PalmHashing: a novel approach for dual-factor authentication

被引:32
作者
Connie, T [1 ]
Teoh, A [1 ]
Goh, M [1 ]
Ngo, D [1 ]
机构
[1] Multimedia Univ, Fac Informat Sci & Technol, Melaka 75450, Malaysia
关键词
PalmHash; two-factor authenticators; biometric; security; Palmprint recognition; token;
D O I
10.1007/s10044-004-0223-4
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Many systems require a reliable personal authentication infrastructure to recognise the identity of a claimant before granting access to him/her. Conventional secure measures include the possession of an identity card or special knowledge like password and personal identification numbers (PINs). These methods are insecure as they can be lost, forgotten and potentially be shared among a group of co-workers for a long time without change. The fact that biometric authentication is convenient and non-refutable makes it a popular approach for a personal identification system. Nevertheless, biometric methods suffer from some inherent limitations and security threats. A more practical approach is to combine two-factor or more authenticators to achieve a higher level of security. This paper proposes a novel dual-factor authenticator based on the iterated inner product between tokenised pseudorandom numbers and user-specific palmprint features. This process generates a set of user-specific compact code called PalmHash, which is highly tolerant of data offset. There is no deterministic way to get the users-specific code without having both PalmHash and the user palmprint feature. This offers strong protection against biometric fabrication. Furthermore, the proposed PalmHashing technique is able to produce zero equal error rate (EER) and yields clean separation of the genuine and imposter populations. Hence, the false acceptance rate (FAR) can be eliminated without suffering from the increased occurrence of the false rejection rate (FRR).
引用
收藏
页码:255 / 268
页数:14
相关论文
共 25 条
[1]  
[Anonymous], 1997, A Wavelet Tour of Signal Processing
[2]  
ARMINGTON J, 2002, P INT C INFR SEC INF, P1
[3]   Eigenfaces vs. Fisherfaces: Recognition using class specific linear projection [J].
Belhumeur, PN ;
Hespanha, JP ;
Kriegman, DJ .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1997, 19 (07) :711-720
[4]  
Bolle R.M., 2000, P 15 IAPR INT C PATT, V2, P835
[5]   Biometric perils and patches [J].
Bolle, RM ;
Connell, JH ;
Ratha, NK .
PATTERN RECOGNITION, 2002, 35 (12) :2727-2738
[6]   How iris recognition works [J].
Daugman, J .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2004, 14 (01) :21-30
[7]  
DAUGMAN J, 2000, TR482 CAMBR U COMP L, P482
[8]   Matching of palmprints [J].
Duta, N ;
Jain, AK ;
Mardia, KV .
PATTERN RECOGNITION LETTERS, 2002, 23 (04) :477-485
[9]  
Funada J, 1998, INT C PATT RECOG, P1849, DOI 10.1109/ICPR.1998.712091
[10]  
Isobe Y, 2001, P 34 ANN HAW INT C S, P4039