DOI QR코드

DOI QR Code

Enhancing Accuracy Performance of Fuzzy Vault Non-Random Chaff Point Generator for Mobile Payment Authentication

  • Received : 2016.07.05
  • Accepted : 2016.07.28
  • Published : 2016.06.30

Abstract

Biometric authentication for account-based mobile payment continues to gain attention because of improvements on sensors that can collect biometric information. We propose an enhanced method for mobile payment security based on biometric authentication. In this mobile payment system, the communication between the user and the relying party is based on public key infrastructure. This method secures both the key and the biometric template in the user side using fuzzy vault biometric cryptosystems, which is based on non-random chaff point generator. In this paper, we consider an important process for the common fuzzy vault system, that is, the feature extraction method. We evaluate various feature extraction methods to enhance the accurate performance of the system.

Keywords

References

  1. W. Yang, J. Hu, J. Yang, S. Wang, and L. Shu, "Biometrics for Securing Mobile Payments:Benefits, Challenges and Solutions," Image and Signal Processing Vol. 2, 2013.
  2. C. Rathgeb and A. Uhl, "A survey on biometric cryptosystems and cancelable biometrics," EURASIP Journal on Information Security 2011.1, pp. 1-25, 2011.
  3. S. Rane, Y. Wang, S.C. Draper, and P. Ishwar, "Secure Biometrics: Concepts, Authentication Architectures & Challenges," Signal Processing Magazine, Vol. 30, No. 5, pp. 51-64, 2013.
  4. M. Hassinen, K. Hypponen, and E. Trichina, "Utilizing National Public-key Infrastructure in Mobile Payment Systems," Electronic Commerce Research and Applications, Vol. 7, No. 2, pp. 214-231, 2008. https://doi.org/10.1016/j.elerap.2007.03.006
  5. J.T. Isaac, and S. Zeadally, "Secure Mobile Payment Systems," IT Professional, Vol. 16, No.3, pp. 36-43, 2014. https://doi.org/10.1109/MITP.2014.40
  6. S. Elfakharany, A.F. Amin, and M. Zaki, Secure Mobile Payment Protocol using Asymmetric Encryption for Authorization," Journal of Network Communications and Emerging Technologies, Vol. 2, 2015.
  7. T. Dahlberg, J. Guo, and J. Ondrus," A critical review of mobile payment research," Electronic Commerce Research and Applications, Vol. 14, No. 5, pp.265-284, 2015. https://doi.org/10.1016/j.elerap.2015.07.006
  8. A. Juels and M. Sudan, "A fuzzy vault scheme," in Proc. IEEE Int. Symp. Information Theory, Lausanne, Switzerland, pp. 408, 2002.
  9. W.J. Scheirer and T.E. Boult, "Cracking Fuzzy vaults and Biometric Encryption," Biometrics Symposium, 2007.
  10. F. Benhammadi and K.B. Bey, "Password hardened fuzzy vault for fingerprint authentication system," Image and Vision Computing, Vol. 32. No. 8, pp. 487-496, 2014. https://doi.org/10.1016/j.imavis.2014.04.014
  11. M. Khalil-Hani, M. N. Marsono, and R. Bakhteri, "Biometric encryption based on a fuzzy vault scheme with a fast chaff generation algorithm," Future Generation Computer Systems, Vol. 29, No. 3, pp. 800-810, 2013. https://doi.org/10.1016/j.future.2012.02.002
  12. T. H. Nguyen, Y. Wang, Y. Ha, and R. Li, "Performance and security-enhanced fuzzy vault scheme based on ridge features for distorted fingerprints," IET Biometrics, Vol. 4, No. 1, pp. 29-39, 2015. https://doi.org/10.1049/iet-bmt.2014.0026
  13. T. K. Dang, Q. C. Truong, T. T. B. Le, and H. Truong, "Cancellable fuzzy vault with periodic transformation for biometric template protection," Biometrics, IET, pp. 1-7, 2016.
  14. M.T. Nguyen, Q.H. Truong, and T.K. Dang. "Enhance fuzzy vault security using nonrandom chaff point generator," Information Processing Letters, Vol. 116, No.1, pp. 53-64, 2016. https://doi.org/10.1016/j.ipl.2015.08.012
  15. R. Bansal, P. Sehgal and P. Bedi. "Minutiae Extraction from Fingerprint Images - a Review," International Journal of Computer Science Issues, Vol.8, Issue 5, No. 3, pp.74-85, 2011.
  16. C.I. Watson, M.D. Garris, E. Tabassi, C.L. Wilson, R.M. McCabe, S. Janet and K.Ko, "User's Guide to NIST Biometric Image Software" National Institute of Standards and Technologies. 2007.
  17. Wu Zhili, "Fingerprint Recognition," M.S. thesis, Department of Computer Science, Hong Kong Baptist University, Hongkong, 2002.
  18. A. K. Jain, A. Ross, and S. Prabhakar. "An introduction to biometric recognition," IEEE Transactions on Circuits and Systems for Video Technology, Vol. 14, No. 1, pp. 4-20, 2004. https://doi.org/10.1109/TCSVT.2004.839484
  19. A. Jain, P. Flynn, and A. A. Ross. Handbook of Biometrics. Springer Science & Business Media, 2007.
  20. Robert Fazan, "SourceAFIS - Fingerprint recognition toolkit," Jun. 2016;http://www.sourceafis.org/blog/sourceafis-1-7/
  21. Wu Zhili, "Fingerprint Recognition," Jun. 2016;http://www.comp.hkbu.edu.hk/-vincent/resPaper.htm