Abstract
Biometrics-based authentication systems offer advantages over the present practices of knowledge and/or possession-based authentication systems. However, when using biometrics, the overall authentication architecture needs to be reexamined to ensure that no new weak security points are introduced. After analyzing a pattern recognition-based threat model of a biometrics authentication system, this chapter describes secure fingerprint authentication. Several solutions are proposed to alleviate the threats using conventional encryption as well as novel techniques that exploit the richness of biometrics data. The proposed methods are applicable in many application areas. These includes system security, electronic commerce security, point of sale, point of entry/exit and point of access. We also argue that an authentication scheme with both smart card and biometrics improves the overall security of a system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
W. Bender, D. Gruhl, N. Morimoto and A. Lu. Techniques for Data Hiding. IBM Systems Journal, 35(3&4):313–335, 1996.
C. Brislawn, J. Bradley, R. Onyshczak and T. Hopper. The FBI Compression Standard for Digitized Fingerprint Images. In Proc. of the SPIE, vol. 2847, pages 344–355, 1996.
K. Brownlee. Method and Apparatus for Distinguishing a Human Finger from a Reproduction of a Fingerprint. US Patent Number: 6,292,576, 2001.
J.F. Dhem and N. Feyt. Hardware and Software Symbiosis Helps Smart Card Evolution. IEEE Micro, (Nov.–Dec.):14–25, 2001.
FBI. WSQ Gray-scale Fingerprint Image Compression Specification. Technical Report CJIS FBI, IAFIS-IC-0110v2, Federal Bureau of Investigation, 1993.
S. Fukuzumi. Living Body Discriminating Apparatus. US Patent Number: 6,181,808, 2001.
R. Germain. Large Scale Systems. In Jain, A., Bolle, R. and Pankanti, S., editors, Biometrics: Personal Identification in Networked Society, Kluwer Academie Press, Boston, pages 311–326, 1999.
S. Grimnes and G. Martinsen. Bioimpedance and Bioelectricity Basics. Academic Press, New York, 2000.
E. Hamann, H. Henn, T. Schack and F. Seliger. Securing e-business Applications Using Smart Cards. IBM Systems Journal, 40(3):635–647, 2001.
C.T. Hsu and J.L. Wu. Hidden Digital Watermarks in Images. IEEE Trans. on Image Processing, 8(1):58–68, 1999.
A. Jain, L. Hong and S. Pankanti. Biometrics Identification. Communications of the ACM, 43(2):91–98, 2000.
A. Jain, L. Hong, S. Pankanti and R. Bolle. An Identity Authentication System Using Fingerprints. Proceedings of the IEEE, 85(9):1365–1388, 1997.
O. Martinsen and S. Grimnes. Measurement of Moisture Content in Skin. US Patent Number: 5,738,107, 1998.
N. Memon and P.W. Wong. Protecting Digital Media Content. Communications of the ACM, 41(7):35–43, 1998.
B. Miller. Vital Signs of Identity. IEEE Spectrum, 31(2):22–30, 1994.
Y.S. Moon, H.C. Ho, K.L. Ng, S.F. Wan and S.T. Wong. Collaborative Fingerprint Authentication by Smart Card and a Trusted Host. In Proc. of the 2000 Candian Conf. on Electrical and Computer Engineering, pages 108–112, 2000.
A. Noore. Highly Robust Biometric Smart Card Design. IEEE Transactions on Consumer Electronics, 46(4): 1059–1063, 2000.
L. O’Gorman. Practical Systems for Personal Fingerprint Authentication. IEEE Computer, 33(2):58–60, 2000.
F.A. Petitcolas, R.J. Anderson and M.G. Kuhn. Information Hiding — A Survey. In Proc. of the IEEE, 87(7):1062–1078, 1999.
N. Ratha and R. Bolle. Smart Card Based Authentication. In A. Jain, R. Bolle and S. Pankanti, editors, Biometrics: Personal Identification in Networked Society, Kluwer Academic Press, Boston, pages 369–384, 1999.
N. K. Ratha, J. H. Connell and R.M. Bolle. An Analysis of Minutiae Matching Strength. In Proc. of IEEE 3rd Int. Conf. Audio- and Video-Based Biometric Person Authentication, AVBPA 2001, pages 223–228, 2001.
N.K. Ratha, J.H. Connell and R.M. Bolle. Enhancing Security and Privacy in Biometrics-based Authentication Systems. IBM Systems Journal, 40(3):614–634, 2001.
N.K. Ratha, K. Karu, S. Chen and A. Jain. A Real-time Matching System for Large Fingerprint Database. IEEE Trans. on Pattern Analysis and Machine Intelligence, 18(8):799–813, 1996.
T. Rowley. Silicon Fingerprint Readers: A Solid State Approach to Biometrics. In Proc. of the CardTech/SecureTech, vol. 1, pages 152–159, 1997.
B. Schneier. Applied Cryptography. Wiley, New York, 1996.
B. Schneier. Security Pitfalls in Cryptography. In Proc. of the CardTech/SecureTech, pages 621–626, 1998.
B. Schneier. The Uses and Abuses of Biometrics. Communications of the ACM, 42(8):136, 1999.
D. Setlak. Fingerprint Sensor having Spoof Reduction Features and Related Methods. US Patent Number: 5,953,441, 1999.
S. Smith and D. Safford. Practical Sever Privacy with Secure Coprocessors. IBM Systems Journal, 40(3):683–695, 2001.
W. Stallings. Network and Internetwork Security. Prentice Hall, Englewood Cliffs, 1995.
M.D. Swanson, M. Kobayashi, and A.H. Tewfik. Multi-media Data Embedding and Watermarking Technologies. In Proc. of the IEEE, 86(6):1064–1087, 1998.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer Science+Business Media New York
About this chapter
Cite this chapter
Ratha, N.K., Connell, J.H., Bolle, R.M. (2002). Secure Fingerprint Authentication. In: Zhang, D. (eds) Biometric Solutions. The Springer International Series in Engineering and Computer Science, vol 697. Springer, Boston, MA. https://doi.org/10.1007/978-1-4615-1053-6_11
Download citation
DOI: https://doi.org/10.1007/978-1-4615-1053-6_11
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4613-5371-3
Online ISBN: 978-1-4615-1053-6
eBook Packages: Springer Book Archive