Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

Improving biometrics authentication with a multi-factor approach based on optical interference and chaotic maps

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

We propose a method to improve biometric authentication systems using a multifactor approach. For this security scheme a user authenticates successfully using a set of three characteristics related to physical, possession and knowledge factors. Besides biometric authentication representing the physical factor, we propose the use of an optical authentication technique based on two-beam interference and chaotic maps. In this sense, the seed of a chaotic map represents a user password corresponding to a knowledge factor and a resultant interferogram from optical authentication technique is used as a possession factor. The feasibility of our method is tested using numerical simulation. Moreover, key space and statistical analysis are performed to demonstrate the effectiveness of the solution.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Abraham J, Gao J, Kwan P (2011) Fingerprint matching using a hybrid shape and orientation descriptor. INTECH Open Access Publisher

  2. Abuturab MR (2013) Color image security system based on discrete hartley transform in gyrator transform domain. Opt Lasers Eng 51(3):317–324

    Article  Google Scholar 

  3. Abuturab MR (2013) Information authentication system using interference of two beams in gyrator transform domain. Appl Opt 52(21):5133–5142

    Article  Google Scholar 

  4. Alfalou A, Mansour A (2009) Double random phase encryption scheme to multiplex and simultaneous encode multiple images. Appl Opt 48(31):5933–5947

    Article  Google Scholar 

  5. Amin R, Islam SH, Biswas G, Khan MK, Leng L, Kumar N (2016) Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks. Comput Netw 101:42–62

    Article  Google Scholar 

  6. Anzaku ET, Sohn H, Ro YM (2010) Multi-factor authentication using fingerprints and user-specific random projection. In: APWeb, pp 415–418

  7. Blömer J, Seifert JP (2003) Fault based cryptanalysis of the advanced encryption standard (AES). Springer, Berlin Heidelberg, pp 162–181

    MATH  Google Scholar 

  8. Borujeni SE, Eshghi M (2013) Chaotic image encryption system using phase-magnitude transformation and pixel substitution. Telecommun Syst 52(2):525–537

    Google Scholar 

  9. Cavoukian A, Stoianov A et al (2009) Biometric encryption chapter from the encyclopedia of biometrics. Office of the Information and Privacy Commissioner

  10. Chen Jx, Zhu Zl, Liu Z, Fu C, Zhang Lb, Yu H (2014) A novel double-image encryption scheme based on cross-image pixel scrambling in gyrator domains. Opt Express 22(6):7349–7361

    Article  Google Scholar 

  11. Chen Jx, Zhu Zl, Fu C, Zhang Lb, Yu H (2015) Analysis and improvement of a double-image encryption scheme using pixel scrambling technique in gyrator domains. Opt Lasers Eng 66:1–9

    Article  Google Scholar 

  12. Daemen J, Rijmen V (2013) The design of Rijndael: AES-the advanced encryption standard. Springer Science & Business Media

  13. Dodis Y, Ostrovsky R, Reyzin L, Smith A (2008) Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM J Comput 38(1):97–139

    Article  MathSciNet  MATH  Google Scholar 

  14. Elshamy AM, Rashed AN, Mohamed AENA, Faragalla OS, Mu Y, Alshebeili SA, Abd El-Samie F (2013) Optical image encryption based on chaotic baker map and double random phase encoding. J Lightwave Technol 31(15):2533–2539

    Article  Google Scholar 

  15. Fan D, Meng X, Wang Y, Yang X, Peng X, He W, Dong G, Chen H (2013) Optical identity authentication scheme based on elliptic curve digital signature algorithm and phase retrieval algorithm. Appl Opt 52(23):5645–5652

    Article  Google Scholar 

  16. Fan D, Meng X, Wang Y, Yang X, Pan X, Peng X, He W, Dong G, Chen H (2015) Multiple-image authentication with a cascaded multilevel architecture based on amplitude field random sampling and phase information multiplexing. Appl Opt 54(11):3204–3215

    Article  Google Scholar 

  17. Feng YC, Yuen PC, Jain AK (2010) A hybrid approach for generating secure and discriminating face template. IEEE Trans Inf Forens Secur 5(1):103–117

    Article  Google Scholar 

  18. Fleischhacker N, Manulis M, Azodi A (2014) A modular framework for multi-factor authentication and key exchange. In: Security standardisation research. Springer, pp 190–214

  19. Geisel T, Fairen V (1984) Statistical properties of chaos in chebyshev maps. Phys Lett A 105(6):263–266

    Article  MathSciNet  Google Scholar 

  20. Go W, Lee K, Kwak J (2014) Construction of a secure two-factor user authentication system using fingerprint information and password. J Intell Manuf 25 (2):217–230

    Article  Google Scholar 

  21. Haupt G, Mozer T (2015) Assessing biometric authentication: a holistic approach to accuracy. Biom Technol Today 2015(3):5–8

    Article  Google Scholar 

  22. He W, Peng X, Meng X, Liu X (2012) Optical hierarchical authentication based on interference and hash function. Appl Opt 51(32):7750–7757

    Article  Google Scholar 

  23. Huang X, Xiang Y, Chonka A, Zhou J, Deng RH (2011) A generic framework for three-factor authentication: preserving security and privacy in distributed systems. IEEE Trans Parallel Distrib Syst 22(8):1390–1397

    Article  Google Scholar 

  24. Jassim S, Al-Assam H, Sellahewa H (2009) Improving performance and security of biometrics using efficient and stable random projection techniques. In: Proceedings of 6th international symposium on image and signal processing and analysis, 2009. ISPA 2009. IEEE, pp 556–561

  25. Javidi B, Sergent A (1997) Fully phase encoded key and biometrics for security verification. Optical Eng 36(3):935–942

    Article  Google Scholar 

  26. Javidi B, Ahouzi E (1998) Optical security system with fourier plane encoding. Appl Opt 37(26):6247–6255

    Article  Google Scholar 

  27. Kang J, Nyang D, Lee K (2014) Two-factor face authentication using matrix permutation transformation and a user password. Inform Sci 269:1–20

    Article  MathSciNet  Google Scholar 

  28. Khan MK, Zhang J (2008) Multimodal face and fingerprint biometrics authentication on space-limited tokens. Neurocomputing 71(13):3026–3031

    Article  Google Scholar 

  29. Khan MK, Zhang J, Tian L (2007) Chaotic secure content-based hidden transmission of biometric templates. Chaos Solitons Fract 32(5):1749–1759

    Article  Google Scholar 

  30. Khan SH, Akbar MA, Shahzad F, Farooq M, Khan Z (2015) Secure biometric template generation for multi-factor authentication. Pattern Recog 48(2):458–472

    Article  Google Scholar 

  31. Kim J, Choi J, An J, Kim N, Lee K (2005) Digital holographic security system based on random phase encoded reference beams and fingerprint identification. Opt Commun 247(4):265–274

    Article  Google Scholar 

  32. Kong D, Shen X, Shen Y, Wang X (2014) Multi-image encryption based on interference of computer generated hologram. Optik-Int J Light Electron Opt 125 (10):2365–2368

    Article  Google Scholar 

  33. Kumar A, Lee HJ (2013) Multi-factor authentication process using more than one token with watermark security. In: Future information communication technology and applications. Springer, pp 579–587

  34. Kumar P, Joseph J, Singh K (2011) Optical image encryption using a jigsaw transform for silhouette removal in interference-based methods and decryption with a single spatial light modulator. Appl Opt 50(13):1805–1811

    Article  Google Scholar 

  35. Kwan PW, Gao J, Guo Y (2006) Fingerprint matching using enhanced shape context. In: Proceedings of the image and vision computing New Zealand. Citeseer, pp 115–120

  36. Leng L, Zhang J (2011) Dual-key-binding cancelable palmprint cryptosystem for palmprint protection and information security. J Netw Comput Appl 34(6):1979–1989

    Article  Google Scholar 

  37. Leng L, Zhang J (2011) Dual-key-binding cancelable palmprint cryptosystem for palmprint protection and information security. J Netw Comput Appl 34(6):1979–1989. Control and Optimization over Wireless Networks

    Article  Google Scholar 

  38. Leng L, Zhang J (2013) Palmhash code vs. palmphasor code. Neurocomputing 108:1–12

    Article  Google Scholar 

  39. Leng L, Teoh ABJ, Li M, Khan MK (2014) A remote cancelable palmprint authentication protocol based on multi-directional two-dimensional palmphasor-fusion. Secur Commun Netw 7(11): 1860–1871

    Article  Google Scholar 

  40. Li H, Zhang J, Zhang Z (2010) Generating cancelable palmprint templates via coupled nonlinear dynamic filters and multiple orientation palmcodes. Inform Sci 180 (20):3876–3893

    Article  Google Scholar 

  41. Li J, Zheng T, Liu Qz, Li R (2012) Double-image encryption on joint transform correlator using two-step-only quadrature phase-shifting digital holography. Opt Commun 285(7):1704–1709

    Article  Google Scholar 

  42. Li J, Zheng T, Liu Qz, Li R (2012) Image encryption with two-step-only quadrature phase-shifting digital holography. Optik-Int J Light Electron Opt 123 (18):1605–1608

    Article  Google Scholar 

  43. Li J, Li J, Pan Y, Li R (2014) Optical image hiding with a modified mach–zehnder interferometer. Opt Lasers Eng 55:258–261

    Article  Google Scholar 

  44. Liu H, Wang X (2010) Color image encryption based on one-time keys and robust chaotic maps. Comput Math Appl 59(10):3320–3327

    Article  MathSciNet  MATH  Google Scholar 

  45. Liu Z, Li S, Liu W, Wang Y, Liu S (2013) Image encryption algorithm by using fractional fourier transform and pixel scrambling operation based on double random phase encoding. Opt Lasers Eng 51(1):8–14

    Article  Google Scholar 

  46. Miller FP, Vandome AF, McBrewster J (2009) Advanced encryption standard. Alpha Press

  47. Nagar A, Nandakumar K, Jain AK (2010) A hybrid biometric cryptosystem for securing fingerprint minutiae templates. Pattern Recog Lett 31(8):733–741

    Article  Google Scholar 

  48. Nandakumar K (2008) Multibiometric systems: fusion strategies and template security. ProQuest

  49. Nguyen TAT, Nguyen DT, Dang TK (2015) A multi-factor biometric based remote authentication using fuzzy commitment and non-invertible transformation. In: Information and communication technology-EurAsia conference. Springer, pp 77–88

  50. Niu CH, Wang XL, Mao XH (2012) Multiple-image hiding based on interference principle. Opt Quant Electron 43(6–10):91–99

    Article  Google Scholar 

  51. Nomura T, Javidi B (2000) Optical encryption using a joint transform correlator architecture. Opt Eng 39(8):2031–2035

    Article  Google Scholar 

  52. Peng X, Zhang P, Wei H, Yu B (2006) Known-plaintext attack on optical encryption based on double random phase keys. Opt Lett 31(8):1044–1046

    Article  Google Scholar 

  53. Rajput SK, Nishchal NK (2013) Known-plaintext attack-based optical cryptosystem using phase-truncated fresnel transform. Appl Opt 52(4):871–878

    Article  Google Scholar 

  54. Rajput SK, Nishchal NK (2014) An optical encryption and authentication scheme using asymmetric keys. JOSA A 31(6):1233–1238

    Article  Google Scholar 

  55. Rajput SK, Nishchal NK (2014) Fresnel domain nonlinear optical image encryption scheme based on gerchberg–saxton phase-retrieval algorithm. Appl Opt 53 (3):418–425

    Article  Google Scholar 

  56. Rathgeb C, Uhl A (2011) A survey on biometric cryptosystems and cancelable biometrics. EURASIP J Inf Secur 2011(1):1

    Article  Google Scholar 

  57. Refregier P, Javidi B (1995) Optical image encryption based on input plane and fourier plane random encoding. Opt Lett 20(7):767–769

    Article  Google Scholar 

  58. Rhouma R, Meherzi S, Belghith S (2009) Ocml-based colour image encryption. Chaos Solitons Fractals 40(1):309–318

    Article  MATH  Google Scholar 

  59. Saini N, Sinha A (2010) Optics based biometric encryption using log polar transform. Opt Commun 283(1):34–43

    Article  Google Scholar 

  60. Saini N, Sinha A (2011) Soft biometrics in conjunction with optics based biohashing. Opt Commun 284(3):756–763

    Article  Google Scholar 

  61. Saini N, Sinha A (2013) Biometrics based key management of double random phase encoding scheme using error control codes. Opt Lasers Eng 51(8):1014–1022

    Article  Google Scholar 

  62. Situ G, Zhang J (2004) A lensless optical security system based on computer-generated phase only masks. Opt Commun 232(1):115–122

    Article  Google Scholar 

  63. Sui L, Gao B (2013) Color image encryption based on gyrator transform and arnold transform. Opt Laser Technol 48:530–538

    Article  Google Scholar 

  64. Wang H (2012) A no interference method for image encryption and decryption by an optical system of a fractional fourier transformation and a fourier transformation. In: Advances in multimedia, software engineering and computing, vol 1. Springer, pp 671–676

  65. Wang X, Chen W, Chen X (2014) Optical binary image encryption using aperture-key and dual wavelengths. Opt Express 22(23):28,077–28,085

    Article  Google Scholar 

  66. Wang X, Chen W, Chen X (2015) Optical information authentication using compressed double-random-phase-encoded images and quick-response codes. Opt Express 23(5):6239–6253

    Article  Google Scholar 

  67. Yang YG, Xia J, Jia X, Zhang H (2013) Novel image encryption/decryption based on quantum fourier transform and double phase encoding. Quant Inf Process 12(11):3477–3493

    Article  MathSciNet  MATH  Google Scholar 

  68. Yuan S, Zhang T, Zhou X, Liu X, Liu M (2013) An optical authentication system based on encryption technique and multimodal biometrics. Opt Laser Technol 54:120–127

    Article  Google Scholar 

  69. Zhang J, Khan MK (2011) Cancelable palmcode generated from randomized gabor filters for palmprint template protection

  70. Zhang Y, Wang B (2008) Optical image encryption based on interference. Opt Lett 33(21):2443–2445

    Article  Google Scholar 

  71. Zhang Y, Xiao D (2013) Double optical image encryption using discrete chirikov standard map and chaos-based fractional random transform. Opt Lasers Eng 51(4):472–480

    Article  Google Scholar 

  72. Zhou NR, Hua TX, Gong LH, Pei DJ, Liao QH (2015) Quantum image encryption based on generalized arnold transform and double random-phase encoding. Quant Inf Process 14(4):1193–1213

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Daniel Souza.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Souza, D., Burlamaqui, A. & Souza Filho, G. Improving biometrics authentication with a multi-factor approach based on optical interference and chaotic maps. Multimed Tools Appl 77, 2013–2032 (2018). https://doi.org/10.1007/s11042-017-4374-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-4374-x

Keywords

Navigation