A REMOTE AUTHENTICATION SYSTEM USING FINGERPRINTS

2003 ◽  
Vol 03 (03) ◽  
pp. 425-446
Author(s):  
MARIUS TICO ◽  
PAULI KUOSMANEN

We present the design and implementation of a fingerprint-based remote authentication system. In this system, the fingerprint features captured at a client terminal are transmitted over a communication channel to a central server location where the verification takes place. In order to overcome replay attacks, we propose an original approach to fingerprint matching that relies on different fingerprint features for every execution of the authentication protocol. The paper also introduces an efficient approach for fingerprint image enhancement that constitutes the core of the feature extraction module included in the proposed authentication system. A public domain collection of fingerprint images is used to evaluate the system performance. The experimental results reveal that the proposed system can achieve good matching performance on this data collection and, furthermore, is able to accurately reject replay attacks.

2011 ◽  
Vol 2 (6) ◽  
pp. 171-182 ◽  
Author(s):  
Mustafa Salah Khalefa ◽  
Zaid Amin Abduljabar ◽  
Huda Ameer Zeki

Author(s):  
Harkeerat Bedi ◽  
Li Yang ◽  
Joseph M. Kizza

Fair exchange between a pair of parties can be defined as the fundamental concept of trade where none of the parties involved in the exchange have an unfair advantage over the other once the transaction completes. Fair exchange protocols are a group of protocols that provide means for accomplishing such fair exchanges. In this chapter we analyze one such protocol which offers means for fair contract signing, where two parties exchange their commitments over a pre-negotiated contract. We show that this protocol is not entirely fair and illustrate the possibilities of one party cheating by obtaining the other’s commitment and not providing theirs. We also analyze a revised version of this protocol which offers better fairness by handling many of the weaknesses. Both these protocols however fail to handle the possibilities of replay attacks where an intruder replays messages sent earlier from one party to the other. Our proposed protocol improves upon these protocols by addressing to the weaknesses which leads to such replay attacks. We implement a complete working system which provides fair contract signing along with properties like user authentication and efficient password management achieved by using a fingerprint based authentication system and features like confidentiality, data-integrity and non-repudiation accomplished through implementation of cryptographic algorithms based on elliptic curves.


Author(s):  
Saifullah Khalid

Fingerprint recognition systems are widely used in the field of biometrics. Many existing fingerprint sensors acquire fingerprint images as the user's fingerprint is contacted on a solid flat sensor. Because of this contact, input images from the same finger can be quite different and there are latent fingerprint issues that can lead to forgery and hygienic problems. For these reasons, a touchless fingerprint recognition system has been investigated, in which a fingerprint image can be captured without contact. While this system can solve the problems which arise through contact of the user's finger, other challenges emerge.


Sign in / Sign up

Export Citation Format

Share Document