extraction to Strong Security in Mobile Environment: A New Hybrid System. In: Meersman, R., Tari, Z., Herrero, P. (eds) On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops. OTM 2006. Lecture Notes in Computer Science, vol 4277. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11915034_72
Download citation
DOI: https://doi.org/10.1007/11915034_72
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-48269-7
Online ISBN: 978-3-540-48272-7
eBook Packages: Computer ScienceComputer Science (R0)