scispace - formally typeset
Open AccessJournal ArticleDOI

Secure biometric template generation for multi-factor authentication

Reads0
Chats0
TLDR
The results prove that the proposed framework does not undermine the discriminating features of genuine and forged signatures and the verification performance is comparable to that of the state-of-the-art benchmark results.
About
This article is published in Pattern Recognition.The article was published on 2015-02-01 and is currently open access. It has received 93 citations till now. The article focuses on the topics: Multi-factor authentication & Challenge–response authentication.

read more

Citations
More filters
Journal ArticleDOI

Surveying the Development of Biometric User Authentication on Mobile Phones

TL;DR: This paper surveys the development of existing biometric authentication techniques on mobile phones, particularly on touch-enabled devices, with reference to 11 biometric approaches and proposes a framework for establishing a reliable authentication mechanism through implementing a multimodal biometric user authentication in an appropriate way.
Journal ArticleDOI

Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes.

TL;DR: The key goals of this study are to highlight the various security vulnerabilities of IoT-based smart homes, to present the risks on home inhabitants, and to propose approaches to mitigating the identified risks.
Journal ArticleDOI

Multi-factor authentication: A survey

TL;DR: The already available and emerging sensors (factor providers) that allow for authenticating a user with the system directly or by involving the cloud are surveyed and a framework for qualifying the missing factors by authenticating the user without disclosing sensitive biometric data to the verification entity is proposed.
Journal ArticleDOI

A High-Security EEG-Based Login System with RSVP Stimuli and Dry Electrodes

TL;DR: A novel EEG-based authentication system is presented, which is based on the rapid serial visual presentation paradigm and uses a knowledge-based approach for authentication.
Journal ArticleDOI

Security framework for industrial collaborative robotic cyber-physical systems

TL;DR: A security framework based on a two-pronged strategy where the impact of this methodology is demonstrated on a teleoperation benchmark (NeCS-Car) and includes enhanced data security at important interconnected adaptor nodes and development of an intelligent module that employs a concept similar to system health monitoring and reconfiguration.
References
More filters
Book

Compressed sensing

TL;DR: It is possible to design n=O(Nlog(m)) nonadaptive measurements allowing reconstruction with accuracy comparable to that attainable with direct knowledge of the N most important coefficients, and a good approximation to those N important coefficients is extracted from the n measurements by solving a linear program-Basis Pursuit in signal processing.
Book

Handbook of Fingerprint Recognition

TL;DR: This unique reference work is an absolutely essential resource for all biometric security professionals, researchers, and systems administrators.
Journal ArticleDOI

For most large underdetermined systems of linear equations the minimal 1-norm solution is also the sparsest solution

TL;DR: In this article, the authors consider linear equations y = Φx where y is a given vector in ℝn and Φ is a n × m matrix with n 0 so that for large n and for all Φ's except a negligible fraction, the solution x1of the 1-minimization problem is unique and equal to x0.
Journal ArticleDOI

A Simple Proof of the Restricted Isometry Property for Random Matrices

TL;DR: In this article, the authors give a simple technique for verifying the restricted isometry property for random matrices that underlies compressive sensing, and obtain simple and direct proofs of Kashin's theorems on widths of finite balls in Euclidean space.
Journal ArticleDOI

Physical one-way functions

TL;DR: The concept of fabrication complexity is introduced as a way of quantifying the difficulty of materially cloning physical systems with arbitrary internal states as primitives for physical analogs of cryptosystems.
Related Papers (5)
Frequently Asked Questions (11)
Q1. What contributions have the authors mentioned in the paper "Secure biometric template generation for multi-factor authentication" ?

To solve this problem, the authors present a novel framework that applies random projections to biometric data ( inherence factor ), using secure keys derived from passwords ( knowledge factor ), to generate inherently secure, efficient and revocable/renewable biometric templates for users ’ verification. The authors also undertake a case study of deploying the proposed framework in a two-factor authentication setup that uses users ’ passwords and dynamic handwritten signatures. The authors have evaluated the performance of the framework on three publicly available signatures datasets. 

Due to the trade-off between security and performance levels, a decrease in system efficiency is expected after the arithmetic hashing. 

When RIP is satisfied, minimum `1 norm solution of an under-determined system of linear equations is also the sparsest solution [9]:α̂ = argmin α ‖ α ‖1Algorithms like greedy search and convex relaxation techniques are usually used to solve such problems. 

Biometrics of different users can be modeled as statistically independent variables such that given data of two users - D1 and D2 - joint probability can be expressed as pD1,D2 (D1,D2) = pD1 (D1)pD2 (D2). 

The three different types of elements (known as factors) can be used for authentication of a user’s identity are the ownership, knowledge and inherence factors. 

in the fact that signals do not loose discrimination ability when their rate of change is calculated, rather such a calculation is often helpful in increasing the discriminating ability of signals. 

The main reason why performance remains unaffected is the distance preserving transformation (Section 3.2.1) followed by the differential and decimation (low-pass) filters which keep the distinctive features of time-varying signals. 

This t-sparse solution is given by 1 :x̂ = argmin Rz=u ‖ z ‖1`1 minimization is a convex optimization problem and can be efficiently solved using linear programming methods. 

2. It can be shown that if the matrix R satisfies concentration inequality for JL-Lemma then it is highly probable that it would also satisfy (t, )-RIP for t < c′ 2k/log(d) [5]. 

A successful security mechanism will protect the privacy of a genuine subject by concealing its original biometric data from an intruder as well as the verification server. 

To solve the above mentioned security issues with biometric templates, the authors have employed an ‘easy to compute’ and ‘difficult to invert’ one way funtion.