A Note on Biometrics-based Authentication with Portable Device

نویسندگان

  • Shinsuke Ohtsuka
  • Satoshi Kawamoto
  • Shigeru Takano
  • Kensuke Baba
  • Hiroto Yasuura
چکیده

Individual authentication technologies are essential for electronic systems as social infrastructures. Especially, biometrics-based authentication has been receiving increasing attention and is expected to be implemented on systems with portable devices such as mobile phones for realizing more useful services. The most important problem in biometrics-based authentication is to prevent a leakage of biological information. This paper focuses on the leakage which enables a spoofing and consider two cases, a leakage from data stored in a server for verification of biological information and a leakage by a cheating detection. This paper proposes a solution by applying a function to biological information and shows the properties required for the function to solve the problem. Moreover, this paper proposes an idea of biometrics-based authentication system with portable devices which is provided a function to capture biological information. keywords: Biometrics, authentication, mobile system, spoofing.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines

Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...

متن کامل

Authentication Algorithm for Portable Embedded Systems using PUFs

Physical Unclonable Functions (PUFs) are circuits that exploit chip-unique features to be used as signatures which can be used as good silicon biometrics. These signatures are based on semiconductor fabrication variations that are very difficult to control or reproduce. These chipunique signatures together with strong challenge-response authentication algorithm can be used to authenticate and s...

متن کامل

3D Median Filter Design for Iris Recognition

In many applications user authentication has to be carried out by portable devices. These kinds of devices must deal with constraints like computational performance, power consumption while also maintaining high performance rates in the authentication process. This paper provides solutions to designing such personal tokens where biometric authentication is required. In this paper, a 3D median f...

متن کامل

DWT Domain On-Line Signature Verification

Biometrics attracts attention since person authentication becomes very important in networked society. As the biometrics, the fingerprint, iris, face, ear, vein, gate, voice and signature are well known and are used in various applications (Jain et al., 1999; James et al., 2005). Especially, assuming mobile access using a portable terminal such as a personal digital assistant (PDA), a camera, m...

متن کامل

Biometric Authentication of Fingerprint for Banking Users, Using Stream Cipher Algorithm

Providing banking services, especially online banking and electronic payment systems, has always been associated with high concerns about security risks. In this paper, customer authentication for their transactions in electronic banking has been discussed, and a more appropriate way of using biometric fingerprint data, as well as encrypting those data in a different way, has been suggest...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008