DocumentCode :
3410153
Title :
Combining steganography and biometric cryptosystems for secure mutual authentication and key exchange
Author :
Al-Assam, H. ; Rashid, Rasber ; Jassim, S.
Author_Institution :
Dept. of Appl. Comput., Univ. of Buckingham, Buckingham, UK
fYear :
2013
fDate :
9-12 Dec. 2013
Firstpage :
369
Lastpage :
374
Abstract :
Although biometric authentication is perceived to be more reliable than traditional authentication schemes, it becomes vulnerable to several attacks when it comes to remote authentication over open networks. Steganography based techniques have been used in the context of remote authentication to hide biometric feature vectors. Biometric cryptosystems, on the other hand, are proposed to enhance the security of biometric systems and to create revocable representations of individuals. However, neither steganography nor biometric cryptosystems are immune against replay attack and other remote attacks. This paper proposes a novel approach that combines steganography with biometric cryptosystems effectively to establish robust remote mutual authentication between two parties as well as key exchange that facilitates one-time stego-keys. The proposal involves the use of random orthonormal projection and multifactor biometric key binding techniques, and relies on a mutual challenge/response and one-time stego-keys to prevent replay attacks and provide non-repudiation feature. Implementation details and simulation results based on face biometric show the viability of our proposal. Furthermore, we argue that the proposed scheme enhances security while it can be both user-friendly and cost-effective.
Keywords :
biometrics (access control); computer network security; message authentication; steganography; biometric cryptosystem; biometric feature vectors; key exchange; multifactor biometric key binding technique; nonrepudiation feature; one time stego-keys; open networks; random orthonormal projection; remote attacks; replay attack prevention; secure remote mutual authentication; steganography; Authentication; Biomedical imaging; Cryptography; Data mining; Feature extraction; Reed-Solomon codes; Robustness; biometrics; challenge-response; multi-factor authentication; mutual authentication; steganography key agreement;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Internet Technology and Secured Transactions (ICITST), 2013 8th International Conference for
Conference_Location :
London
Type :
conf
DOI :
10.1109/ICITST.2013.6750224
Filename :
6750224
Link To Document :
بازگشت