Abstract
User authentication procedures should be enhanced its security on Smart phone. And more secure system should be implemented to minimize the user’s privacy disclosure. Although image-based authentication mechanism was introduced recently, replay attack is also possible on existing one-time password based authentication system. In this paper, we implemented pseudo biometric image based OTP generation mechanism, which uses transformation function on captured biometric image from each user for providing enhanced secure authentication service on smart phone.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Lamport, L.: Password authentication with insecure communication. Communications of the ACM 24, 770–772 (1981)
Haller, N.M.: A one-time password system. Tech. Rep. RFC 1938 (May 1996)
Haller, N.M., Metz, C., Nesser II, P.J., Straw, M.: A one-time password system. RFC 2289 (February 1998), http://www.ietf.org/rfc/rfc2289.txt
Jang, W.J., Lee, H.W.: Biometric one-time password generation mechanism and its application on SIP authentication. Journal of the Korea Convergence Society 1(1), 93–100 (2010)
Lin, M.H., Chang, C.C.: A secure one-time password authentication scheme with low-computation for mobile communications. ACM SIGOPS Operating Systems Review 38(2), 76–84 (2004)
http://confidenttechnologies.com/products/confident-imageshield
http://www.darkreading.com/authentication/security/client/showArticle.jhtml?articleID=228200140
Ang, R., Safavi-Naini, R., McAven, L.: Cancelable Key-Based Fingerprint Templates. In: Boyd, C., González Nieto, J.M. (eds.) ACISP 2005. LNCS, vol. 3574, pp. 242–252. Springer, Heidelberg (2005)
Hirata, S., Takahashi, K.: Cancelable Biometrics with Perfect Secrecy for Correlation-Based Matching. In: Tistarelli, M., Nixon, M.S. (eds.) ICB 2009. LNCS, vol. 5558, pp. 868–878. Springer, Heidelberg (2007)
Kong, B., et al.: An analysis of Biohashing and its variants. Pattern Recognition 39(7), 1359–1368 (2006)
Lee, Y.J., et al.: One-Time Templates for Face Authentication. In: International Conference on Convergence Information Technology, ICCIT 2007, pp. 1818–1823 (2007)
Savvides, M., Vijaya Kumar, B.V.K., Khosla, P.K.: Cancelable Biometrics Filters for Face Recognition. In: Int. Conf. of Pattern Recognition, vol. 3, pp. 922–925 (2004)
Wang, D.-S., Li, J.-P.: A new fingerprint-based remote user authentication scheme using mobile devices. In: International Conference on Apperceiving Computing and Intelligence Analysis, ICACIA 2009, pp. 65–68 (2009)
Yoon, E.J., Yoo, K.Y.: A secure chaotic hash-based biometric remote user authentication scheme using mobile devices. In: APWeb/WAI 2007, pp. 612–623 (2007)
Khan, M.K., Zhang, J.S., Wang, X.M.: Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices. Chaos, Solutions & Fractals 35, 519–524 (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jang, W., Cho, S., Lee, HW. (2011). User-Oriented Pseudo Biometric Image Based One-Time Password Mechanism on Smart Phone. In: Kim, Th., Adeli, H., Robles, R.J., Balitanas, M. (eds) Advanced Communication and Networking. ACN 2011. Communications in Computer and Information Science, vol 199. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23312-8_7
Download citation
DOI: https://doi.org/10.1007/978-3-642-23312-8_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-23311-1
Online ISBN: 978-3-642-23312-8
eBook Packages: Computer ScienceComputer Science (R0)