Skip to main content

User-Oriented Pseudo Biometric Image Based One-Time Password Mechanism on Smart Phone

  • Conference paper
  • 1159 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 200))

Abstract

User authentication procedures should be enhanced its security on Smart phone. And more secure system should be implemented to minimize the user’s privacy disclosure. Although image-based authentication mechanism was introduced recently, replay attack is also possible on existing one-time password based authentication system. In this paper, we implemented pseudo biometric image based OTP generation mechanism, which uses transformation function on captured biometric image from each user for providing enhanced secure authentication service on smart phone.

This research was supported by Basic Science Research Program though the NRF of Korea funded by the MEST (No.2010-0016882) and also partially supported by MKE (Ministry of Knowledge Economy), Korea, under the ITRC (Information Technology Research Center) support program supervised by NIPA (National IT Industry Promotion Agency)” (NIPA- 2011-(C1090-1031-0005)).

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Lamport, L.: Password authentication with insecure communication. Communications of the ACM 24, 770–772 (1981)

    Article  Google Scholar 

  2. Haller, N.M.: A one-time password system. Tech. Rep. RFC 1938 (May 1996)

    Google Scholar 

  3. Haller, N.M., Metz, C., Nesser II, P.J., Straw, M.: A one-time password system. RFC 2289 (February 1998), http://www.ietf.org/rfc/rfc2289.txt

  4. Jang, W.J., Lee, H.W.: Biometric one-time password generation mechanism and its application on SIP authentication. Journal of the Korea Convergence Society 1(1), 93–100 (2010)

    Google Scholar 

  5. Lin, M.H., Chang, C.C.: A secure one-time password authentication scheme with low-computation for mobile communications. ACM SIGOPS Operating Systems Review 38(2), 76–84 (2004)

    Article  MathSciNet  Google Scholar 

  6. http://confidenttechnologies.com/products/confident-imageshield

  7. http://www.darkreading.com/authentication/security/client/showArticle.jhtml?articleID=228200140

  8. http://www.marketwire.com/press-release/Confident-Technologies-Delivers-Image-Based-Multifactor-Authentication-Strengthen-Passwords-1342854.htm

  9. Ang, R., Rei, S.N., McAven, L.: Cancelable Key-Based Fingerprint Templates. In: Boyd, C., González Nieto, J.M. (eds.) ACISP 2005. LNCS, vol. 3574, pp. 242–252. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  10. Hirata, S., Takahashi, K.: Cancelable Biometrics with Perfect Secrecy for Correlation-Based Matching. In: Tistarelli, M., Nixon, M.S. (eds.) ICB 2009. LNCS, vol. 5558, pp. 868–878. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  11. Kong, B., et al.: An analysis of Biohashing and its variants. Elsevier - Pattern Recognition 39(7), 1359–1368 (2006)

    Article  MATH  Google Scholar 

  12. Lee, Y.J., et al.: One-Time Templates for Face Authentication. In: International Conference on Convergence Information Technology (ICCIT 2007), pp. 1818–1823 (2007)

    Google Scholar 

  13. Savvides, M., Vijaya Kumar, B.V.K., Khosla, P.K.: Cancelable Biometrics Filters for Face Recognition. In: Int. Conf. of Pattern Recognition, vol. 3, pp. 922–925 (2004)

    Google Scholar 

  14. Wang, D.-S., Li, J.-P.: A new fingerprint-based remote user authentication scheme using mobile devices. In: International Conference on Apperceiving Computing and Intelligence Analysis, ICACIA 2009, pp. 65–68 (2009)

    Google Scholar 

  15. Yoon, E.J., Yoo, K.Y.: A secure chaotic hash-based biometric remote user authentication scheme using mobile devices. In: Chang, K.C.-C., Wang, W., Chen, L., Ellis, C.A., Hsu, C.-H., Tsoi, A.C., Wang, H. (eds.) APWeb/WAIM 2007. LNCS, vol. 4537, pp. 612–623. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  16. Khan, M.K., Zhang, J.S., Wang, X.M.: Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices. Chaos, Solutions & Fractals 35, 519–524 (2008)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jang, W., Cho, S., Lee, HW. (2011). User-Oriented Pseudo Biometric Image Based One-Time Password Mechanism on Smart Phone. In: Kim, Th., Adeli, H., Robles, R.J., Balitanas, M. (eds) Information Security and Assurance. ISA 2011. Communications in Computer and Information Science, vol 200. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23141-4_42

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-23141-4_42

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-23140-7

  • Online ISBN: 978-3-642-23141-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics