CFP last date
20 December 2024
Reseach Article

Article:Palmprint and Iris based Authentication and Secure Key Exchange against Dictionary Attacks

by P.Tamil Selvi, N.Radha
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 11 - Number 11
Year of Publication: 2010
Authors: P.Tamil Selvi, N.Radha
10.5120/1629-2190

P.Tamil Selvi, N.Radha . Article:Palmprint and Iris based Authentication and Secure Key Exchange against Dictionary Attacks. International Journal of Computer Applications. 11, 11 ( December 2010), 7-12. DOI=10.5120/1629-2190

@article{ 10.5120/1629-2190,
author = { P.Tamil Selvi, N.Radha },
title = { Article:Palmprint and Iris based Authentication and Secure Key Exchange against Dictionary Attacks },
journal = { International Journal of Computer Applications },
issue_date = { December 2010 },
volume = { 11 },
number = { 11 },
month = { December },
year = { 2010 },
issn = { 0975-8887 },
pages = { 7-12 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume11/number11/1629-2190/ },
doi = { 10.5120/1629-2190 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:00:16.044794+05:30
%A P.Tamil Selvi
%A N.Radha
%T Article:Palmprint and Iris based Authentication and Secure Key Exchange against Dictionary Attacks
%J International Journal of Computer Applications
%@ 0975-8887
%V 11
%N 11
%P 7-12
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The Multimodal Biometric based user authentication systems are highly secured and efficient to use and place total trust on the authentication server where biometric verification data are stored in a central database. Such systems are prone to dictionary attacks initiated at the server side. In this paper, we propose an efficient approach based on multimodal biometrics (Palmprint and Iris) based user authentication and key exchange system. In this system, texture properties are extracted from the palmprint and iris images are stored as encrypted binary template in the server’s database, to overcome the dictionary attacks mounted by the server. The image processing techniques are used to extract a biometric measurement from the palmprint and iris. During login procedure the mutual authentication is done between the server and user and a symmetric key is generated on both sides, which could be used for further secure communication between them. Thus meet-in-the middle attack that happens between the user and the server can also be overcome. This system can be directly applied to strengthen existing password or biometric based systems without requiring additional computation.

References
  1. Arun Ross and Anil K. Jain, "Multimodal Biometrics: An Overview", in proceedings of the 12th European Signal Processing Conference, pp. 1221-1224, 2004.
  2. A.K. Jain and A. Ross, “Multi-biometric systems: special issue on multimodal interfaces that flex, adapt, and persist”, Communications of the ACM, vol. 47, no. 1, pp. 34–40, 2004.
  3. L.Hong, and A.K.Jain “Can multibiometrics improve performance?”, in Proceedings of IEEE Workshop on Automatic Identification Advanced Technologies, pp. 59–64, NJ, USA, 1999.
  4. M.Bellare, D. Pointcheval, and P. Rogaway, “Authenticated Key Exchange Secure Against Dictionary Attacks,” Advances in Cryptology Eurocrypt, 2000 pp. 139-155.
  5. J. Brainard, A. Juels, B. Kaliski, and M. Szydlo, “A New Two – Server Approach for Authentication with Short Secrets,” Proc. USENIX Security Symp., 2003.
  6. Y.J. Yang, F. Bao, and R.H. Deng, “A New Architecture for Authentication and Key Exchange Using Password for Federated Enterprises, ” Proc. 20th Federation for Information Processing Int’l Information Security Conference. (SEC ’05), 2005.
  7. Rajeswari Mukesh, A. Damodaram, V. Subbiah Bharathi, “Finger Print Based Authentication and Key Exchange System Secure Against Dictionary Attack”, IJCSNS International Journal of Computer Science and Network Security, vol.8 No.10, October 2008.
  8. D. Zhang and W. Shu, “Two novel characteristics in palm-print verification: Datum point invariance and line feature matching,” Pattern Recognition, vol. 32, pp. 691–702, 1999.
  9. Wai-Kin Kong, ”Palmprint Texture Analysis Based on Low-Resolution Images for Personal Authentication, Proceedings of the 16th International Conference on Pattern Recognition (ICPR’02) IEEE, 2002.
  10. David zhang, “Palmprint Idetification using Feature-level Fusion”, Pattern Recognition society, Published by Elseiver Ltd, 2005.
  11. A. Jagadeesan, Dr. K. Duraiswamy, “Secured Cryptographic Key Generation From Multimodal Biometrics: Feature Level Fusion of Fingerprint and Iris”, (IJCSIS) International Journal of Computer Science and Information Security, vol. 7, No. 2, February 2010.
  12. J. Daugman, “Statistical Richness of Visual Phase Information: Update on Recognizing Persons by Iris Patterns”, International Journal of Computer Vision, vol. 45, no. 1, pp. 25-38, 2001.
  13. John Daugman, “How Iris Recognition Works”, in Proceedings of International Conference on Image Processing, vol.1, pp. I-33- I-36, 2002.
  14. S. Uma Maheswari, P. Anbalagan and T.Priya, “Efficient Iris Recognition through Improvement in Iris Segmentation Algorithm”, International Journal on Graphics, Vision and Image Processing, vol. 8, no.2, pp. 29-35, 2008.
  15. D. Boneh,“The Decision Diffie-Hellman Problem”, Proc. Third Int’l Algorithmic Number Theory Symp., pp. 48-63, 1998.
Index Terms

Computer Science
Information Sciences

Keywords

Authentication Dictionary Attack Palmprint Fusion Iris Key Exchange Minutiae points