Skip to main content
Log in

Construction of a secure two-factor user authentication system using fingerprint information and password

  • Published:
Journal of Intelligent Manufacturing Aims and scope Submit manuscript

Abstract

User authentication is highly necessary technology in a variety of services. Many researchers have proposed a two-factor authentication scheme using certificate and OTP, smartcard and password, and so on. Two-factor authentication requires an additional factor rather than one-factor authentication. Therefore, loss or exposure can occur, since users always must carry and manage the additional device or factor. For this reason, biometric authentication, used in many services, needs a verification method of the user without an additional factor. Fingerprinting is widely used in service due to excellent recognition, low cost device, and less user-hostile. However, fingerprint recognition always uses the same fingerprint template, due to the inalterability. This causes a problem of reusable fingerprint by a malicious attacker. Therefore, we proposed a secure two-factor user authentication system using fingerprint information and password to solve the existing two-factor problem. The proposed scheme is secure against reuse of a fingerprint. It does not need an extra device, so efficiency and accessibility are improved.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  • Bamasak, O. (2011). Exploring consumers acceptance of mobile payments—an empirical study. International Journal of Information Technology, Communications and Convergence. doi:10.1504/IJITCC.2011.039284.

  • Bolle R. M., Connell J. H., Ratha N. K. (2002) Biometric perils and patches. Pattern Recognition 35(12): 2727–2738

    Article  Google Scholar 

  • Buter B., Dijkshoorn N., Modolo D., Nguyen Q., Noort S. V., Poel B., Salah A. A., Akdag Salah A. A. (2011) Explorative visualization and analysis of a social network for arts: The case of deviantART. Journal of Convergence 2(1): 87–94

    Google Scholar 

  • Chen H., Chen H. (2011) A novel algorithm of fingerprint encryption using minutiae-based transformation. Pattern Recognition Letters 32(2): 305–309

    Article  Google Scholar 

  • Chong R. M., Tanaka T. (2010) Motion blur identification using maxima locations for blind colour image restoration. Journal of Convergence 1(1): 49–56

    Google Scholar 

  • Das A. K. (2011) Cryptanalysis and further improvement of a biometric-based remote user authentication scheme using smart cards. International Journal of Network Security & Its Applications 3(2): 13–28

    Article  Google Scholar 

  • Jia, J., & Cai, L. (2007). Fake finger detection based on time-series fingerprint image analysis. In Proceedings of ICIC’07 international conference on advanced intelligent computing theories and applications, LNCS 4681 (pp. 1140–1150).

  • Jian, P., Min, W., & Yadong, L. (2008). Design and implementation of an embedded fingerprint identification system for the bank staff identity authentication. ICESS Symposia ’08 (pp. 69–72).

  • Lee C. H., Choi J. Y., Toh K.-A., Lee S. Y. (2007) Alignment-free cancelable fingerprint templates based on local minutiae information. IEEE Transactions on system, Man, and Cybernetics 37(4): 980–992

    Article  Google Scholar 

  • Lee Y. H., Kim S. J., Won D. H. (2006) Weakness and improvements of Yong-Lee’s anonymous fingerprinting protocol. IEICE Transactions on Fundamentals 89-A(7): 2084–2087

    Article  Google Scholar 

  • Li C. T., Hwang M. S. (2010) An efficient biometric-based remote authentication scheme using smart cards. Journal of Network and Computer Applications 33(1): 1–5

    Article  Google Scholar 

  • Li X., Niu J. W., Wang W. D., Liu C. L. (2011) Cryptanalysis and improvement of a biometric-based remote authentication scheme using smart cards. Journal of Network and Computer Applications 34(1): 73–79

    Article  Google Scholar 

  • Liou, J. C., Bhashyam, S. (2010). A feasible and cost effective two-factor authentication for online transactions. In Software engineering and data mining (SEDM), 2010 2nd international conference (pp. 47–51).

  • Liu E., Liang J., Pang L., Xie M., Tian J. (2010) Minutiae and modified Biocode fusion for fingerprint-based key generation. Journal of Network and Computer Applications 33(3): 221–235

    Article  Google Scholar 

  • Liu, E., Zhao, H., Liang, J., Pang, L., Chen, H., & Tian, J. (2011). Random local region descriptor (RLRD): a new method for fixed-length feature representation of fingerprint image and its application to template protection. Future Generation Computer Systems. doi:10.1016/j.future.2011.01.001.

  • Moon, D., Chung, Y., Seo, C., Kim, S.-Y., Kim, J.-N. (2012). A practical implementation of fuzzy fingerprint vault for smart cards. Journal of Intelligent Manufacturing. doi:10.1007/s10845-012-0656-3.

  • Prabhakar S., Pankanti S., Jain A. K. (2003) Biometric recognition: Security and privacy concerns. IEEE Security & Privacy, 1(2): 33–42

    Article  Google Scholar 

  • Ratha N. K., Chikkerur S., Connell J. H., Bolle R. M. (2007) Generating cancelable fingerprint templates. IEEE Transactions on Pattern Analysis and Machine Intelligence 29(4): 561–572

    Article  Google Scholar 

  • Ratha N. K., Connell J. H., Bolle R. M. (2001) Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal 40(3): 614–634

    Article  Google Scholar 

  • Rathgeb C., Uhl A. (2010) Two-factor authentication or how to potentially counterfeit experimental results in biometric systems. Lecture Notes in computer Science 6112: 296–305

    Article  Google Scholar 

  • Shin Y., Shin W. (2010) A telebiometric system mechanism model and biometric network protocol for the security of networked manufacturing. Journal of Intelligent Manufacturing 21(5): 595–605

    Article  Google Scholar 

  • Uz T., Bebis G., Erol A., Prabhakar S. (2009) Minutiae-based template synthesis and matching for fingerprint authentication. Computer Vision and Image Understanding 113(9): 979–992

    Article  Google Scholar 

  • Xie, B., Kumar, A., Zhao, D., Reddy, R., & He, B. (2010). On secure communication in integrated heterogeneous wireless networks. International Journal of Information Technology, Communications and Convergence. doi:10.1504/IJITCC.2010.035224.

  • Yang, H., Jiang, X., Kot, & A. C. (2009). Generating secure cancelable finger print templates using local and global features. In 2nd IEEE international conference on computer science and information technology (pp. 645–649.

  • Yong, S., & Lee, S. (2005). An efficient fingerprinting scheme with symmetric and commutative encryption. In International workshop on digital watermarking 2005, LNCS 3710 (pp. 54–66).

  • Zheng, H., Kwak, J., Son, K. H., Lee, W. S., Kim, S. J., & Won, D. H. (2006). Confidence value based multi levels of authentication for ubiquitous computing environments. In Proceedings of ICCSA 2006, international conference on computational science and its applications, LNCS 3981 (pp. 954–963).

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jin Kwak.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Go, W., Lee, K. & Kwak, J. Construction of a secure two-factor user authentication system using fingerprint information and password. J Intell Manuf 25, 217–230 (2014). https://doi.org/10.1007/s10845-012-0669-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10845-012-0669-y

Keywords

Navigation