A multibiometric cryptosystem for user authentication in client-server networks

Computer Networks - Tập 181 - Trang 107427 - 2020
Faezeh Sadat Babamir1,2, Mürvet Kırcı1
1Istanbul Technical University, Maslak, Turkey
2Nit Metal A. Ş. Company, R&D&I Department, Istanbul,Turkey.

Tài liệu tham khảo

Abaza, 2013, A survey on ear biometrics, ACM Comput. Surv., 45, 22, 10.1145/2431211.2431221 Butt, 2014, Privacy protection of biometric templates, 434, 153 Jain, 2011 Upmanyu, 2010, Blined authentication: a secure crypto-biometric verification protocol, IEEE Trans. Inf. Forens. Secur., 10, 10.1109/TIFS.2010.2043188 Kirci, 2017, A digest-based method for efficiency improvement of security in biomterical cryptography authentication, 30 I. Piskunov, “HTTPS encryption attacks on authentication in remote banking services – a Russian perspective” white-paper, wwww.cryptomathic.com, 2017. Ratha, 2001, Enhancing security and privacy in biometrics-based authentication systems, IBM Syst. J., 40, 614, 10.1147/sj.403.0614 Rane, 2013, Secure biometrics: concepts, authentication architectures and challenges, IEEE Signal Process. Mag., 30, 51, 10.1109/MSP.2013.2261691 Nandakumar, 2015, Biometric template protection: bridging the performance gap between theory and practice, IEEE Signal Process. Mag., 32, 88, 10.1109/MSP.2015.2427849 Rathgeb, 2012 Bringer, 2013, Privacy-preserving biometric identification using secure multiparty computation: an overview and recent trends, IEEE Signal Process. Mag., 30, 42, 10.1109/MSP.2012.2230218 Hadid, 2015, Biometrics systems under spoofing attack: an evaluation methodology and lessons learned, IEEE Signal Process. Mag., 32, 20, 10.1109/MSP.2015.2437652 Patel, 2015, Cancelable biometrics: a review, IEEE Signal Process. Mag., 32, 54, 10.1109/MSP.2015.2434151 Lim, 2015, Biometric feature-type transformation: making templates compatible for secret protection, IEEE Signal Process. Mag., 32, 77, 10.1109/MSP.2015.2423693 Wu, 2008, ‘A cryptosystem based on palmprint feature, 1 Nandakumar, 2010, ‘A fingerprint cryptosystem based on minutiae phase spectrum, 1 van der Veen, 2006, Face biometrics with renewable templates, Proc. SPIE, 205 Angeliki Toli, 2018, Privacy-preserving multibiometric authentication in cloud with untrusted database providers, IACR Cryptol. ePrint Archive, 2018, 359 Babamir F.S., Kirci M., Digest: a biometric authentication protocol in wireless sensor network, IntechOpen,doi:10.5772/intechopen.83460. ISO 24745: Biometric information protection. www.iso.org. Babamir, 2019, Dynamic digest based authentication for client-server systems using biometric verification, Fut. Gener. Comput. Netw., 101, 112, 10.1016/j.future.2019.05.025 W.Floyd, 1967, Nondeterministic algorithms, J. ACM, 636, 10.1145/321420.321422 Goldreich, 2003 Babamir, 2019, Improvement of digest based authentication for biometric verification, Proc. ISCISC, 9 Katz, 2008 Trappe, 2006 Ngo, 2015 Babamir, 2014, Achieving key privacy and invisibility for unattended wireless sensor networks in healthcare, Comput. J., 57, 624, 10.1093/comjnl/bxt046 Nandakumar, 2015, Biometric template protection: bridging the performance gap between theory and practice, IEEE Signal Process. Mag., 32, 88, 10.1109/MSP.2015.2427849 Babamir F.S., Eslami Z., Data security in unattended wireless sensor networks through aggregate signcryption 6 (11) 2940–2955, doi:10.3837/tiis.2012.10.011. Scneier, 1996 Aly, 2015 Odelu, 2015, A secure biometrics-based multi-server authentication protocol using smart cards, IEEE Trans. Inf. Forens. Secur., 10, 1953, 10.1109/TIFS.2015.2439964 Simoens, 2012, A framework for analyzing template security and privacy in biometric authentication systems, IEEE Trans. Inf. Forens. Secur., 7, 833, 10.1109/TIFS.2012.2184092 2003 http://bias.csr.unibo.it/fvc2004/. Maltoni, 2004, FVC third fingerprint verification competition, 1 Ben-Or, 1988, Completeness theorems for non-cryptographic fault-tolerant distributed computation, 1 Bogetoft, 2009, Secure multiparty computation goes live Damg˚ard, 2012, Multiparty computation from somewhat homomorphic encryption, 7417, 643 Vincenzo Conti, 2012, Fingerprint traits and RSA algorithm fusion technique, 351 Jagadiswary, 2016, Biometric authentication using fused multimodal biometric, 109 M. Shahnawaz Nasir, P. Kuppuswamy Perumal, “Implementation of biometric security using hybrid combination of rsa and simple symmetric key algorithm”, Int. J. Innov. Res. Comput. Commun. Eng.3297(8), 2013. Bayram, 2018, Multibiometric identification by using ear, face, and thermal face, EURASIP J. Image Video Process., 32, 10.1186/s13640-018-0274-x Nagar, 2012, Multibiometric cryptosystems based on feature level fusion, IEEE Trans. Inf. Forens. Secur., 7, 255, 10.1109/TIFS.2011.2166545 Yang, 2012, Performance evaluation of fusing protected fingerprint minutiae templates on the decision level, Sensor-J. Spec. Issue: Hand-Based Biometr. Sens. Syst., 5246 Rathgeb, 2011, Reliability-balanced feature level fusion for fuzzy commitment scheme, 1 Kelkboom, 2009, Multi-algorithm fusion with template protection, 1 Sutcu, 2007, Secure biometric templates from fingerprint-face features, 1 Nandakumar, 2008, Multibiometric template security using fuzzy vault, 1 Jeong, 2006, Changeable biometrics for appearance based face recognition, 1 Benaliouche, 2014, Comparative study of multimodal biometric recognition by fusion of iris and fingerprint, Sci. World J., 10.1155/2014/829369 Giot, 2013, Fast computation of the performance evaluation of biometric systems: application to multibiometric Powers, 2011, Evaluation: from precision, recall and f-measure to ROC, informedness, markedness && correlation, J. Mach. Learn. Technol., 2, 37 Elahi, 2018, Identification of essential proteins based on a new combination of topological and biological features in weighted protein–protein interaction networks, IET Syst. Biol., 12, 247, 10.1049/iet-syb.2018.5024 A. J. Mansfield, J. L. Wayman, “Best practices in testing and reporting performance of biometric devices”, NPL report, 2002. Lu, 2015, A biometrics and smart cards-based authentication scheme for multi-server environments, Secur. Commun. Netw., 10.1002/sec.1246 Cao, 2015, Analysis and improvement of a multi-factor biometric authentication scheme, Secur. Commun. Netw., 8, 617, 10.1002/sec.1010 Wang, 2016, Cryptanalysis and improvement of a biometric-based multi-server authentication and key agreement scheme, PLoS ONE, 11, 10.1371/journal.pone.0149173 Park, 2017, Security analysis and enhancements of an improved multi-factor biometric authentication scheme, Int. J. Distrib. Sens. Netw., 13, 10.1177/1550147717724308