Abstract
This paper presents a novel two-factor authenticator which hashes tokenized random data and moment based palmprint features to produce a set of private binary string, coined as Discrete-Hashing code. This novel technique requires two factors (random number + authorized biometrics) credentials in order to access the authentication system. Absence of either factor will just handicap the progress of authentication. Besides that, Discrete-Hashing also possesses high discriminatory power, with highly correlated bit strings for intra-class data. Experimental results show that this two-factor authenticator surpasses the classic biometric authenticator in terms of verification rate. Our proposed approach provides a clear separation between genuine and imposter population distributions. This implies that Discrete-Hashing technique allows achievement of zero False Accept Rate (FAR) without jeopardizing the False Reject Rate (FRR) performance, which is hardly possible to conventional biometric systems.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Bolle, R.M., Connel, J.H., Ratha, N.K.: Biometric Perils and Patches. The Journal of the Pattern Recognition Society 35, 2727–2738 (2002)
Matsumoto, T.: Importance of Open Discussion on Adversarial Analyses for Mobile Security Technology. In: ITU-T Workshop on Security, Seoul (May 2002)
Connie, T., Michael, G.K.O., Andrew, T.B.J., David, N.C.L.: An Automated Biometric Palmprint Verification System. In: The 3rd International Symp. on Communications & Info. Tech (ISCIT 2003), Thailand, vol. 2, pp. 714–719 (2002)
Teh, C.H., Chin, R.T.: On Image Analysis by the Methods of Moments. IEEE Trans. Pattern Analysis Machine Intell. 10, 496–512 (1988)
Mukundan, R., Ramakrishnan, K.R.: Moment Functions in Image Analysis – Theory and Applications. World Scientific Publishing, Singapore (1998)
Pang, Y.H., Andrew, T.B.J., David, N.C.L.: Palmprint Authentication with Zernike moment Invariants. In: Proceeding of the 3rd International Sym. On Signal Processing and Information technology, MP3-3_ISSPIT2003, Darmstadt, Germany (December 2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Pang, YH., Jin, A.T.B., Ling, D.N.C. (2004). Personal Authenticator on the Basis of Two-Factors: Palmprint Features and Tokenized Random Data. In: Webb, G.I., Yu, X. (eds) AI 2004: Advances in Artificial Intelligence. AI 2004. Lecture Notes in Computer Science(), vol 3339. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30549-1_21
Download citation
DOI: https://doi.org/10.1007/978-3-540-30549-1_21
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-24059-4
Online ISBN: 978-3-540-30549-1
eBook Packages: Computer ScienceComputer Science (R0)