scispace - formally typeset
Book ChapterDOI

Novel Authentication Process of the Smart Cards Using Face and Fingerprint Recognition

G. S. G. N. Anjaneyulu, +1 more
- Vol. 700, pp 2547-2556
Reads0
Chats0
TLDR
Wang et al. as discussed by the authors introduced face authentication for accessing smart cards in addition to the fingerprint mechanism, i.e., first user will be authenticated by verification of face and fingerprint biometrics simultaneously.
Abstract
Recently, many authors proposed different remote user authentication schemes based on fingerprint recognition using smart cards. But no one of the mechanism succeeds to satisfy all the confidence requirements. In this article, first time as a novel step, we are introducing face authentication for accessing smart cards in addition to the fingerprint mechanism, i.e., first user will be authenticated by verification of face and fingerprint biometrics simultaneously. Then, the transactions will be accessible after verification of mutual authentication. For improving security, we have introduced face and fingerprint biometrics user authentication for accessing smart cards. Our scheme is against to security attacks like denial of service, forgery attack, server spoofing attack, and so on.

read more

Citations
More filters
Journal ArticleDOI

New Feature-level Algorithm for a Face-fingerprint Integral Multi-biometrics Identification System

TL;DR: A feature-fusion framework is proposed for attaining better accuracy when identifying individuals for multiple biometrics and underpins the new multi-biometric system as it guides multi- biometric fusion applications at the feature phase for identifying individuals.
References
More filters
Journal ArticleDOI

A public key cryptosystem and a signature scheme based on discrete logarithms

TL;DR: A new signature scheme is proposed, together with an implementation of the Diffie-Hellman key distribution scheme that achieves a public key cryptosystem that relies on the difficulty of computing discrete logarithms over finite fields.
Journal ArticleDOI

A new remote user authentication scheme using smart cards

TL;DR: This work proposes a new remote user authentication scheme using smart cards based on the ElGamal's (1985) public key cryptosystem that can withstand message replaying attack.
Journal ArticleDOI

An efficient remote use authentication scheme using smart cards

TL;DR: This paper proposes an efficient and practical remote user authentication scheme using smart cards that provides the same advantages as that of Hwang and Li's scheme, but also significantly reduces the communication and computation costs.
Journal ArticleDOI

Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound

TL;DR: In this paper, a security model that can accurately capture the practical capabilities of an adversary is defined and a broad set of twelve properties framed as a systematic methodology for comparative evaluation, allowing schemes to be rated across a common spectrum.
Journal ArticleDOI

A more efficient and secure dynamic ID-based remote user authentication scheme

TL;DR: An enhanced password authentication scheme which still keeps the merits of the original scheme was presented and security analysis proved that the improved scheme is more secure and practical.
Related Papers (5)