Two-factor face authentication using matrix permutation transformation and a user password

被引:26
|
作者
Kang, Jeonil [1 ]
Nyang, DaeHun [2 ]
Lee, KyungHee [3 ]
机构
[1] Inha Univ, Sch Informat & Commun Engn, Inchon 402751, South Korea
[2] Inha Univ, Sch Comp & Informat Engn, Inchon 402751, South Korea
[3] Univ Suwon, Dept Elect Engn, Suwon, South Korea
关键词
Face authentication; Biometrics security; User privacy; DISCRIMINANT-ANALYSIS; SECURITY EVALUATION; FUZZY VAULT; RECOGNITION; BIOMETRICS; PCA;
D O I
10.1016/j.ins.2014.02.011
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Although authentication using biometric techniques is convenient, security issues such as the loss of personal bio-information are serious problems. However, the development of a secure biometrics scheme poses considerable challenges because users' bio-information is not precisely the same for each authentication attempt. This uncertainty during the authentication process obstructs direct application of cryptographic one-way functions in the authentication system. In this paper, we suggest a two-factor face authentication scheme using matrix transformations and a user password. Our scheme is designed with a secure cancellation feature, in that templates composed of permutation and feature vectors can be freely changed. Through experimental scenarios and results, we introduce the notable features of our scheme. Furthermore, we consider possible attacks on the proposed scheme and suggest security enhancement methods. (C) 2014 Elsevier Inc. All rights reserved.
引用
收藏
页码:1 / 20
页数:20
相关论文
共 50 条
  • [41] On the Usability of Two-Factor Authentication
    Wang, Ding
    Wang, Ping
    INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT I, 2015, 152 : 141 - 150
  • [42] Analysis of a two-factor graphical password scheme
    Luigi Catuogno
    Clemente Galdi
    International Journal of Information Security, 2014, 13 : 421 - 437
  • [43] Scalable Two-Factor Authentication Using Historical Data
    Chan, Aldar C. -F.
    Wong, Jun Wen
    Zhou, Jianying
    Teo, Joseph
    COMPUTER SECURITY - ESORICS 2016, PT I, 2016, 9878 : 91 - 110
  • [44] Analysis of a two-factor graphical password scheme
    Catuogno, Luigi
    Galdi, Clemente
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (05) : 421 - 437
  • [45] Security analysis and design of an efficient ECC-based two-factor password authentication scheme
    Maitra, Tanmoy
    Obaidat, Mohammad S.
    Islam, Sk Hafizul
    Giri, Debasis
    Amin, Ruhul
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4166 - 4181
  • [46] An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
    Jiang, Qi
    Ma, Jianfeng
    Lu, Xiang
    Tian, Youliang
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2015, 8 (06) : 1070 - 1081
  • [47] Cryptanalysis and Security Improvements of 'Two-Factor User Authentication in Wireless Sensor Networks'
    Khan, Muhammad Khurram
    Alghathbar, Khaled
    SENSORS, 2010, 10 (03) : 2450 - 2459
  • [48] An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
    Qi Jiang
    Jianfeng Ma
    Xiang Lu
    Youliang Tian
    Peer-to-Peer Networking and Applications, 2015, 8 : 1070 - 1081
  • [49] A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION IN WIRELESS SENSOR NETWORKS
    Li, Chun-Ta
    Lee, Cheng-Chi
    Wang, Lian-Jun
    Liu, Chen-Ju
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (08): : 4821 - 4831
  • [50] On the security and improvement of a two-factor user authentication scheme in wireless sensor networks
    Da-Zhi Sun
    Jian-Xin Li
    Zhi-Yong Feng
    Zhen-Fu Cao
    Guang-Quan Xu
    Personal and Ubiquitous Computing, 2013, 17 : 895 - 905