Two-factor face authentication using matrix permutation transformation and a user password

被引:28
作者
Kang, Jeonil [1 ]
Nyang, DaeHun [2 ]
Lee, KyungHee [3 ]
机构
[1] Inha Univ, Sch Informat & Commun Engn, Inchon 402751, South Korea
[2] Inha Univ, Sch Comp & Informat Engn, Inchon 402751, South Korea
[3] Univ Suwon, Dept Elect Engn, Suwon, South Korea
关键词
Face authentication; Biometrics security; User privacy; DISCRIMINANT-ANALYSIS; SECURITY EVALUATION; FUZZY VAULT; RECOGNITION; BIOMETRICS; PCA;
D O I
10.1016/j.ins.2014.02.011
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Although authentication using biometric techniques is convenient, security issues such as the loss of personal bio-information are serious problems. However, the development of a secure biometrics scheme poses considerable challenges because users' bio-information is not precisely the same for each authentication attempt. This uncertainty during the authentication process obstructs direct application of cryptographic one-way functions in the authentication system. In this paper, we suggest a two-factor face authentication scheme using matrix transformations and a user password. Our scheme is designed with a secure cancellation feature, in that templates composed of permutation and feature vectors can be freely changed. Through experimental scenarios and results, we introduce the notable features of our scheme. Furthermore, we consider possible attacks on the proposed scheme and suggest security enhancement methods. (C) 2014 Elsevier Inc. All rights reserved.
引用
收藏
页码:1 / 20
页数:20
相关论文
共 60 条
[1]   2D and 3D face recognition: A survey [J].
Abate, Andrea F. ;
Nappi, Michele ;
Riccio, Daniel ;
Sabatino, Gabriele .
PATTERN RECOGNITION LETTERS, 2007, 28 (14) :1885-1906
[2]   Security evaluation of biometric keys [J].
Al-Assam, Hisham ;
Jassim, Sabah .
COMPUTERS & SECURITY, 2012, 31 (02) :151-163
[3]  
[Anonymous], SPIE DEF SEC S CIT
[4]  
[Anonymous], 2002, P AUTOID
[5]   Face recognition by independent component analysis [J].
Bartlett, MS ;
Movellan, JR ;
Sejnowski, TJ .
IEEE TRANSACTIONS ON NEURAL NETWORKS, 2002, 13 (06) :1450-1464
[6]   Eigenfaces vs. Fisherfaces: Recognition using class specific linear projection [J].
Belhumeur, PN ;
Hespanha, JP ;
Kriegman, DJ .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1997, 19 (07) :711-720
[7]   Security evaluation of biometric authentication systems under real spoofing attacks [J].
Biggio, B. ;
Akhtar, Z. ;
Fumera, G. ;
Marcialis, G. L. ;
Roli, F. .
IET BIOMETRICS, 2012, 1 (01) :11-24
[8]  
Bingham E., 2001, KDD-2001. Proceedings of the Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, P245, DOI 10.1145/502512.502546
[9]   A new LDA-based face recognition system which can solve the small sample size problem [J].
Chen, LF ;
Liao, HYM ;
Ko, MT ;
Lin, JC ;
Yu, GJ .
PATTERN RECOGNITION, 2000, 33 (10) :1713-1726
[10]  
da Silva Pinto A., 2012, 2012 XXV SIBGRAPI - Conference on Graphics, Patterns and Images (SIBGRAPI 2012), P221, DOI 10.1109/SIBGRAPI.2012.38