Skip to main content

A Novel Method of Template Protection and Two-Factor Authentication Protocol Based on Biometric and PUF

  • Conference paper
  • First Online:
Cyberspace Safety and Security (CSS 2021)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 13172))

Included in the following conference series:

  • 844 Accesses

Abstract

With the development of Internet technology and the change of network environment, it is particularly important to ensure the security and privacy of biometrics in the process of biometrics authentication. In this regard, we propose a novel identity authentication protocol based on cancelable biometric and Physical Unclonable Function (PUF) which uses the properties of PUF to generate the cancelable biometric and adds it to the complete authentication protocol, so as to realize the two-way authentication between the user and the server. Our authentication protocol makes full use of the characteristics of what users bring in and who users are, overcomes the shortcomings of the traditional key-based protocol, and connecting with the supervised learning algorithm SVM and elliptic curve Pedersen commitment, construct an effective, unique and cancelable biometric identity to replace original biometrics, thus improving the security and privacy protection of the biometrics template. At the same time, we analyze the accuracy of classification algorithms, the revocability and unlinkability of templates through experiments, which further ensures the security and legitimacy of the authentication protocol.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kumar, N.: Cancelable biometrics: a comprehensive survey. Artif. Intell. Rev. 53(11), 3403–34462 (2020)

    Google Scholar 

  2. Zheng, Y., Cao, Y., Chang, C.H.: UDhashing: physical unclonable function-based user-device hash for endpoint authentication. IEEE Trans. Industr. Electron. 66(12), 9559–9570 (2019)

    Article  Google Scholar 

  3. Bian, W., Gope, P., Cheng, Y., Li, Q.: Bio-AKA: an efficient fingerprint based two factor user authentication and key agreement scheme. Future Gener. Comput. Syst. 109, 45–55 (2020)

    Article  Google Scholar 

  4. Zhao, J., et al.: A Secure biometrics and PUFs-based authentication scheme with key agreement for multi-server environments. IEEE Access 8, 45292–45303 (2020)

    Article  Google Scholar 

  5. Yang, W., Wang, S., Shahzad, M., Zhou, W.: A cancelable biometric authentication system based on feature-adaptive random projection. J. Inf. Secur. Appl. 58, 102704 (2021)

    Google Scholar 

  6. Arjona, R., Baturone, I.: A dual-factor access control system based on device and user intrinsic identifiers. In: IECON 2016–42nd Annual Conference of the IEEE Industrial Electronics Society, pp. 4731–4736. IEEE (2016)

    Google Scholar 

  7. Arjona, R., Prada-Delgado, M.A., Baturone, I., Ross, A.: Securing minutia cylinder codes for fingerprints through physically unclonable functions: an exploratory study. In: 2018 International Conference on Biometrics (ICB), pp. 54–60. IEEE (2018)

    Google Scholar 

  8. Liu, Y., Ling, J., Liu, Z., Shen, J., Gao, C.: Finger vein secure biometric template generation based on deep learning. Soft. Comput. 22(7), 2257–2265 (2017). https://doi.org/10.1007/s00500-017-2487-9

    Article  Google Scholar 

  9. Yang, W., Wang, S., Hu, J., Zheng, G., Yang, J., Valli, C.: Securing deep learning based edge finger vein biometrics with binary decision diagram. IEEE Trans. Industr. Inf. 15(7), 4244–4253 (2019)

    Article  Google Scholar 

  10. Chang, C.C., Lin, C.J.: LIBSVM: a library for support vector machines. ACM Trans. Intell. Syst. Technol. (TIST) 2(3), 1–27 (2011)

    Article  Google Scholar 

  11. Rakshit, P., Basu, R., Paul, S., Bhattacharyya, S., Mistri, J., Nath, I.: Face Detection using Support Vector Mechine with PCA. Available at SSRN 3515989 (2020)

    Google Scholar 

  12. Saraswathi, M., Sivakumari, D.S.: Evaluation of PCA and LDA techniques for Face recognition using ORL face database. Int. J. Comput. Sci. Inf. Technol. 1, 810–813 (2015)

    Google Scholar 

  13. Danraka, S.S., Yahaya, S.M., Usman, A.D., Umar, A., Abubakar, A.M.: Discrete firefly algorithm based feature selection scheme for improved face recognition. Comput. Inf. Syst. 23(2), 23–34 (2019)

    Google Scholar 

  14. Gomez-Barrero, M., Galbally, J., Rathgeb, C., Busch, C.: General framework to evaluate unlinkability in biometric template protection systems. IEEE Trans. Inf. Forensics Secur. 13(6), 1406–1420 (2017)

    Article  Google Scholar 

Download references

Acknowledgement

This work was supported in part by the NSFC (Nos. 61976006, 61902003 and 61573023), NSF_AH (Nos. 1808085MF171 and 2108085MF206).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Weixin Bian .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhang, H., Bian, W., Jie, B., Sun, S. (2022). A Novel Method of Template Protection and Two-Factor Authentication Protocol Based on Biometric and PUF. In: Meng, W., Conti, M. (eds) Cyberspace Safety and Security. CSS 2021. Lecture Notes in Computer Science(), vol 13172. Springer, Cham. https://doi.org/10.1007/978-3-030-94029-4_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-94029-4_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-94028-7

  • Online ISBN: 978-3-030-94029-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics