Abstract
We propose a method to improve biometric authentication systems using a multifactor approach. For this security scheme a user authenticates successfully using a set of three characteristics related to physical, possession and knowledge factors. Besides biometric authentication representing the physical factor, we propose the use of an optical authentication technique based on two-beam interference and chaotic maps. In this sense, the seed of a chaotic map represents a user password corresponding to a knowledge factor and a resultant interferogram from optical authentication technique is used as a possession factor. The feasibility of our method is tested using numerical simulation. Moreover, key space and statistical analysis are performed to demonstrate the effectiveness of the solution.
Similar content being viewed by others
References
Abraham J, Gao J, Kwan P (2011) Fingerprint matching using a hybrid shape and orientation descriptor. INTECH Open Access Publisher
Abuturab MR (2013) Color image security system based on discrete hartley transform in gyrator transform domain. Opt Lasers Eng 51(3):317–324
Abuturab MR (2013) Information authentication system using interference of two beams in gyrator transform domain. Appl Opt 52(21):5133–5142
Alfalou A, Mansour A (2009) Double random phase encryption scheme to multiplex and simultaneous encode multiple images. Appl Opt 48(31):5933–5947
Amin R, Islam SH, Biswas G, Khan MK, Leng L, Kumar N (2016) Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks. Comput Netw 101:42–62
Anzaku ET, Sohn H, Ro YM (2010) Multi-factor authentication using fingerprints and user-specific random projection. In: APWeb, pp 415–418
Blömer J, Seifert JP (2003) Fault based cryptanalysis of the advanced encryption standard (AES). Springer, Berlin Heidelberg, pp 162–181
Borujeni SE, Eshghi M (2013) Chaotic image encryption system using phase-magnitude transformation and pixel substitution. Telecommun Syst 52(2):525–537
Cavoukian A, Stoianov A et al (2009) Biometric encryption chapter from the encyclopedia of biometrics. Office of the Information and Privacy Commissioner
Chen Jx, Zhu Zl, Liu Z, Fu C, Zhang Lb, Yu H (2014) A novel double-image encryption scheme based on cross-image pixel scrambling in gyrator domains. Opt Express 22(6):7349–7361
Chen Jx, Zhu Zl, Fu C, Zhang Lb, Yu H (2015) Analysis and improvement of a double-image encryption scheme using pixel scrambling technique in gyrator domains. Opt Lasers Eng 66:1–9
Daemen J, Rijmen V (2013) The design of Rijndael: AES-the advanced encryption standard. Springer Science & Business Media
Dodis Y, Ostrovsky R, Reyzin L, Smith A (2008) Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM J Comput 38(1):97–139
Elshamy AM, Rashed AN, Mohamed AENA, Faragalla OS, Mu Y, Alshebeili SA, Abd El-Samie F (2013) Optical image encryption based on chaotic baker map and double random phase encoding. J Lightwave Technol 31(15):2533–2539
Fan D, Meng X, Wang Y, Yang X, Peng X, He W, Dong G, Chen H (2013) Optical identity authentication scheme based on elliptic curve digital signature algorithm and phase retrieval algorithm. Appl Opt 52(23):5645–5652
Fan D, Meng X, Wang Y, Yang X, Pan X, Peng X, He W, Dong G, Chen H (2015) Multiple-image authentication with a cascaded multilevel architecture based on amplitude field random sampling and phase information multiplexing. Appl Opt 54(11):3204–3215
Feng YC, Yuen PC, Jain AK (2010) A hybrid approach for generating secure and discriminating face template. IEEE Trans Inf Forens Secur 5(1):103–117
Fleischhacker N, Manulis M, Azodi A (2014) A modular framework for multi-factor authentication and key exchange. In: Security standardisation research. Springer, pp 190–214
Geisel T, Fairen V (1984) Statistical properties of chaos in chebyshev maps. Phys Lett A 105(6):263–266
Go W, Lee K, Kwak J (2014) Construction of a secure two-factor user authentication system using fingerprint information and password. J Intell Manuf 25 (2):217–230
Haupt G, Mozer T (2015) Assessing biometric authentication: a holistic approach to accuracy. Biom Technol Today 2015(3):5–8
He W, Peng X, Meng X, Liu X (2012) Optical hierarchical authentication based on interference and hash function. Appl Opt 51(32):7750–7757
Huang X, Xiang Y, Chonka A, Zhou J, Deng RH (2011) A generic framework for three-factor authentication: preserving security and privacy in distributed systems. IEEE Trans Parallel Distrib Syst 22(8):1390–1397
Jassim S, Al-Assam H, Sellahewa H (2009) Improving performance and security of biometrics using efficient and stable random projection techniques. In: Proceedings of 6th international symposium on image and signal processing and analysis, 2009. ISPA 2009. IEEE, pp 556–561
Javidi B, Sergent A (1997) Fully phase encoded key and biometrics for security verification. Optical Eng 36(3):935–942
Javidi B, Ahouzi E (1998) Optical security system with fourier plane encoding. Appl Opt 37(26):6247–6255
Kang J, Nyang D, Lee K (2014) Two-factor face authentication using matrix permutation transformation and a user password. Inform Sci 269:1–20
Khan MK, Zhang J (2008) Multimodal face and fingerprint biometrics authentication on space-limited tokens. Neurocomputing 71(13):3026–3031
Khan MK, Zhang J, Tian L (2007) Chaotic secure content-based hidden transmission of biometric templates. Chaos Solitons Fract 32(5):1749–1759
Khan SH, Akbar MA, Shahzad F, Farooq M, Khan Z (2015) Secure biometric template generation for multi-factor authentication. Pattern Recog 48(2):458–472
Kim J, Choi J, An J, Kim N, Lee K (2005) Digital holographic security system based on random phase encoded reference beams and fingerprint identification. Opt Commun 247(4):265–274
Kong D, Shen X, Shen Y, Wang X (2014) Multi-image encryption based on interference of computer generated hologram. Optik-Int J Light Electron Opt 125 (10):2365–2368
Kumar A, Lee HJ (2013) Multi-factor authentication process using more than one token with watermark security. In: Future information communication technology and applications. Springer, pp 579–587
Kumar P, Joseph J, Singh K (2011) Optical image encryption using a jigsaw transform for silhouette removal in interference-based methods and decryption with a single spatial light modulator. Appl Opt 50(13):1805–1811
Kwan PW, Gao J, Guo Y (2006) Fingerprint matching using enhanced shape context. In: Proceedings of the image and vision computing New Zealand. Citeseer, pp 115–120
Leng L, Zhang J (2011) Dual-key-binding cancelable palmprint cryptosystem for palmprint protection and information security. J Netw Comput Appl 34(6):1979–1989
Leng L, Zhang J (2011) Dual-key-binding cancelable palmprint cryptosystem for palmprint protection and information security. J Netw Comput Appl 34(6):1979–1989. Control and Optimization over Wireless Networks
Leng L, Zhang J (2013) Palmhash code vs. palmphasor code. Neurocomputing 108:1–12
Leng L, Teoh ABJ, Li M, Khan MK (2014) A remote cancelable palmprint authentication protocol based on multi-directional two-dimensional palmphasor-fusion. Secur Commun Netw 7(11): 1860–1871
Li H, Zhang J, Zhang Z (2010) Generating cancelable palmprint templates via coupled nonlinear dynamic filters and multiple orientation palmcodes. Inform Sci 180 (20):3876–3893
Li J, Zheng T, Liu Qz, Li R (2012) Double-image encryption on joint transform correlator using two-step-only quadrature phase-shifting digital holography. Opt Commun 285(7):1704–1709
Li J, Zheng T, Liu Qz, Li R (2012) Image encryption with two-step-only quadrature phase-shifting digital holography. Optik-Int J Light Electron Opt 123 (18):1605–1608
Li J, Li J, Pan Y, Li R (2014) Optical image hiding with a modified mach–zehnder interferometer. Opt Lasers Eng 55:258–261
Liu H, Wang X (2010) Color image encryption based on one-time keys and robust chaotic maps. Comput Math Appl 59(10):3320–3327
Liu Z, Li S, Liu W, Wang Y, Liu S (2013) Image encryption algorithm by using fractional fourier transform and pixel scrambling operation based on double random phase encoding. Opt Lasers Eng 51(1):8–14
Miller FP, Vandome AF, McBrewster J (2009) Advanced encryption standard. Alpha Press
Nagar A, Nandakumar K, Jain AK (2010) A hybrid biometric cryptosystem for securing fingerprint minutiae templates. Pattern Recog Lett 31(8):733–741
Nandakumar K (2008) Multibiometric systems: fusion strategies and template security. ProQuest
Nguyen TAT, Nguyen DT, Dang TK (2015) A multi-factor biometric based remote authentication using fuzzy commitment and non-invertible transformation. In: Information and communication technology-EurAsia conference. Springer, pp 77–88
Niu CH, Wang XL, Mao XH (2012) Multiple-image hiding based on interference principle. Opt Quant Electron 43(6–10):91–99
Nomura T, Javidi B (2000) Optical encryption using a joint transform correlator architecture. Opt Eng 39(8):2031–2035
Peng X, Zhang P, Wei H, Yu B (2006) Known-plaintext attack on optical encryption based on double random phase keys. Opt Lett 31(8):1044–1046
Rajput SK, Nishchal NK (2013) Known-plaintext attack-based optical cryptosystem using phase-truncated fresnel transform. Appl Opt 52(4):871–878
Rajput SK, Nishchal NK (2014) An optical encryption and authentication scheme using asymmetric keys. JOSA A 31(6):1233–1238
Rajput SK, Nishchal NK (2014) Fresnel domain nonlinear optical image encryption scheme based on gerchberg–saxton phase-retrieval algorithm. Appl Opt 53 (3):418–425
Rathgeb C, Uhl A (2011) A survey on biometric cryptosystems and cancelable biometrics. EURASIP J Inf Secur 2011(1):1
Refregier P, Javidi B (1995) Optical image encryption based on input plane and fourier plane random encoding. Opt Lett 20(7):767–769
Rhouma R, Meherzi S, Belghith S (2009) Ocml-based colour image encryption. Chaos Solitons Fractals 40(1):309–318
Saini N, Sinha A (2010) Optics based biometric encryption using log polar transform. Opt Commun 283(1):34–43
Saini N, Sinha A (2011) Soft biometrics in conjunction with optics based biohashing. Opt Commun 284(3):756–763
Saini N, Sinha A (2013) Biometrics based key management of double random phase encoding scheme using error control codes. Opt Lasers Eng 51(8):1014–1022
Situ G, Zhang J (2004) A lensless optical security system based on computer-generated phase only masks. Opt Commun 232(1):115–122
Sui L, Gao B (2013) Color image encryption based on gyrator transform and arnold transform. Opt Laser Technol 48:530–538
Wang H (2012) A no interference method for image encryption and decryption by an optical system of a fractional fourier transformation and a fourier transformation. In: Advances in multimedia, software engineering and computing, vol 1. Springer, pp 671–676
Wang X, Chen W, Chen X (2014) Optical binary image encryption using aperture-key and dual wavelengths. Opt Express 22(23):28,077–28,085
Wang X, Chen W, Chen X (2015) Optical information authentication using compressed double-random-phase-encoded images and quick-response codes. Opt Express 23(5):6239–6253
Yang YG, Xia J, Jia X, Zhang H (2013) Novel image encryption/decryption based on quantum fourier transform and double phase encoding. Quant Inf Process 12(11):3477–3493
Yuan S, Zhang T, Zhou X, Liu X, Liu M (2013) An optical authentication system based on encryption technique and multimodal biometrics. Opt Laser Technol 54:120–127
Zhang J, Khan MK (2011) Cancelable palmcode generated from randomized gabor filters for palmprint template protection
Zhang Y, Wang B (2008) Optical image encryption based on interference. Opt Lett 33(21):2443–2445
Zhang Y, Xiao D (2013) Double optical image encryption using discrete chirikov standard map and chaos-based fractional random transform. Opt Lasers Eng 51(4):472–480
Zhou NR, Hua TX, Gong LH, Pei DJ, Liao QH (2015) Quantum image encryption based on generalized arnold transform and double random-phase encoding. Quant Inf Process 14(4):1193–1213
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Souza, D., Burlamaqui, A. & Souza Filho, G. Improving biometrics authentication with a multi-factor approach based on optical interference and chaotic maps. Multimed Tools Appl 77, 2013–2032 (2018). https://doi.org/10.1007/s11042-017-4374-x
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-017-4374-x