Abstract
It is widely recognized that multi-modal biometrics has the potential to strengthen border protection by reducing the risk of passport fraud. However, it may take high costs to issue smart-card enabled passports over the world and to process a huge amount of biometric information (on-line). A public key cryptography is another useful tool for verifying a person’s identity in a stringent way, but a key management is one of critical problems arising from the use of cryptographic schemes. For example, a passport-holder should keep a private key in a smart-card-level device while an inspecting officer accesses a corresponding public key in an authentic manner. In this paper, we present a low-cost but highly-scalable method that uses multi-modal biometrics based on face and fingerprints, and public key infrastructures (PKIs) for border control applications. A digital signature in PKIs and multi-modal biometrics are carefully applied in our scheme, in order to reduce the possibility of undesirable factors significantly at nation’s borders without requiring any hardware device in passports. We could print a (publicly readable) barcodes on the passport instead of requiring the smart-card-level devices.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bellare, M., Sandhu, R.: The security of practical two-party RSA signature schemes (2001) (manuscript)
Boneh, D.: Twenty years of attacks on the RSA cryptosystem. Notices of the American Mathematical Society (AMS) 46(2), 203–213 (1999)
Boneh, D., Durfee, G.: Cryptanalysis of RSA with private key d less than N 0.292. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 1–11. Springer, Heidelberg (1999) and IEEE Trans. on Information Theory 46(4) (2000)
Boneh, D., Shacham, H., Lynn, B.: Short signatures from the weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514–532. Springer, Heidelberg (2001)
Boyd, C.: Digital multisignatures. In: Cryptography and Coding, pp. 241–246. Oxford University Press, Oxford (1989)
Brands, S.: Rethinking public key infrastructures and digital certificates, p. 11, pp. 219–224. MIT Press, Cambridge (2000)
Burke, H.E.: Handbook of bar Coding Systems. Van Nostrand Reinhold, New York (1984)
Coppersimth, D., Franklin, M., Patarin, J., Reiter, M.: Low-exponent RSA with related messages. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 1–9. Springer, Heidelberg (1996)
Daon Inc., Biometric Authentication & Digital Signatures for the Pharmaceutical Industry, White paper available at http://www.daon.com/downloads/publications/esignature.pdf
Daugman, J.: High confidence personal identifications by rapid video analysis of iris texture. In: IEEE International Carnahan Conference on Security Technologies, pp. 50–60 (1992)
Daugman, J.: High confidence personal identifications by a test of statistical independence. IEEE Transactions on Pattern Analysis and Machine Intelligence 15(11), 648–656 (1993)
Davida, G., Frankel, Y., Matt, B.: On enabling secure applications through off-line biometric identification. In: IEEE Symposium on Security and Privacy, pp. 148–159 (1998)
Denso Inc., QRmaker: User’s Manual, Denso Corporation, Aichi, Japan (1998)
Fukunaga, K.: Introduction to statistical pattern recongition. Academic Press, Orlando (1972)
Goldwasser, S., Micali, S., Rivest, R.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal of Computing 17(2), 281–308 (1988)
Jain, A., Hong, L., Pankanti, S.: Biometric identification. Communications of the ACM (February 2000)
Jolliffe, I.: Principal Component Analysis. Springer, Heidelberg (1986)
Kwon, T.: Practical digital signature generation using biometrics. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3043, pp. 728–737. Springer, Heidelberg (2004)
Matyáš, V., Říha, Z.: Biometric authentication - security and usability, Manuscrypt available at http://www.fi.muni.cz/usr/matyas/cms_matyas_riha_biometrics.pdf
Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography, pp. 287–291, 312–315. CRC Press, Boca Raton (1997)
Moon, H.: Performance Evaluation Methodology for Face Recognition Algorithms, Ph.D. Thesis, Dept. of Computer Science and Engineering, SUNY Buffalo (1999)
Palmer, R.C.: The Bar Code Book, 3rd edn. Helmers Publishing, Peterborough (1995)
Phillips, P., Moon, H., Rizvi, S., Rauss, P.: The FERET Evaluation Methodology for Face-Recognition Algorithms. IEEE Pattern Analysis and Machine Intelligence 22, 1090–1104 (2000)
Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21, 120–126 (1978)
Soutar, C.: Biometric system performance and security (2002), Manuscrypt available at http://www.bioscrypt.com/assets/bio_paper.pdf
Soutar, C., Roberge, D., Stoianov, A., Golroy, R., Vijaya Kumar, B.: Biometric Encryption. In: ICSA Guide to Cryptography. McGraw-Hill, New York (1999), also available at http://www.bioscrypt.com/assets/Biometric_Encryption.pdf
Turk, M., Pentland, A.: Eigenfaces for recognition. Journal of Cognitive Neuroscience 3(1), 71–86 (1991)
U.S. DoS, USVISIT, http://fpc.state.gov/20738.htm
Wiener, M.: Cryptanalysis of short RSA secret exponents. IEEE Transactions on Information Theory 36(3) (May 1990)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kwon, T., Moon, H. (2005). Multi-modal Biometrics with PKI Technologies for Border Control Applications. In: Kantor, P., et al. Intelligence and Security Informatics. ISI 2005. Lecture Notes in Computer Science, vol 3495. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11427995_9
Download citation
DOI: https://doi.org/10.1007/11427995_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25999-2
Online ISBN: 978-3-540-32063-0
eBook Packages: Computer ScienceComputer Science (R0)