Enhancing Security and Privacy in Biometrics Based Authentication System Using Multiple Secret Sharing

Author(s):  
Sonali Patil ◽  
Kapil Tajane ◽  
Janhavi Sirdeshpande
2017 ◽  
Vol 77 (13) ◽  
pp. 17307-17307
Author(s):  
Min-Ying Wu ◽  
Min-Chieh Yu ◽  
Jenq-Shiou Leu ◽  
Sheng-Kai Chen

2014 ◽  
Vol 14 (2) ◽  
pp. 5487-5493
Author(s):  
Vaishali Hirlekar

There are a continuously growing number of customers who use Online Transaction facility due to its convenience. But the security and privacy of Information may be one of the biggest concerns to the users. In face of the current security issues and the growing number of attacks and consequent frauds, new systems should be designed as to provide better authentication and identification methods. A generic and secure framework is proposed to upgrade two-factor authentication to three-factor authentication. A well designed three-factor authentication protocol authentication system can greatly improve the information assurance at low cost. In three-factor authentication, in addition to furnishing their regular password and an OTP, users will be asked to provide biometric information would irrefutably prove their identity. This fingerprint biometric information can be captured by using low cost sensors such as Web Cam. In this paper, we investigate new technique to suitably process camera images of fingertips in order to produce image which are as similar as possible to the ones coming from dedicated sensors. The proposed technique encompasses a segmentation, enhancement and matching of the fingertip image for the person's identifiaction.


2018 ◽  
Vol 7 (1.7) ◽  
pp. 169
Author(s):  
Rupavathy N ◽  
Carmel Mary Belinda M. J ◽  
Nivedhitha G

Authentication supported passwords is employed mostly in applications for laptop security and privacy. However, human actions like selecting unhealthy passwords and inputting passwords in an insecure approach are considered “the weakest link” within the authentication chain. Instead of impulsive alphanumerical strings, users tend to decide on passwords either short or purposeful for simple learning. With internet applications and mobile apps piling up, individuals will access these applications any time and any place with  numerous devices. This evolution brings nice convenience however additionally will increase the chance of exposing passwords to shoulder surfing attacks. Attackers will observe directly or use external recording devices to gather users’ credentials. To overcome this drawback, we tend to plan a unique authentication system Pass Matrix, supported graphical passwords to resist shoulder surfing attacks. With a one-time valid login indicator and circulatory horizontal and vertical bars covering the  complete scope of pass-images, Pass Matrix offers no hint for attackers to work out or slim down the password even they conduct multiple camera-based attacks. We tend to additionally enforce a Pass Matrix image on android and applied real user experiments to judge   its memorability and usefulness. From the experimental result, the proposed system achieves higher resistance shoulder surfing attacks whereas maintaining usability.


Cryptography ◽  
2020 ◽  
Vol 4 (3) ◽  
pp. 25
Author(s):  
Georgia Tsaloli ◽  
Gustavo Banegas ◽  
Aikaterini Mitrokotsa

Often clients (e.g., sensors, organizations) need to outsource joint computations that are based on some joint inputs to external untrusted servers. These computations often rely on the aggregation of data collected from multiple clients, while the clients want to guarantee that the results are correct and, thus, an output that can be publicly verified is required. However, important security and privacy challenges are raised, since clients may hold sensitive information. In this paper, we propose an approach, called verifiable additive homomorphic secret sharing (VAHSS), to achieve practical and provably secure aggregation of data, while allowing for the clients to protect their secret data and providing public verifiability i.e., everyone should be able to verify the correctness of the computed result. We propose three VAHSS constructions by combining an additive homomorphic secret sharing (HSS) scheme, for computing the sum of the clients’ secret inputs, and three different methods for achieving public verifiability, namely: (i) homomorphic collision-resistant hash functions; (ii) linear homomorphic signatures; as well as (iii) a threshold RSA signature scheme. In all three constructions, we provide a detailed correctness, security, and verifiability analysis and detailed experimental evaluations. Our results demonstrate the efficiency of our proposed constructions, especially from the client side.


2017 ◽  
Vol 77 (13) ◽  
pp. 17285-17305 ◽  
Author(s):  
Min-Ying Wu ◽  
Min-Chieh Yu ◽  
Jenq-Shiou Leu ◽  
Sheng-Kai Chen

2014 ◽  
Vol 573 ◽  
pp. 465-470
Author(s):  
C. Murukesh ◽  
T.K. Nadesh ◽  
K. Thanushkodi

Biometrics authentication is playing a vital role in providing security and privacy. This paper presents a contemporary approach for identifying an individual using unimodal biometrics. Finger vein based authentication system is a promising technology and now-a-days widely used because of its important features such as resistant to criminal tampering, high accuracy, ease of feature extraction and greater authentication speed. The feature vein patterns extracted by Contourlet transform decompose into directional sub bands in different orientations at various scales. The Support Vector Machine (SVM) classifier is used for pattern matching. Thus the experimental results shows that our proposed method tested on two different databases of finger vein images improves recognition rate with high matching speed.


Electronics ◽  
2021 ◽  
Vol 10 (4) ◽  
pp. 458
Author(s):  
Uttam Sharma ◽  
Pradeep Tomar ◽  
Syed Sadaf Ali ◽  
Neetesh Saxena ◽  
Robin Singh Bhadoria

Authentication and privacy play an important role in the present electronic world. Biometrics and especially fingerprint-based authentication are extremely useful for unlocking doors, mobile phones, etc. Fingerprint biometrics usually store the attributes of the minutia point of a fingerprint directly in the database as a user template. Existing research works have shown that from such insecure user templates, original fingerprints can be constructed. If the database gets compromised, the attacker may construct the fingerprint of a user, which is a serious security and privacy issue. Security of original fingerprints is therefore extremely important. Ali et al. have designed a system for secure fingerprint biometrics; however, their technique has various limitations and is not optimized. In this paper, first we have proposed a secure technique which is highly robust, optimized, and fast. Secondly, unlike most of the fingerprint biometrics apart from the minutiae point location and orientation, we have used the quality of minutiae points as well to construct an optimized template. Third, the template constructed is in 3D shell shape. We have rigorously evaluated the technique on nine different fingerprint databases. The obtained results from the experiments are highly promising and show the effectiveness of the technique.


Author(s):  
Soumyashree S. Panda ◽  
Debasish Jena ◽  
Priti Das

The use of digital health records, stricter health laws and the growing need for health records exchange points towards the need for an efficient security and privacy preserving mechanism. For Health Insurance management systems, multiple entities exchange health information which is used for decision making. Since multiple authoritative entities are involved, a secure and efficient information sharing protocol is required as extremely sensitive health information is exchanged among the entities. Hence this paper aims to put forward a novel a decentralized authentication system based on Blockchain known as Insurance Claim Blockchain (ICBChain) system. The proposed system ensures privacy of patients, provides secure information exchange and authentication of entities. An implementation of the proposed system is provided using Ethereum Blockchain. The security and performance analysis of the system shows its potential to satisfy Healthcare security requirements and its efficiency respectively


Sign in / Sign up

Export Citation Format

Share Document