Abstract
Fingerprint-based authentication has been successfully adopted in a wide range of applications, including law enforcement and immigration, due to its numerous advantages over traditional password-based authentication. However, despite the usability and accuracy of this technology, some significant concerns still exist, which can potentially hinder its further adoption. For instance, a subject’s fingerprint is permanently associated with an individual and, once stolen, cannot be replaced, thus compromising biometric-based authentication. To mitigate this concern, we propose a multi-factor authentication approach that integrates type 1 and type 3 authentication factors into a fingerprint-based personal identification number, or FingerPIN. To authenticate, a subject is required to present a sequence of fingerprints corresponding to the digits of the PIN, based on a predefined secret mapping between digits and fingers. We conduct a vulnerability analysis of the proposed scheme, and demonstrate that it is robust to the compromise of one or more of the subject’s fingerprints.
E. Marasco and M. Albanese—were partially supported by the National Science Foundation under award CNS-1822094.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Angeli, A.D., Coutts, M., Coventry, L., Johnson, G.I., Cameron, D., Fischer, M.H.: VIP: a visual approach to user authentication. In: Proceedings of the Working Conference on Advanced Visual Interfaces (AVI 2002), pp. 316–323. ACM, Trento, Italy (2002)
Arakala, A., Jeffers, J., Horadam, K.J.: Fuzzy Extractors for Minutiae-Based Fingerprint Authentication. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol. 4642, pp. 760–769. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-74549-5_80
Barkadehi, M.H., Nilashi, M., Ibrahim, O., Fardi, A.Z., Samad, S.: Authentication systems: A literature review and classification. Telematics and Informatics 35(5), 1491–1511 (2018)
Cantoni, V., Lacovara, T., Porta, M., Wang, H.: A study on gaze-controlled PIN input with biometric data analysis. In: Proceedings of the 19th International Conference on Computer Systems and Technologies, pp. 99–103. ACM, Ruse, Bulgaria (2018)
Go, W., Lee, K., Kwak, J.: Construction of a secure two-factor user authentication system using fingerprint information and password. J. Intell. Manuf. 25(2), 217–230 (2012). https://doi.org/10.1007/s10845-012-0669-y
Henderson, L.: Multi-factor authentication fingerprinting device using biometrics. Technical report, Villanova University (2019)
Jain, A.K., Ross, A., Prabhakar, S.: An introduction to biometric recognition. IEEE Trans. Circ. Syst. Video Technol. 14(1), 4–20 (2004)
Liu, J., Wang, C., Chen, Y., Saxena, N.: VibWrite: towards finger-input authentication on ubiquitous surfaces via physical vibration. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS 2017), pp. 73–87. ACM, Dallas, TX, USA (2017)
Luca, A.D., Hang, A., Brudy, F., Lindner, C., Hussmann, H.: Touch me once and I know it’s you! implicit authentication based on touch screen patterns. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI 2012), pp. 987–996. ACM, Austin, TX, USA (2012)
Maltoni, D., Maio, D., Jain, A.K., Prabhakar, S.: Handbook of Fingerprint Recognition, 2nd edn. Springer, London (2009)
Marasco, E., Ross, A.: A survey on antispoofing schemes for fingerprint recognition systems. ACM Comput. Surv.47(2) (2014)
Poh, N., Chan, C.H., Kittler, J., Fierrez, J., Galbally, J.: Description of metrics for the evaluation of biometric performance. Technical Report, D3.3, BEAT (2012)
Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40(3), 614–634 (2001)
Sajjad, M., et al.: CNN-based anti-spoofing two-tier multi-factor authentication system. Pattern Recogn. Lett. 126, 123–131 (2019)
Souza, D., Burlamaqui, A., Souza Filho, G.: Improving biometrics authentication with a multi-factor approach based on optical interference and chaotic maps. Multimedia Tools Appl. 77(2), 2013–2032 (2017). https://doi.org/10.1007/s11042-017-4374-x
Suo, X., Zhu, Y., Owen, G.S.: Graphical passwords: a survey. In: Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005). IEEE, Tucson, AZ, USA (2005)
Tabassi, E., Grother, P.: Fingerprint image quality. In: Li, S.Z., Jain, A. (eds.) Encyclopedia of Biometrics, pp. 635–643. Springer, Boston, MA (2015). https://doi.org/10.1007/978-0-387-73003-5_52
Trader, J.: The top 5 uses of biometrics across the globe (2016). http://www.m2sys.com/blog/biometric-hardware/top-5-uses-biometrics-across-globe/
Van Nguyen, T., Sae-Bae, N., Memon, N.: DRAW-A-PIN: authentication using finger-drawn pin on touch devices. Comput. Secur. 66, 115–128 (2017)
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Marasco, E., Albanese, M. (2021). FingerPIN: An Authentication Mechanism Integrating Fingerprints and Personal Identification Numbers. In: Singh, S.K., Roy, P., Raman, B., Nagabhushan, P. (eds) Computer Vision and Image Processing. CVIP 2020. Communications in Computer and Information Science, vol 1376. Springer, Singapore. https://doi.org/10.1007/978-981-16-1086-8_44
Download citation
DOI: https://doi.org/10.1007/978-981-16-1086-8_44
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-1085-1
Online ISBN: 978-981-16-1086-8
eBook Packages: Computer ScienceComputer Science (R0)