DocumentCode :
2925312
Title :
A cryptographic approach to prevent a spoof attack for secure information retrieval in a biometrie system
Author :
Hosur, R. ; Hatture, S.M. ; Karchi, R.P.
Author_Institution :
Dept. of CSE, Basaweshwar Eng. Coll., Bagalkot, India
fYear :
2012
fDate :
Oct. 30 2012-Nov. 2 2012
Firstpage :
326
Lastpage :
331
Abstract :
Biometric technologies´ have become the basis for highly secure identification and personnel verification in authentication and identification systems, based on the physical identifiable details or behavioral characteristics which cannot be imposter easily. Hence, the system has been treated to be the tough security measures to identify the user being genuine by avoiding the third party attack. But these systems are unable to judge whether the user who is providing the required authentication details is an impostor or genuine. To eliminate this flaw in biometric based security systems, the model proposed in this paper can be embedded in existing security systems to prevent the spoof attack. The proposed model comprises of two independent models namely Cryptographic based authentication system (model 1) and Text prompted authentication system (model 2). Model 1 has been designed by the most efficient cryptographic algorithm RSA which generates a secret key by using a pseudo-random number given by user for secure system access. In model 2, the user is made interactive with the system by prompting a question from a set of 15 questions, and authenticating the user with the help of correct answer provided by user. To provide higher level of security, MD5 (Message Digest 5) algorithm is integrated with RSA. The developed models provide promising level of security along with a biometric trait.
Keywords :
biometrics (access control); information retrieval; public key cryptography; text analysis; MD5 algorithm; Message Digest 5 algorithm; biometric based security systems; biometric trait; cryptographic algorithm RSA; cryptographic approach; cryptographic based authentication system; identification systems; information retrieval security; pseudo-random number; secret key generation; spoof attack prevention; text prompted authentication system; third party attack; Communications technology; Decision support systems; Aliveness Detection; AntiSpoofing; Biometrie traits; Cipher text; Secured data; User Authentication;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information and Communication Technologies (WICT), 2012 World Congress on
Conference_Location :
Trivandrum
Print_ISBN :
978-1-4673-4806-5
Type :
conf
DOI :
10.1109/WICT.2012.6409097
Filename :
6409097
Link To Document :
بازگشت