Skip to main content

From Features Extraction to Strong Security in Mobile Environment: A New Hybrid System

  • Conference paper
On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops (OTM 2006)

Abstract

This article describes a complete original biometric system named Tactim based on the skin reaction coupled with security concepts. Even if the experiments showed that there is much work left, our approach has many advantages. Security and biometry are strongly linked together, the biometric features are original and strongly depend of the user’s will, it can be easily interfaced to existing systems, so we finally propose a way to integrate this system in a Service Oriented Architecture and analyze its advantages and drawbacks.

An erratum to this chapter can be found at http://dx.doi.org/10.1007/11915034_125.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Rila, L., Mitchell, C.J.: Security analysis of smartcard to card reader communications for biometric cardholder authentication. In: Proc. 5th Smart Card Research and Advanced Application Conference (CARDIS 2002), pp. 19–28. USENIX Association, San Jose, California (2002)

    Google Scholar 

  2. Bovenlander, E., van Renesse, R.L.: Smartcards and Biometrics: An Overview. In: Computer Fraud and Security Bulletin, pp. 8–12 (1995)

    Google Scholar 

  3. Rila, L.: Denial of Access in Biometrics-Based Authentication Systems. In: Infrastructure Security: International Conference (InfraSec 2002), Bristol, UK, October 1-3, pp. 19–29 (2002)

    Google Scholar 

  4. Li, Y.-P.: Biometric technology overview. Nuclear Science and Techniques 17(2), 97–105 (2006)

    Article  Google Scholar 

  5. Barral, C., Coron, J.-S., Naccache, D.: Externalized Fingerprint Matching. In: Zhang, D., Jain, A.K. (eds.) ICBA 2004. LNCS, vol. 3072, pp. 215–309. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  6. Hachez, G., Koeune, F., Quisquater, J.: Biometrics, Access Control, Smart Cards: A Not So Simple Combination. In: Proc. fourth working conference on smart card research and advanced applications on Smart card research and advanced applications, pp. 273–288 (2001)

    Google Scholar 

  7. Nilsson, J., Harris, M.: Match-on-Card for Java Cards. White paper, Precise Biometrics (2004)

    Google Scholar 

  8. Teoh Beng Jin, A., Ngo Chek Ling, D., Alwyn Goh, A.: Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recognition 37(11), 2245–2255 (2004)

    Article  Google Scholar 

  9. Cheung, K.H., Kong, A., Zhang, D., Kamel, M., You, J.: Revealing the Secret of FaceHashing. In: ICB 2006, pp. 106–112 (2006)

    Google Scholar 

  10. Kong, A., Cheung, K.-H., Zhang, D., Kamel, M., You, J.: An analysis of BioHashing and its variants. Pattern Recognition 39(7), 1359–1368 (2006)

    Article  MATH  Google Scholar 

  11. Bolle, R.M., Connell, J.H., Ratha, N.K.: Biometric perils and patches. Pattern Recognition 35(12), 2727–2738 (2002)

    Article  MATH  Google Scholar 

  12. Peyravian, M., Matyas, S.M., Roginsky, A., Zunic, N.: Generating user-based cryptographic keys and random numbers. Computers & Security 18(7), 619–626 (1999)

    Article  Google Scholar 

  13. Monrose, F., Reiter, M.K., Wetzel, S.: Password Hardening based on Keystroke Dynamics. International Journal of Information Security 1(1), 69–83 (2001)

    Google Scholar 

  14. Monrose, F., Reiter, M.K., Li, Q., Wetzel, S.: Using voice to generate cryptographic keys. In: Proc. of Odyssey 2001, The speaker recognition workshop, pp. 237–242 (2001)

    Google Scholar 

  15. Sweeney, P.: Error Control Coding - From theory to practice. Wiley, Chichester (2002)

    Google Scholar 

  16. Hao, F., Anderson, R., Daugman, J.: Combining cryptography with biometrics effectively. Technical Report UCAM-CL-TR-640 (2005)

    Google Scholar 

  17. Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523–540. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  18. Tuyls, P., Goseling, J.: Capacity and Examples of Template-Protecting. In: Maltoni, D., Jain, A.K. (eds.) BioAW 2004. LNCS, vol. 3087, pp. 158–170. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  19. Teoh, A.B.J., Ngo, D.C.L., Goh, A.: Personalised cryptographic key generation based on FaceHashing. Computers & Security 23(7), 606–614 (2004)

    Article  Google Scholar 

  20. Endrei, M., Ang, J., Arsanjani, A., Sook, C., Compte, P., Luo, M., Newling, T. (eds.): Patterns: Service-Oriented Architecture and Web Services. IBM redbook (2004) ISBN:073845317X

    Google Scholar 

  21. Malayath, N., Hermansky, H.: Data-driven spectral basis functions for automatic speech recognition. Speech Communication 40(4), 449–466 (2003)

    Article  Google Scholar 

  22. Booth, I., Barlow, M., Warson, B.: Enhancements to DTW and VQ decision algorithms for speaker recognition. Speech Communication 13(4), 427–433 (1993)

    Article  Google Scholar 

  23. McAulay, R., Quatieri, T.: Speech Analysis Synthesis Based on a Sinusoidal Representation. IEEE Transactions on Acoustics, Speech and Signal Processing 34, 744–754 (1986)

    Article  Google Scholar 

  24. Brouard, T.: Contribution of dermo-science to secure personal electronic identification. In: 5th world conference and exhibition on the practical application of biometrics (Biometrics 2002) (2002)

    Google Scholar 

  25. Daugman, J.: Biometric decision landscapes. Technical Report UCAM-CL-TR-482 (2000)

    Google Scholar 

  26. Jain, A., Pankanti, S., Prabhakar, S., Hong, L., Ross, A.: Biometrics: A Grand Challenge. ICPR 2, 935–942 (2004)

    Google Scholar 

  27. Bruck, J., Naor, M.: The hardness of decoding linear codes with preprocessing. IEEE Trans. Inform. Theory, 381–385 (1990)

    Google Scholar 

  28. Nunes, S.: DGOV - A secure and generic services platform for the e-Government. Master Thesis (in preparation)

    Google Scholar 

  29. Cauchie, S., Brouard, T., De sousa, S.: Deux approches de l’acquisition et du traitement d’un signal biométrique cutané. In: Proc. of Capteurs 2005, pp. 101–111 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cauchie, S., Brouard, T., Cardot, H. (2006). From Features Extraction to Strong Security in Mobile Environment: A New Hybrid System. In: Meersman, R., Tari, Z., Herrero, P. (eds) On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops. OTM 2006. Lecture Notes in Computer Science, vol 4277. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11915034_72

Download citation

  • DOI: https://doi.org/10.1007/11915034_72

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-48269-7

  • Online ISBN: 978-3-540-48272-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics