Online citations, reference lists, and bibliographies.

A Fingerprint Based Bio-cryptographic Security Protocol Designed For Client/server Authentication In Mobile Computing Environment

K. Xi, T. Ahmad, F. Han, J. Hu
Published 2011 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
With fast evolution of mobile devices and mobile network, the need of protecting user sensitive information locally and performing secure user authentication remotely become evermore increasing. Bio-cryptography is emerging as a powerful solution which can combine the advantages of conventional cryptography and biometric security. In this paper, we present an efficient bio-cryptographic security protocol designed for client/server authentication in current mobile computing environment, with a reasonable assumption that server is secure. In this protocol, fingerprint biometric is used in user verification, protected by a computationally efficient Public Key Infrastructure (PKI) scheme, Elliptic Curve Cryptography (ECC). The genuine fingerprint information is hidden in the feature vault which is the mixture of genuine and chaff features. Fingerprint features are not only used for biometric verification but also for cryptographic key generation. Our security analysis shows that the proposed protocol can provide a secure and trustworthy authentication of remote mobile users over insecure network. Experimental results on public domain database show an acceptable verification performance. We also tested the computational costs and efficiency of our protocol on the CLDC emulator using Java ME (previous J2ME) programming technology. The simulation results prove that the proposed protocol suits current mobile environment. Copyright © 2010 John Wiley & Sons, Ltd.
This paper references
Biometric Encryption: enrollment and verification procedures
C. Soutar (1998)
A pixel-based scrambling scheme for digital medical images protection
J. Hu (2009)
An Efficient Mobile Voting System Security Scheme Based on Elliptic Curve Cryptography
T. Ahmad (2009)
Critical infrastructure protection: Resource efficient sampling to improve detection of less frequent patterns in network traffic
A. Mahmood (2010)
Biometric encryption. In ICSA Guide to Cryptography Nichols RK (ed.)
C Soutar (1999)
Biometric Encryption
A. Cavoukian (2011)
Sun Website
Second Fingerprint Verification Competition
D Maio (2002)
A simple and efficient data processing scheme for HMM based anomaly intrusion detection. Special Issue of Advances on Network Intrusion Detection
J Hu (2009)
A Fuzzy Vault Scheme
A. Juels (2006)
Data on PDAs mostly unprotected
K. Shaw (2004)
Generating Cancelable Fingerprint Templates
N. Ratha (2007)
Security issues in massive online games
J. Hu (2008)
Global Ridge Orientation Modeling for Partial Fingerprint Identification
Yi Wang (2011)
A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations
J. Hu (2010)
NIST special database 24, live-scan digital video fingerprint database
Watson (1998)
Elliptic curve cryptosystems
N. Koblitz (1987)
Fuzzy Vault for Fingerprints
U. Uludag (2005)
SEC 2: Recommended Elliptic Curve Domain Parameters
P. Hess (2000)
On multi-scroll chaotic attractors in hysteresis-based piecewise linear systems
F Han (2007)
Biometric Encryption using image processing
C. Soutar (1998)
FVC2002: Second Fingerprint Verification Competition
D. Maio (2002)
A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference
X. Hoang (2009)
A Fingerprint Orientation Model Based on 2D Fourier Expansion (FOMFE) and Its Application to Singular-Point Detection and Fingerprint Indexing
Yi Wang (2007)
Elliptic curve cryptosystems, Mathematics of Computation 48
N Koblitz (1987)
com/solutions/physical/chipsets sensors.asp 18. aes2510.cfm 19. and-Transducers-Misc
Www Upek
FIPS. 180-2: Secure Hash Standard (SHS) 25 February
Biometric Mobile Template Protection: A Composite Feature Based Fingerprint Fuzzy Vault
K. Xi (2009)
Handbook of Fingerprint Recognition
D. Maltoni (2003)
Enhanced gradient-based algorithm for the estimation of fingerprint orientation fields
Yi Wang (2007)
Cancellable Biometric Filters forFace Recognition
M Savvides (2004)
Fingerprint images encryption via multi-scroll chaotic attractors
F. Han (2007)
A Novel Hybrid Crypto-Biometric Authentication Scheme for ATM Based Banking Applications
F. Han (2006)
A simple and efficient hidden Markov model scheme for host-based anomaly intrusion detection
J. Hu (2009)
tern Analysis and Machine Intelligence
On Multiscroll Chaotic Attractors in Hysteresis-Based Piecewise-Linear Systems
F. Han (2007)
The use of elliptic curves in cryptography
Tibor Juhas (2007)
Audio- and Video-based Biometric Person Authentication
S. Mckenna (1997)
Fingerprint-Based Fuzzy Vault: Implementation and Performance
K. Nandakumar (2007)
Lightweight API, The Legion of the Bouncy Castle
Bouncy Castle (2008)
Data on PDAs mostly unprotected. Network World Fusion. Available from
K Shaw (2004)
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
Yevgeniy Dodis (2003)
Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs
A. Teoh (2006)
A method for obtaining digital signatures and public-key cryptosystems
R. Rivest (1978)
A simple and efficient data processing scheme for HMM based anomaly intrusion detection
J Hu (2009)
2Ns Discretisation of BioPhasor in Cancellable Biometrics
A. Teoh (2007)

This paper is referenced by
The Barriers Encountered in Telemedicine Implementation by Health Care Practitioners
Olantunji Obikunle (2015)
Key management for wireless sensor network security
B. Tian (2011)
Cryptanalysis, provable security and implementation of fuzzy identity-based cryptography
Syh Yuan Tan (2014)
A Key Management Scheme between Body Sensor Networks and the Base Station
Huawei Zhao (2013)
How Private Is Your Financial Data?: Survey of Authentication Methods in Web and Mobile Banking
Vidya Mulukutla (2017)
Result Request Data producer Edge Edge-Things Interface 1 a 2 Users accessing IoT devices 1 b 2
M. Ferrag (2019)
Strengthening Elliptic Curve Cryptography—Key Generation via Biometric Fusion Approach
Yogita S. Pagar (2020)
Novel Anonymous Authentication Scheme Using Smart Cards
Jia-Lun Tsai (2013)
A Hadamard transform-based method for the design of cancellable fingerprint templates
Song Wang (2013)
Double layer secure sketch
C. Li (2012)
History, Development and Trend of Fractal Based Biometric Cryptography
Md. Ahadullah (2015)
Authentication schemes for smart mobile devices: threat models, countermeasures, and open research issues
M. Ferrag (2020)
Protocol for Secure Iris Authentication Framework using Cryptography
Swati A. Jadhav (2014)
Q. Feng (2012)
Multibiometric Cryptosystem Based on Decision Level Fusion for File Uploading in Cloud
V. Sankaran Nair (2017)
Performance Evaluation of a large 3 D Fingerprint database
W. Zhou (2014)
Evaluating and selecting the biometrics in network security
Che-Hung Liu (2015)
Fingerprint-PKI authentication using Zernike moments
H. Jang (2014)
A Practical Biometric Random Number Generator for Mobile Security Applications
Alper Kanak (2017)
Key binding biometrics-based remote user authentication scheme using smart cards
Alawi A. Al-saggaf (2018)
Improving bio-cryptography authentication protocol
Irfan Fadil (2015)
Analyzing Trusted Elements in Mobile Devices Master Thesis
S. Kulkarni (2015)
A Study of Cancellable Fingerprint Template Generation Techniques using cryptography
Dr. N. Radha (2016)
Context Data Preprocessing for Context-Aware Smartphone Authentication
Sangjin Nam (2019)
Performance evaluation of large 3D fingerprint databases
Wei Zhou (2014)
Statistical analysis and security estimation of fingerprint minutia local structure in bio-cryptographic system
Kai Xi (2011)
Understanding secure and usable gestures for realtime motion based authentication
Yanyan Li (2018)
Combining Fuzzy Extractor in Biometric-Kerberos Based Authentication Protocol
Ai Thao Nguyen Thi (2015)
GeoMoB — A geo location based browser for secured mobile banking
B. Akoramurthy (2017)
Privacy preserving biometric-based remote authentication with secure processing unit on untrusted server
Ai Thao Nguyen Thi (2019)
Identity Authentication Security Management in Mobile Payment Systems
F. Wang (2020)
A mutual-healing key distribution scheme in wireless sensor networks
B. Tian (2011)
See more
Semantic Scholar Logo Some data provided by SemanticScholar