Abstract
In this Information Age, security of personal data is one of the biggest issues faced by most of the nations. Biometrics provides substantial help in guarding against attempts to establish fraudulent multiple identities or prevent identity fraud. The greatest advantage that the biometric data of an individual remains constant acts as its biggest liability. Once the attacker gets biometric password of an individual then security of his data becomes a big problem. This paper comes with a unique solution which will allow people to change their biometric password and helps to overcome some of the present issues in biometric systems. The biometric password is created by hashing the biometric data of the user. Merging of biometrics and cryptography proves to be more secure and helps to provide a better authentication system for the society.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Prabhakar, S., Pankanti, S., Jain, A.K.: Biometirc Recognition: Security and Privacy Concerns. IEEE Security & Privacy, 33–44 (March/April 2003)
Delac, K., Grgic, M.: A Survey of Biometric Recognition Methods. In: 46th International Symposium Electronics in Marine, Zadar, Croatia (June 2004)
NIST report to United State Congress. Summary of NIST Standards for Biometric Accuracy, Tamper Resistance, and Interoperability (November 13, 2000), http://www.itl.nist.gov/iad/894.03/NISTAPP_Nov02.pdf
Snelick, R., Indovina, M., Yen, J., Mink, A.: Multimodal Biometrics: Issues in Design and Testing. In: International Conference on Multimodal Interfaces (ICMI), Vancouver, British Columbia, Canada. ACM (November 2003) 1-58113-621-8/03/0011
Korte, U., Krawczak, M., Martini, U., Merkle, J., Plaga, R., Niesing, M., Tiemann, C., Vinck, H.: A cryptographic biometric authentication system based on genetic fingerprints. LNI, vol. P-128, pp. 263–276. Springer (2008)
Hao, F., Anderson, R., Daugman, J.: Combining Crypto with Biometrics Effectively. IEEE Trans. on Computers 55(9) (September 2009)
Jain, A.K., Ross, A., Prabhakar, S.: An Introduction to Biometric Recognition. IEEE Trans. on Circuits and Systems for Video Technology 14(1), 4–19 (2004)
Zhang, Z.B., Ma, S.L., Zuo, P., Ma, J.: Fast Iris Detection and Localization Algorithm Based on AdaBoost Algorithm and Neural Networks. In: International Conference on Neural Networks and Brain (ICNN), vol. 2, pp. 1009–1014 (October 2005)
Chen, W.-S., Chih, K.-H., Shih, S.-W., Hsieh, C.-M.: Personal Identification Technique based on Human Iris Recognition with Wavelet Transform. In: International Conference on Acoustics, Speech and Signal Processing (ICASSP), vol. 2, pp. 949–952 (March 2005)
Liu, Z., Yan, J.-Q., Zhang, D., Tang, Q.-L.: A Tongue-Print Image Database for Recognition. In: Procedings of the Sixth International Conference on Cybernetics, Hong Kong (August 2007)
SHA-1 Hash function, http://en.wikipedia.org/wiki/SHA-1
Pongyupinpanich, S., Choomchuay, S.: An Architecture for a SHA-1 Applied for DSA. In: 3rd Asian International Mobile Computing Conference, AMOC 2004, Thailand, May 26-28 (2004)
National Institute of Standards and Technology (NIST), “Secure Hash Standard”, Federal Information Processing Standards Publication 180-2 (August 2002)
Unique Identification Authority of India, Planning Commission, Government of India, http://uidai.gov.in/
Cryptographic hash function, http://en.wikipedia.org/wiki/Cryptographic_hash_function
Alderson, N.: Increasing Security Expertise in Aviation- oriented Computing Education: A Modular Approach, part of Cryptography module, Embry-Riddle Aeronautical University in Prescott, Arizona, http://nsfsecurity.pr.erau.edu/crypto/sha1.html
Kisasondi, T., Baca, M., Lovrencic, A.: Biometric Cryptography and Network Authentication. Journal of Information and Organizational Sciences 31(1) (2007)
How hashes are cracked, http://crackstation.net/hashing-security.html
How Crackstation cracks hashes, http://crackstation.net/
Hellman, M.E.: A cryptanalytical time-memory trade off. IEEE Transactions on Information Theory IT-26 (1980)
Ortega-Garcia, J., Fierrez-Aguilar, J., Simon, D., Gonzalez, J., Faundez-Zanuy, M., Espinosa, V., Satue, A., Hernaez, I., Igarza, J.-J., Vivaracho, C., Escudero, D., Moro, Q.-I.: MCYT baseline corpus: a bimodal biometric database. IEE Proc.-Vis. Image Signal Process. 150(6), 391–401 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ashok, A., Poornachandran, P., Achuthan, K. (2012). Secure Authentication in Multimodal Biometric Systems Using Cryptographic Hash Functions. In: Thampi, S.M., Zomaya, A.Y., Strufe, T., Alcaraz Calero, J.M., Thomas, T. (eds) Recent Trends in Computer Networks and Distributed Systems Security. SNDS 2012. Communications in Computer and Information Science, vol 335. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34135-9_17
Download citation
DOI: https://doi.org/10.1007/978-3-642-34135-9_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-34134-2
Online ISBN: 978-3-642-34135-9
eBook Packages: Computer ScienceComputer Science (R0)