Nothing Special   »   [go: up one dir, main page]

Skip to main content

FingerPIN: An Authentication Mechanism Integrating Fingerprints and Personal Identification Numbers

  • Conference paper
  • First Online:
Computer Vision and Image Processing (CVIP 2020)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1376))

Included in the following conference series:

Abstract

Fingerprint-based authentication has been successfully adopted in a wide range of applications, including law enforcement and immigration, due to its numerous advantages over traditional password-based authentication. However, despite the usability and accuracy of this technology, some significant concerns still exist, which can potentially hinder its further adoption. For instance, a subject’s fingerprint is permanently associated with an individual and, once stolen, cannot be replaced, thus compromising biometric-based authentication. To mitigate this concern, we propose a multi-factor authentication approach that integrates type 1 and type 3 authentication factors into a fingerprint-based personal identification number, or FingerPIN. To authenticate, a subject is required to present a sequence of fingerprints corresponding to the digits of the PIN, based on a predefined secret mapping between digits and fingers. We conduct a vulnerability analysis of the proposed scheme, and demonstrate that it is robust to the compromise of one or more of the subject’s fingerprints.

E. Marasco and M. Albanese—were partially supported by the National Science Foundation under award CNS-1822094.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    https://www.neurotechnology.com/verifinger.html.

  2. 2.

    http://www.nist.gov/services-resources/software/development-nfiq-20.

References

  1. Angeli, A.D., Coutts, M., Coventry, L., Johnson, G.I., Cameron, D., Fischer, M.H.: VIP: a visual approach to user authentication. In: Proceedings of the Working Conference on Advanced Visual Interfaces (AVI 2002), pp. 316–323. ACM, Trento, Italy (2002)

    Google Scholar 

  2. Arakala, A., Jeffers, J., Horadam, K.J.: Fuzzy Extractors for Minutiae-Based Fingerprint Authentication. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol. 4642, pp. 760–769. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-74549-5_80

    Chapter  Google Scholar 

  3. Barkadehi, M.H., Nilashi, M., Ibrahim, O., Fardi, A.Z., Samad, S.: Authentication systems: A literature review and classification. Telematics and Informatics 35(5), 1491–1511 (2018)

    Article  Google Scholar 

  4. Cantoni, V., Lacovara, T., Porta, M., Wang, H.: A study on gaze-controlled PIN input with biometric data analysis. In: Proceedings of the 19th International Conference on Computer Systems and Technologies, pp. 99–103. ACM, Ruse, Bulgaria (2018)

    Google Scholar 

  5. Go, W., Lee, K., Kwak, J.: Construction of a secure two-factor user authentication system using fingerprint information and password. J. Intell. Manuf. 25(2), 217–230 (2012). https://doi.org/10.1007/s10845-012-0669-y

    Article  Google Scholar 

  6. Henderson, L.: Multi-factor authentication fingerprinting device using biometrics. Technical report, Villanova University (2019)

    Google Scholar 

  7. Jain, A.K., Ross, A., Prabhakar, S.: An introduction to biometric recognition. IEEE Trans. Circ. Syst. Video Technol. 14(1), 4–20 (2004)

    Article  Google Scholar 

  8. Liu, J., Wang, C., Chen, Y., Saxena, N.: VibWrite: towards finger-input authentication on ubiquitous surfaces via physical vibration. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS 2017), pp. 73–87. ACM, Dallas, TX, USA (2017)

    Google Scholar 

  9. Luca, A.D., Hang, A., Brudy, F., Lindner, C., Hussmann, H.: Touch me once and I know it’s you! implicit authentication based on touch screen patterns. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI 2012), pp. 987–996. ACM, Austin, TX, USA (2012)

    Google Scholar 

  10. Maltoni, D., Maio, D., Jain, A.K., Prabhakar, S.: Handbook of Fingerprint Recognition, 2nd edn. Springer, London (2009)

    Book  Google Scholar 

  11. Marasco, E., Ross, A.: A survey on antispoofing schemes for fingerprint recognition systems. ACM Comput. Surv.47(2) (2014)

    Google Scholar 

  12. Poh, N., Chan, C.H., Kittler, J., Fierrez, J., Galbally, J.: Description of metrics for the evaluation of biometric performance. Technical Report, D3.3, BEAT (2012)

    Google Scholar 

  13. Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40(3), 614–634 (2001)

    Article  Google Scholar 

  14. Sajjad, M., et al.: CNN-based anti-spoofing two-tier multi-factor authentication system. Pattern Recogn. Lett. 126, 123–131 (2019)

    Article  Google Scholar 

  15. Souza, D., Burlamaqui, A., Souza Filho, G.: Improving biometrics authentication with a multi-factor approach based on optical interference and chaotic maps. Multimedia Tools Appl. 77(2), 2013–2032 (2017). https://doi.org/10.1007/s11042-017-4374-x

    Article  Google Scholar 

  16. Suo, X., Zhu, Y., Owen, G.S.: Graphical passwords: a survey. In: Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005). IEEE, Tucson, AZ, USA (2005)

    Google Scholar 

  17. Tabassi, E., Grother, P.: Fingerprint image quality. In: Li, S.Z., Jain, A. (eds.) Encyclopedia of Biometrics, pp. 635–643. Springer, Boston, MA (2015). https://doi.org/10.1007/978-0-387-73003-5_52

    Chapter  Google Scholar 

  18. Trader, J.: The top 5 uses of biometrics across the globe (2016). http://www.m2sys.com/blog/biometric-hardware/top-5-uses-biometrics-across-globe/

  19. Van Nguyen, T., Sae-Bae, N., Memon, N.: DRAW-A-PIN: authentication using finger-drawn pin on touch devices. Comput. Secur. 66, 115–128 (2017)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Emanuela Marasco or Massimiliano Albanese .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Marasco, E., Albanese, M. (2021). FingerPIN: An Authentication Mechanism Integrating Fingerprints and Personal Identification Numbers. In: Singh, S.K., Roy, P., Raman, B., Nagabhushan, P. (eds) Computer Vision and Image Processing. CVIP 2020. Communications in Computer and Information Science, vol 1376. Springer, Singapore. https://doi.org/10.1007/978-981-16-1086-8_44

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-1086-8_44

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-1085-1

  • Online ISBN: 978-981-16-1086-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics