IJCNIS Vol. 5, No. 12, 8 Oct. 2013
Cover page and Table of Contents: PDF (size: 252KB)
Full Text (PDF, 252KB), PP.80-90
Views: 0 Downloads: 0
Biometrics, Cryptographic, E-Passport, Face, Fingerprint, Palm print, Iris
The biometric passports are to prevent the illegal entry of traveler into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. This IC chip is integrated into the cover of a passport, called a biometric passport. Biometric Passports have been introduced in many countries to improve the security in Inspection Systems and enhance procedures and systems that prevent identity and passport fraud. The electronic passport is the privacy and security risks that arise by embedding with biometric technology. The goal of the adoption of the biometric passport is not only to expedite processing at border crossings, but also to increase security. Policymakers have put their faith in the technological promise of biometric identification because absolute identification could eliminate mismatched computer records and stolen identities.
V.K. Narendira Kumar, B. Srinivasan, "Design and Development of Biometrics Secure Person Detection System for E-Passport using Cryptographic Security Protocols", International Journal of Computer Network and Information Security(IJCNIS), vol.5, no.12, pp.80-90, 2013. DOI:10.5815/ijcnis.2013.12.10
[1]Ari Juels, Paul Syverson, and Dan Bailey, "High-power proxies for enhancing RFID privacy and utility", Workshop on Privacy Enhancing Technologies (PET 2005), May 2005.
[2]G. Avoine. "Cryptography in Radio Frequency Identification and Fair Exchange Protocols", PhD thesis, EPFL, Lausanne, Switzerland, December 2005.
[3]G. Tsudik, "YA-TRAP: Yet Another Trivial RFID Authentication Protocol", In International Conference on Pervasive Computing and Communications, Pisa, Italy, March 2006. IEEE, IEEE Computer Society Press. 2006.
[4]C.Hesher, A.Srivastava, G.Erlebacher, "A novel technique for face recognition using range images" in the Proceedings of Seventh International Symposium on Signal Processing and Its Application, 2007.
[5]G. Tsudik, "A family of dunces: Trivial RFID identification and authentication protocols", In Privacy Enhancing Technologies 7th International Symposium, PET 2007, Ottawa, Canada, June 20-22, 2007: Revised Selected Papers, volume 4776, page 45. Springer, 2007.
[6]D. Monar, A. Juels, and D. Wagner, "Security and privacy issues in e-passports", Cryptology ePrint Archive, Report 2005/095, 2008.
[7]HOME AFFAIRS JUSTICE, "EU standard specifications for security features and biometrics in passports and travel documents", Technical report, European Union, 2008.
[8]J. Wu and D. R. Stinson, "A Highly Scalable RFID Authentication Protocol", In Proceedings of the 14th Australia Conference on Information Security and Privacy, Brisbane, Australia, July 2009.
[9]Inoue, S. and Yasuura, H., " RFID Privacy using user-controllable uniqueness", In Proceedings of RFID Privacy Workshop, MIT, MA, USA. 2010.
[10]Klaus Finkenzeller. RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification. John Wiley & Sons, Ltd, 2010.
[11]Riscure Security Lab, "E-passport privacy attack", at the Cards Asia Singapore, April 2011.
[12]M. Lehtonen, F. Michahelles, T. Staake, and E. Fleisch. Strengthening the Security of Machine Readable Documents by Combining RFID and Optical Memory Devices. In Int. Conf. on Ambient Intelligence Development – Amid'06, 2011.
[13]M.R. Rieback, G.N. Gaydadjiev, B. Crispo, R.F.H. Hofman, A.S. Tanenbaum. "A Platform for RFID Security and Privacy Administration" 20th USENIX/SAGE Large Installation System Administration conference (LISA 2006), Washington DC, December 2012.
[14]Stephen A. Weis. Security and Privacy in Radio-Frequency Identification Devices. Master's thesis, Massachusetts Institute of Technology, Cambridge, MA, USA, May 2012.