Secure Method for Biometric-Based Recognition with Integrated Cryptographic FunctionsReportar como inadecuado




Secure Method for Biometric-Based Recognition with Integrated Cryptographic Functions - Descarga este documento en PDF. Documentación en PDF para descargar gratis. Disponible también para leer online.

BioMed Research InternationalVolume 2013 2013, Article ID 623815, 12 pages

Research ArticleDepartment of Electrical Engineering, Chang Gung University, 259 Wen-Hwa 1st Road, Kwei-Shan, Taoyuan 333, Taiwan

Received 30 January 2013; Accepted 22 April 2013

Academic Editor: Zhirong Sun

Copyright © 2013 Shin-Yan Chiou. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract

Biometric systems refer to biometric technologies which can be used to achieve authentication. Unlike cryptography-based technologies, the ratio for certification in biometric systems needs not to achieve 100% accuracy. However, biometric data can only be directly compared through proximal access to the scanning device and cannot be combined with cryptographic techniques. Moreover, repeated use, improper storage, or transmission leaks may compromise security. Prior studies have attempted to combine cryptography and biometrics, but these methods require the synchronization of internal systems and are vulnerable to power analysis attacks, fault-based cryptanalysis, and replay attacks. This paper presents a new secure cryptographic authentication method using biometric features. The proposed system combines the advantages of biometric identification and cryptographic techniques. By adding a subsystem to existing biometric recognition systems, we can simultaneously achieve the security of cryptographic technology and the error tolerance of biometric recognition. This method can be used for biometric data encryption, signatures, and other types of cryptographic computation. The method offers a high degree of security with protection against power analysis attacks, fault-based cryptanalysis, and replay attacks. Moreover, it can be used to improve the confidentiality of biological data storage and biodata identification processes. Remote biometric authentication can also be safely applied.





Autor: Shin-Yan Chiou

Fuente: https://www.hindawi.com/



DESCARGAR PDF




Documentos relacionados