Skip to main content

Secure Authentication in Multimodal Biometric Systems Using Cryptographic Hash Functions

  • Conference paper
Recent Trends in Computer Networks and Distributed Systems Security (SNDS 2012)

Abstract

In this Information Age, security of personal data is one of the biggest issues faced by most of the nations. Biometrics provides substantial help in guarding against attempts to establish fraudulent multiple identities or prevent identity fraud. The greatest advantage that the biometric data of an individual remains constant acts as its biggest liability. Once the attacker gets biometric password of an individual then security of his data becomes a big problem. This paper comes with a unique solution which will allow people to change their biometric password and helps to overcome some of the present issues in biometric systems. The biometric password is created by hashing the biometric data of the user. Merging of biometrics and cryptography proves to be more secure and helps to provide a better authentication system for the society.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Prabhakar, S., Pankanti, S., Jain, A.K.: Biometirc Recognition: Security and Privacy Concerns. IEEE Security & Privacy, 33–44 (March/April 2003)

    Google Scholar 

  2. Delac, K., Grgic, M.: A Survey of Biometric Recognition Methods. In: 46th International Symposium Electronics in Marine, Zadar, Croatia (June 2004)

    Google Scholar 

  3. NIST report to United State Congress. Summary of NIST Standards for Biometric Accuracy, Tamper Resistance, and Interoperability (November 13, 2000), http://www.itl.nist.gov/iad/894.03/NISTAPP_Nov02.pdf

  4. Snelick, R., Indovina, M., Yen, J., Mink, A.: Multimodal Biometrics: Issues in Design and Testing. In: International Conference on Multimodal Interfaces (ICMI), Vancouver, British Columbia, Canada. ACM (November 2003) 1-58113-621-8/03/0011

    Google Scholar 

  5. Korte, U., Krawczak, M., Martini, U., Merkle, J., Plaga, R., Niesing, M., Tiemann, C., Vinck, H.: A cryptographic biometric authentication system based on genetic fingerprints. LNI, vol. P-128, pp. 263–276. Springer (2008)

    Google Scholar 

  6. Hao, F., Anderson, R., Daugman, J.: Combining Crypto with Biometrics Effectively. IEEE Trans. on Computers 55(9) (September 2009)

    Google Scholar 

  7. Jain, A.K., Ross, A., Prabhakar, S.: An Introduction to Biometric Recognition. IEEE Trans. on Circuits and Systems for Video Technology 14(1), 4–19 (2004)

    Article  Google Scholar 

  8. Zhang, Z.B., Ma, S.L., Zuo, P., Ma, J.: Fast Iris Detection and Localization Algorithm Based on AdaBoost Algorithm and Neural Networks. In: International Conference on Neural Networks and Brain (ICNN), vol. 2, pp. 1009–1014 (October 2005)

    Google Scholar 

  9. Chen, W.-S., Chih, K.-H., Shih, S.-W., Hsieh, C.-M.: Personal Identification Technique based on Human Iris Recognition with Wavelet Transform. In: International Conference on Acoustics, Speech and Signal Processing (ICASSP), vol. 2, pp. 949–952 (March 2005)

    Google Scholar 

  10. Liu, Z., Yan, J.-Q., Zhang, D., Tang, Q.-L.: A Tongue-Print Image Database for Recognition. In: Procedings of the Sixth International Conference on Cybernetics, Hong Kong (August 2007)

    Google Scholar 

  11. SHA-1 Hash function, http://en.wikipedia.org/wiki/SHA-1

  12. Pongyupinpanich, S., Choomchuay, S.: An Architecture for a SHA-1 Applied for DSA. In: 3rd Asian International Mobile Computing Conference, AMOC 2004, Thailand, May 26-28 (2004)

    Google Scholar 

  13. National Institute of Standards and Technology (NIST), “Secure Hash Standard”, Federal Information Processing Standards Publication 180-2 (August 2002)

    Google Scholar 

  14. Unique Identification Authority of India, Planning Commission, Government of India, http://uidai.gov.in/

  15. Cryptographic hash function, http://en.wikipedia.org/wiki/Cryptographic_hash_function

  16. Alderson, N.: Increasing Security Expertise in Aviation- oriented Computing Education: A Modular Approach, part of Cryptography module, Embry-Riddle Aeronautical University in Prescott, Arizona, http://nsfsecurity.pr.erau.edu/crypto/sha1.html

  17. Kisasondi, T., Baca, M., Lovrencic, A.: Biometric Cryptography and Network Authentication. Journal of Information and Organizational Sciences 31(1) (2007)

    Google Scholar 

  18. How hashes are cracked, http://crackstation.net/hashing-security.html

  19. How Crackstation cracks hashes, http://crackstation.net/

  20. Hellman, M.E.: A cryptanalytical time-memory trade off. IEEE Transactions on Information Theory IT-26 (1980)

    Google Scholar 

  21. Ortega-Garcia, J., Fierrez-Aguilar, J., Simon, D., Gonzalez, J., Faundez-Zanuy, M., Espinosa, V., Satue, A., Hernaez, I., Igarza, J.-J., Vivaracho, C., Escudero, D., Moro, Q.-I.: MCYT baseline corpus: a bimodal biometric database. IEE Proc.-Vis. Image Signal Process. 150(6), 391–401 (2003)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ashok, A., Poornachandran, P., Achuthan, K. (2012). Secure Authentication in Multimodal Biometric Systems Using Cryptographic Hash Functions. In: Thampi, S.M., Zomaya, A.Y., Strufe, T., Alcaraz Calero, J.M., Thomas, T. (eds) Recent Trends in Computer Networks and Distributed Systems Security. SNDS 2012. Communications in Computer and Information Science, vol 335. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34135-9_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-34135-9_17

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-34134-2

  • Online ISBN: 978-3-642-34135-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics