Paper
20 June 2003 Applications of a hologram watermarking protocol: aging-aware biometric signature verification and time validity check with personal documents
Author Affiliations +
Proceedings Volume 5020, Security and Watermarking of Multimedia Contents V; (2003) https://doi.org/10.1117/12.476823
Event: Electronic Imaging 2003, 2003, Santa Clara, CA, United States
Abstract
Our paper addresses two issues of a biometric authentication algorithm for ID cardholders previously presented namely the security of the embedded reference data and the aging process of the biometric data. We describe a protocol that allows two levels of verification, combining a biometric hash technique based on handwritten signature and hologram watermarks with cryptographic signatures in a verification infrastructure. This infrastructure consists of a Trusted Central Public Authority (TCPA), which serves numerous Enrollment Stations (ES) in a secure environment. Each individual performs an enrollment at an ES, which provides the TCPA with the full biometric reference data and a document hash. The TCPA then calculates the authentication record (AR) with the biometric hash, a validity timestamp, and a document hash provided by the ES. The AR is then signed with a cryptographic signature function, initialized with the TCPA's private key and embedded in the ID card as a watermark. Authentication is performed at Verification Stations (VS), where the ID card will be scanned and the signed AR is retrieved from the watermark. Due to the timestamp mechanism and a two level biometric verification technique based on offline and online features, the AR can deal with the aging process of the biometric feature by forcing a re-enrollment of the user after expiry, making use of the ES infrastructure. We describe some attack scenarios and we illustrate the watermarking embedding, retrieval and dispute protocols, analyzing their requisites, advantages and disadvantages in relation to security requirements.
© (2003) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Claus Vielhauer and Lucilla Croce Ferri "Applications of a hologram watermarking protocol: aging-aware biometric signature verification and time validity check with personal documents", Proc. SPIE 5020, Security and Watermarking of Multimedia Contents V, (20 June 2003); https://doi.org/10.1117/12.476823
Lens.org Logo
CITATIONS
Cited by 3 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Biometrics

Digital watermarking

Holograms

Computer security

Databases

Feature extraction

Holography applications

Back to Top