A Multi Factor Authentication Approach Based on Biometrics, Optical Interference and Chaotic Maps

被引:0
|
作者
Souza, D. F. L. [1 ]
Burlamaqui, A. M. F. [2 ]
Souza Filho, G. L. [3 ]
机构
[1] Univ Fed Rural Semiarido UFERSA, Mossoro, Brazil
[2] Univ Fed Rio Grande Norte UFRN, Natal, RN, Brazil
[3] Univ Fed Paraiba UFPB, Lab Aplicacoes Video Digital LAVID, Joao Pessoa, Paraiba, Brazil
关键词
Multi Factor Authentication; Chaotic Maps; Optical Interference; Biometrics; SHIFTING DIGITAL HOLOGRAPHY; PHASE-RETRIEVAL ALGORITHM; GYRATOR TRANSFORM DOMAIN; DOUBLE-IMAGE ENCRYPTION; SECURITY SYSTEM; FOURIER-TRANSFORM; PLAINTEXT ATTACK; SCHEME; KEY; ARCHITECTURE;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A novel method for user authentication based on multi factor approach is presented. For this security technique, a user authenticates into a system using a set of three characteristics related to physical, possession and knowledge factors. Biometrics authentication represents the physical factor. An optical authentication technique based on two-beam interference and chaotic maps complete the proposed scheme. In this sense, the seed of a chaotic map represents a user password corresponding to a knowledge factor and a resultant interferogram from an optical authentication technique represents the possession factor. Numerical simulation demonstrate the feasibility of our method. Moreover, we perform key space and statistical analysis to demonstrate the effectiveness of the solution.
引用
收藏
页码:1700 / 1708
页数:9
相关论文
共 50 条
  • [21] Chaotic map based multi-factor authentication protocol for underwater environment monitoring
    Diksha Rangwani
    Hari Om
    Multimedia Tools and Applications, 2024, 83 (9) : 26871 - 26900
  • [22] A Novel Chaotic Maps-Based User Authentication and Key Agreement Protocol for Multi-server Environments with Provable Security
    Li, Xiong
    Niu, Jianwei
    Kumari, Saru
    Islam, S. K. Hafizul
    Wu, Fan
    Khan, Muhammad Khurram
    Das, Ashok Kumar
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 89 (02) : 569 - 597
  • [23] An Efficient Chaotic Maps-Based Deniable Authentication Group Key Agreement Protocol
    Zhu, Hongfeng
    Zhang, Yan
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (01) : 217 - 229
  • [24] An Improved RFID Authentication Protocol with Privacy Protection Based on Chaotic Maps
    Zhu, Hongfeng
    Zhang, Yan
    JOURNAL OF INTERNET TECHNOLOGY, 2018, 19 (06): : 1777 - 1787
  • [25] Image authentication and encryption algorithm based on RSA cryptosystem and chaotic maps
    Singh, Deep
    Kumar, Sandeep
    EXPERT SYSTEMS WITH APPLICATIONS, 2025, 274
  • [26] Simultaneous and Anonymous Mobile Network Authentication Scheme Based on Chaotic Maps
    Kuo, Wen-Chung
    Lin, Chi-Sheng
    Chuang, Chen-Tsun
    Kao, Ming-Chih
    INFORMATION TECHNOLOGY AND CONTROL, 2016, 45 (02): : 208 - 213
  • [27] A ticket-based multi-server biometric authentication scheme using extended chaotic maps for telecare medical information systems
    Tian-Fu Lee
    Yin-Yu Diao
    Yi-Pei Hsieh
    Multimedia Tools and Applications, 2019, 78 : 31649 - 31672
  • [28] A ticket-based multi-server biometric authentication scheme using extended chaotic maps for telecare medical information systems
    Lee, Tian-Fu
    Diao, Yin-Yu
    Hsieh, Yi-Pei
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (22) : 31649 - 31672
  • [29] New biometrics-based authentication scheme for multi-server environment in critical systems
    Shen, Han
    Gao, Chongzhi
    He, Debiao
    Wu, Libing
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2015, 6 (06) : 825 - 834
  • [30] Multi-level authentication based on two-beam interference
    He Wen-Qin
    Peng Xiang
    Meng Xiang-Feng
    Liu Xiao-Li
    ACTA PHYSICA SINICA, 2013, 62 (06)