Skip to main content

Secure Fingerprint Authentication

  • Chapter
Biometric Solutions

Abstract

Biometrics-based authentication systems offer advantages over the present practices of knowledge and/or possession-based authentication systems. However, when using biometrics, the overall authentication architecture needs to be reexamined to ensure that no new weak security points are introduced. After analyzing a pattern recognition-based threat model of a biometrics authentication system, this chapter describes secure fingerprint authentication. Several solutions are proposed to alleviate the threats using conventional encryption as well as novel techniques that exploit the richness of biometrics data. The proposed methods are applicable in many application areas. These includes system security, electronic commerce security, point of sale, point of entry/exit and point of access. We also argue that an authentication scheme with both smart card and biometrics improves the overall security of a system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. W. Bender, D. Gruhl, N. Morimoto and A. Lu. Techniques for Data Hiding. IBM Systems Journal, 35(3&4):313–335, 1996.

    Article  Google Scholar 

  2. C. Brislawn, J. Bradley, R. Onyshczak and T. Hopper. The FBI Compression Standard for Digitized Fingerprint Images. In Proc. of the SPIE, vol. 2847, pages 344–355, 1996.

    Chapter  Google Scholar 

  3. K. Brownlee. Method and Apparatus for Distinguishing a Human Finger from a Reproduction of a Fingerprint. US Patent Number: 6,292,576, 2001.

    Google Scholar 

  4. J.F. Dhem and N. Feyt. Hardware and Software Symbiosis Helps Smart Card Evolution. IEEE Micro, (Nov.–Dec.):14–25, 2001.

    Google Scholar 

  5. FBI. WSQ Gray-scale Fingerprint Image Compression Specification. Technical Report CJIS FBI, IAFIS-IC-0110v2, Federal Bureau of Investigation, 1993.

    Google Scholar 

  6. S. Fukuzumi. Living Body Discriminating Apparatus. US Patent Number: 6,181,808, 2001.

    Google Scholar 

  7. R. Germain. Large Scale Systems. In Jain, A., Bolle, R. and Pankanti, S., editors, Biometrics: Personal Identification in Networked Society, Kluwer Academie Press, Boston, pages 311–326, 1999.

    Google Scholar 

  8. S. Grimnes and G. Martinsen. Bioimpedance and Bioelectricity Basics. Academic Press, New York, 2000.

    Google Scholar 

  9. E. Hamann, H. Henn, T. Schack and F. Seliger. Securing e-business Applications Using Smart Cards. IBM Systems Journal, 40(3):635–647, 2001.

    Article  Google Scholar 

  10. C.T. Hsu and J.L. Wu. Hidden Digital Watermarks in Images. IEEE Trans. on Image Processing, 8(1):58–68, 1999.

    Article  Google Scholar 

  11. A. Jain, L. Hong and S. Pankanti. Biometrics Identification. Communications of the ACM, 43(2):91–98, 2000.

    Article  Google Scholar 

  12. A. Jain, L. Hong, S. Pankanti and R. Bolle. An Identity Authentication System Using Fingerprints. Proceedings of the IEEE, 85(9):1365–1388, 1997.

    Article  Google Scholar 

  13. O. Martinsen and S. Grimnes. Measurement of Moisture Content in Skin. US Patent Number: 5,738,107, 1998.

    Google Scholar 

  14. N. Memon and P.W. Wong. Protecting Digital Media Content. Communications of the ACM, 41(7):35–43, 1998.

    Article  Google Scholar 

  15. B. Miller. Vital Signs of Identity. IEEE Spectrum, 31(2):22–30, 1994.

    Article  Google Scholar 

  16. Y.S. Moon, H.C. Ho, K.L. Ng, S.F. Wan and S.T. Wong. Collaborative Fingerprint Authentication by Smart Card and a Trusted Host. In Proc. of the 2000 Candian Conf. on Electrical and Computer Engineering, pages 108–112, 2000.

    Google Scholar 

  17. A. Noore. Highly Robust Biometric Smart Card Design. IEEE Transactions on Consumer Electronics, 46(4): 1059–1063, 2000.

    Article  Google Scholar 

  18. L. O’Gorman. Practical Systems for Personal Fingerprint Authentication. IEEE Computer, 33(2):58–60, 2000.

    Google Scholar 

  19. F.A. Petitcolas, R.J. Anderson and M.G. Kuhn. Information Hiding — A Survey. In Proc. of the IEEE, 87(7):1062–1078, 1999.

    Google Scholar 

  20. N. Ratha and R. Bolle. Smart Card Based Authentication. In A. Jain, R. Bolle and S. Pankanti, editors, Biometrics: Personal Identification in Networked Society, Kluwer Academic Press, Boston, pages 369–384, 1999.

    Google Scholar 

  21. N. K. Ratha, J. H. Connell and R.M. Bolle. An Analysis of Minutiae Matching Strength. In Proc. of IEEE 3rd Int. Conf. Audio- and Video-Based Biometric Person Authentication, AVBPA 2001, pages 223–228, 2001.

    Google Scholar 

  22. N.K. Ratha, J.H. Connell and R.M. Bolle. Enhancing Security and Privacy in Biometrics-based Authentication Systems. IBM Systems Journal, 40(3):614–634, 2001.

    Article  Google Scholar 

  23. N.K. Ratha, K. Karu, S. Chen and A. Jain. A Real-time Matching System for Large Fingerprint Database. IEEE Trans. on Pattern Analysis and Machine Intelligence, 18(8):799–813, 1996.

    Article  Google Scholar 

  24. T. Rowley. Silicon Fingerprint Readers: A Solid State Approach to Biometrics. In Proc. of the CardTech/SecureTech, vol. 1, pages 152–159, 1997.

    Google Scholar 

  25. B. Schneier. Applied Cryptography. Wiley, New York, 1996.

    Google Scholar 

  26. B. Schneier. Security Pitfalls in Cryptography. In Proc. of the CardTech/SecureTech, pages 621–626, 1998.

    Google Scholar 

  27. B. Schneier. The Uses and Abuses of Biometrics. Communications of the ACM, 42(8):136, 1999.

    Article  Google Scholar 

  28. D. Setlak. Fingerprint Sensor having Spoof Reduction Features and Related Methods. US Patent Number: 5,953,441, 1999.

    Google Scholar 

  29. S. Smith and D. Safford. Practical Sever Privacy with Secure Coprocessors. IBM Systems Journal, 40(3):683–695, 2001.

    Article  Google Scholar 

  30. W. Stallings. Network and Internetwork Security. Prentice Hall, Englewood Cliffs, 1995.

    Google Scholar 

  31. M.D. Swanson, M. Kobayashi, and A.H. Tewfik. Multi-media Data Embedding and Watermarking Technologies. In Proc. of the IEEE, 86(6):1064–1087, 1998.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer Science+Business Media New York

About this chapter

Cite this chapter

Ratha, N.K., Connell, J.H., Bolle, R.M. (2002). Secure Fingerprint Authentication. In: Zhang, D. (eds) Biometric Solutions. The Springer International Series in Engineering and Computer Science, vol 697. Springer, Boston, MA. https://doi.org/10.1007/978-1-4615-1053-6_11

Download citation

  • DOI: https://doi.org/10.1007/978-1-4615-1053-6_11

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4613-5371-3

  • Online ISBN: 978-1-4615-1053-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics