TY - GEN
T1 - Enhanced fingerprint system with user password
AU - Pooja, S.
AU - Saritha, R.
N1 - Publisher Copyright:
© 2016 IEEE.
PY - 2017/9/27
Y1 - 2017/9/27
N2 - User authentication based on biometrie system has several advantages over traditional systems which are only password-based. This architecture, known as fingerprint-cryptosystem has cryptography and fingerprint merged together, that securely stores the private key for cryptosystem. The private key of AES system is 128 bit long and is usually alphanumeric. Thus for a user to remember such a long password is cumbersome, hence a system called Fuzzy Vault exist which securely stores the private key. This architecture makes use of fingerprint features know as minutia points. Minutia points are evaluated on polynomial, whose coefficients are the secret key which is to be stored securely. Thus the evaluated values and the minutia points are stored securely in vault. The security of this system depends on the infeasibility of the polynomial reconstruction problem. This paper proposes a second layer of protection using password generated from user, which further does a logical xor computations. This paper thus suggests that even if biometric feature is compromised, without the user password, an attacker won't have access to vault. Thus to get access to the private key, an attacker must have access both to fingerprint and user password, to securely retrieve the key.
AB - User authentication based on biometrie system has several advantages over traditional systems which are only password-based. This architecture, known as fingerprint-cryptosystem has cryptography and fingerprint merged together, that securely stores the private key for cryptosystem. The private key of AES system is 128 bit long and is usually alphanumeric. Thus for a user to remember such a long password is cumbersome, hence a system called Fuzzy Vault exist which securely stores the private key. This architecture makes use of fingerprint features know as minutia points. Minutia points are evaluated on polynomial, whose coefficients are the secret key which is to be stored securely. Thus the evaluated values and the minutia points are stored securely in vault. The security of this system depends on the infeasibility of the polynomial reconstruction problem. This paper proposes a second layer of protection using password generated from user, which further does a logical xor computations. This paper thus suggests that even if biometric feature is compromised, without the user password, an attacker won't have access to vault. Thus to get access to the private key, an attacker must have access both to fingerprint and user password, to securely retrieve the key.
UR - https://www.scopus.com/pages/publications/85034216273
UR - https://www.scopus.com/pages/publications/85034216273#tab=citedBy
U2 - 10.1109/CIMCA.2016.8053281
DO - 10.1109/CIMCA.2016.8053281
M3 - Conference contribution
AN - SCOPUS:85034216273
T3 - 2016 International Conference on Circuits, Controls, Communications and Computing, I4C 2016
BT - 2016 International Conference on Circuits, Controls, Communications and Computing, I4C 2016
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2016 International Conference on Circuits, Controls, Communications and Computing, I4C 2016
Y2 - 4 October 2016 through 6 October 2016
ER -