IJCNIS Vol. 5, No. 6, 8 May 2013
Cover page and Table of Contents: PDF (size: 307KB)
Full Text (PDF, 307KB), PP.42-48
Views: 0 Downloads: 0
Cryptography, Fuzzy Commitment Scheme, Biometric System, E-com, Enrollment phase
In present epoch, secure online access to enterprises resources is very important for any organization. To protect valuable data become one of the big challenge for today's business as enterprise customers or clients involved in business-to-customer (B2C) and business-to-business (B2B) e-commerce need to feel that their transactions are secured from system hackers. Biometric technology provides a solution to this problem in enterprise network security. In this article we enhance the security of online transaction using secure and unique biometric template. The uniqueness of our process is that we store biometric template and password together in encrypted form both without the fusion of score level and decision level, which leads a successful way to combine multiple technologies, different from earlier methods. Password hardened biometric system helps to generate many different secure biometric templates for the same biometric system. It also generates unique biometric templates for multiple biometric systems from the same biometric trait.
Ajay Sharma, Deo Brat Ojha, "Password Hardened Biometric: A Complete Solution of Online Security", International Journal of Computer Network and Information Security(IJCNIS), vol.5, no.6, pp.42-48, 2013. DOI:10.5815/ijcnis.2013.06.06
[1]A. Ross, J. Shah. and A. K. Jain, "Towards reconstructing fingerprints form minutiae points", Proc.SPIE, Biometric Technology for Human Identification II, Vol. 5779, pp. 68-80, 2005.
[2]B. Schneier. Inside Risk: "The uses and abuses of biometrics", Comm. ACM, vol. 42, no. 8, p. 136.1999.
[3]A. K. Jain, S. Pankanti, S. Prabhakar, L. Hong, A. Ross, "Biometrics: A Grand Challenge", Proc. of the International Conference on Pattern Recognition, Vol. 2, pp. 935–942, August 2004.
[4]J. Wayman, A. Jain, D. Maltoni, D. Maio, Biometric Systems: Technology, Design and Performance Evaluation, Springer-Verlag, 2005.
[5]D. Maltoni, D. Maio, A. K. Jain, S. Prabhakar, Handbook of Fingerprint Recognition, Springer, 2003.
[6]BioAPI "BioAPI Specification", American National Standards Institute, ANSI /INCITS 358,Version1.1.Retrieved December 20,2005 from http://www.bioapi.org/ BIOAPI1.1.pdf
[7]A.Juels and M.Wattenberg, " A fuzzy commitment scheme", In Proceedings of the 6th ACM Conference on Computer and Communication Security, pp.28-36, November 1999.
[8]J. Bringer and H. Chabanne,"An Authentication protocol with encrypted biometric data", proc. Int. con cryptology. Africacrypt.pp-109-124, 2008.
[9]Deo Brat Ojha, Ajay Sharma " A fuzzy commitment scheme with McEliece's cipher" Survey in Mathematics and Its Application Vol.5 (2010) pp73-83.
[10]Ajay Sharma, Deo Brat Ojha,"Application of Coding Theory in Fuzzy Commitment Scheme", Middle-East Journal of Scientific Research 5 (6): 445-448, 2010.
[11]Andrew Burnett, Adam Duffy, Tom Dowling "A Biometric Identity Based Signature Scheme", eprint.iacr.org/2004/176.pdf
[12]A. Adler "Images can be regenerated from quantized biometric match score data", Proc. Canadian Conf. Electrical Computer Eng., pp. 469-472, 2004.
[13]13V.Pless, " Introduction to theory of Error Correcting Codes", Wiley , New York 1982.
[14]A.A.Al-saggaf,H.S.Acharya,"A Fuzzy Commitment Scheme"IEEE International Conference on Advances in Computer Vision and Information Technology 28-30November 2007 – India.
[15]J. MacWilliams and N. J. A. Sloane, Theory of Error-Correcting Codes. North Holland, 1991.
[16]M. Blum, "Coin flipping by telephone: a protocol for solving impossible problems", Proc. IEEE Computer Conference, pp. 133-137, 1982.
[17]Ramveer Singh , Awakash Mishra and D.B.Ojha "An Instinctive Approach for Secure Communication – Enhanced Data Encryption Standard (EHDES)" International journal of computer science and Information technology, Vol. 1(4) , 2010, 264-267
[18]D.B. Ojha, Ramveer Singh, Ajay Sharma,Awakash Mishra and Swati Garg "An InnovativeApproach to Enhance the Security of DataEncryption Scheme" International Journal of Computer Theory and Engineering, Vol. 2,No. 3,June, 2010,1793-8201.
[19]P. Timmers. "Electronic Commerce (Strategies and Models for Business-to Business Trading)", John Wiley Publications, New York. ,2000.
[20]A.K. Jain and U. Uludag, "Hiding biometric data, IEEE Transactions on Pattern Analysis and Machine Intelligence", vol. 25, no. 11, pp. 1494-1498. 2003.
[21]F. Hao, R. Anderson, and J. Daugman, "Combining crypto with biometrics effectively," IEEE Transactions on Computers, vol. 55, no. 9, pp. 1081–1088, 2006.
[22]A. Cavoukian and A. Stoianov, "Biometric encryption: A positive-sum technology that achieves strong authentication, security and privacy," Information and privacy commissioner of Ontario, White Paper, March 07.
[23]E. Krichen, B. Dorizzi, Z. Sun, S. Garcia-Salicetti, and T. Tan, Guide to Biometric Reference Systems and Performance Evaluation. Springer-Verlag, 2008, ch. Iris Recognition, pp. 25–50.
[24]CASIAwebsite,http://www.cbsr.ia.ac.cn/IrisDatabase.htm
[25]L. Masek, P. Kovesi, MATLAB Source Code for a Biometric Identification System Based on Iris Patterns, School of Computer Science and Software Engineering, University of Western Australia, Australia, 2003.
[26]T. Kawaguchi, D. Hidaka, M. Rizon, "Detection of eyes from human faces by Hough transform and separability filter", Proc.of the IEEE International Conference on Image Proc., Vol. 1, pp. 49-52, Vancouver, Canada, 2000.
[27]J. Canny, "A Computational Approach to Edge Detection", IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 8, pp. 679-714, 1986.
[28]R. Duda, P. Hart, "Use of Hough Transformation to Detect Lines and Curves in Pictures: Graphics and Image Processing", Communications of the ACM, Vol. 15, pp. 11-15, 1972.
[29]J. G. Daugman, "How Iris Recognition Works", IEEE Transactions on Circuits and Systems for Video Technology, Vol. 14, No. 1, pp. 21–30, January 2004.
[30]Sunil V.K. Gaddam, Manohar Lal "Cryptography "International Journal of Network Security, Vol.11, No.2, pp.61–69, Sept. 2010.
[31]Daugman,J "How Iris Recognition Works", IEEE Transactions On Circuits and systems for Video Technology, 2004,14 (1), pp.23-30
[32]T. Vander Putte and J. Keuning. Biometrical Fingerprint Recognition: Don't Get Your Fingers Burned. Proceedings of the Fourth Working Conference on Smart Card Research and Advanced Applications, 2000.