Two-factor face authentication using matrix permutation transformation and a user password

被引:26
|
作者
Kang, Jeonil [1 ]
Nyang, DaeHun [2 ]
Lee, KyungHee [3 ]
机构
[1] Inha Univ, Sch Informat & Commun Engn, Inchon 402751, South Korea
[2] Inha Univ, Sch Comp & Informat Engn, Inchon 402751, South Korea
[3] Univ Suwon, Dept Elect Engn, Suwon, South Korea
关键词
Face authentication; Biometrics security; User privacy; DISCRIMINANT-ANALYSIS; SECURITY EVALUATION; FUZZY VAULT; RECOGNITION; BIOMETRICS; PCA;
D O I
10.1016/j.ins.2014.02.011
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Although authentication using biometric techniques is convenient, security issues such as the loss of personal bio-information are serious problems. However, the development of a secure biometrics scheme poses considerable challenges because users' bio-information is not precisely the same for each authentication attempt. This uncertainty during the authentication process obstructs direct application of cryptographic one-way functions in the authentication system. In this paper, we suggest a two-factor face authentication scheme using matrix transformations and a user password. Our scheme is designed with a secure cancellation feature, in that templates composed of permutation and feature vectors can be freely changed. Through experimental scenarios and results, we introduce the notable features of our scheme. Furthermore, we consider possible attacks on the proposed scheme and suggest security enhancement methods. (C) 2014 Elsevier Inc. All rights reserved.
引用
收藏
页码:1 / 20
页数:20
相关论文
共 50 条
  • [31] A Secure Two-Factor Authentication Scheme From Password-Protected Hardware Tokens
    Li, Shanshan
    Xu, Chunxiang
    Zhang, Yuan
    Zhou, Jianying
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 3525 - 3538
  • [32] TWO-FACTOR AUTHENTICATION SYSTEM
    Tsymzhitov, Gonchik
    Zudilova, Tatiana
    Voituk, Tatiana
    INFORMATICS, GEOINFORMATICS AND REMOTE SENSING CONFERENCE PROCEEDINGS, SGEM 2016, VOL I, 2016, : 505 - 512
  • [33] An Efficient Two-Factor User Authentication Framework for Wireless Sensor Networks
    Zhao, Jingying
    Guo, Hai
    Wei, Wei
    COMPUTATIONAL MECHANICS, MATERIALS AND ENGINEERING APPLICATIONS, 2012, 147 : 320 - 323
  • [34] Security Analysis of 'Two-Factor User Authentication in Wireless Sensor Networks'
    Khan, Muhammad Khurram
    Alghathbar, Khaled
    ADVANCES IN COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2010, 6059 : 55 - 60
  • [35] User-centric Two-factor Authentication Key Agreement Protocol
    Yang, Xue
    Liu, Yi-Jing
    Jiang, Qi
    Wang, Jin-Hua
    Li, Xing-Hua
    Ruan Jian Xue Bao/Journal of Software, 2024, 35 (10): : 4859 - 4875
  • [36] An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks
    He, Daojing
    Gao, Yi
    Chan, Sammy
    Chen, Chun
    Bu, Jiajun
    AD HOC & SENSOR WIRELESS NETWORKS, 2010, 10 (04) : 361 - 371
  • [37] BlinKey: A Two-Factor User Authentication Method for Virtual Reality Devices
    Zhu, Huadi
    Jin, Wenqiang
    Xiao, Mingyan
    Murali, Srinivasan
    Li, Ming
    PROCEEDINGS OF THE ACM ON INTERACTIVE MOBILE WEARABLE AND UBIQUITOUS TECHNOLOGIES-IMWUT, 2020, 4 (04):
  • [38] A Survey on Two-Factor User Authentication Schemes in Wireless Sensor Networks
    Kaur, Sharanjeet
    Khandnor, P.
    2015 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2015, : 1077 - 1081
  • [39] Robust two-factor authentication and key agreement preserving user privacy
    Jiang, Qi
    Ma, Jianfeng
    Li, Guangsong
    Yang, Li
    International Journal of Network Security, 2014, 16 (03) : 229 - 240
  • [40] Cryptanalysis and improvement of a two-factor user authentication scheme for smart home
    Kaur, Damandeep
    Kumar, Devender
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58