Mobile Travel Credentials

  • David Bissessar
  • Maryam HezavehEmail author
  • Fayzah Alshammari
  • Carlisle Adams
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11358)


The international travel continuum is a highly demanding environment in which the participating entities have goals which are sometimes in conflict. The traveler seeks the ability to plan trips in advance and to travel conveniently, minimizing line-ups and unforeseen problems. Service providers seek to make the most of specialized resources, maximize quality of service, intercept security threats, and enforce the controls appropriate for their zones of responsibility. This paper proposes a system to benefit the needs of these multiple stakeholders: the needs of the traveler for convenience, privacy and efficiency, and the needs of the service provider for security, reliability, and accountability. Today’s environment is characterized by paper documents, traditional biometric verification using facial and fingerprint images, and the manual processing of queues of passengers. Instead of this, we present a novel approach centered on fully electronic travel documents stored on the traveler’s phone, secured by cryptographic operations that utilize privacy-respecting biometric references. A prototype system has been developed and implemented, demonstrating the intended benefits for all stakeholders.


e-Passport Privacy Credential Biometrics Cryptography 


  1. 1.
    ICAO 9303-Machine Readable Travel Documents. Accessed 12 Sept 2018
  2. 2.
    Safjanski, T.: Prospects for the development of the international criminal police organisation interpol. Intern. Secur. 7(2), 267 (2015)Google Scholar
  3. 3.
    Frontex: Best practice technical guidelines for automated border control (ABC) systems, Research and Development Unit, Warsaw (2012)Google Scholar
  4. 4.
    Nuppeney, M., Breitenstein, M., Niesing, M.: EasyPASS-evaluation of face recognition performance in an operational automated border control system. In: International Biometric Performance Conference (2010)Google Scholar
  5. 5.
    U.S. Department of Homeland Security, Privacy Impact Assessment for the Advance Passenger Information System (APIS) (2007)Google Scholar
  6. 6.
    Schouten, B., Bart, J.: Biometrics and their use in e-passports. Image Vis. Comput. 27(3), 305–312 (2009)CrossRefGoogle Scholar
  7. 7.
    Li, S.Z., Jain, A.: Handbook of Face Recognition, 2nd edn. Springer, London (2011). Scholar
  8. 8.
    Bissessar, D., Adams, C., Stoianov, A.: Privacy, security and convenience: biometric encryption for smartphone-based electronic travel documents. In: Abielmona, R., Falcon, R., Zincir-Heywood, N., Abbass, H.A. (eds.) Recent Advances in Computational Intelligence in Defense and Security. SCI, vol. 621, pp. 339–366. Springer, Cham (2016). Scholar
  9. 9.
    Rathgeb, C., Andreas U.: A survey on biometric cryptosystems and cancelable biometrics. EURASIP J. Inf. Secur. 2011(3), (2011).
  10. 10.
    Sutcu, Y., Li, Q., Memon, N.: Protecting biometric templates with sketch: theory and practice. IEEE Trans. Inf. Forensics Secur. 2(3), 503–512 (2007)CrossRefGoogle Scholar
  11. 11.
    Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523–540. Springer, Heidelberg (2004). Scholar
  12. 12.
    ISO/IEC 18004:2000(E). Information Technology Automatic identification and data capture techniques Bar code symbology QR Code. Standard, International Organization for Standardization, GenevaGoogle Scholar
  13. 13.
  14. 14.
  15. 15.
    United States Customs and Border Protection Services Electronic System for Travel Authorizations. Accessed 12 Sept 2018
  16. 16.
    Johnson, D., Menezes, A., Vanstone, S.: The elliptic curve digital signature algorithm (ECDSA). Int. J. Inf. Secur. 1(1), 36–63 (2001)CrossRefGoogle Scholar
  17. 17.
    Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public key cryptosystems. Commun. ACM 21(2), 120–126 (1978)MathSciNetCrossRefGoogle Scholar
  18. 18.
    Daemen, J., Rijmen, V.: The Design of Rijndael. Springer, Heidelberg (2002). Scholar
  19. 19.
    Rescorla, E.: SSL and TLS: Designing and Building Secure Systems. Addison-Wesley Longman Publishing Co., Inc., Boston (2001)Google Scholar
  20. 20.
    Sherif, M.: Protocols for Secure Electronic Commerce, 2nd edn. CRC Press, Boca Raton (2016)CrossRefGoogle Scholar
  21. 21.
    JMRTD: An Open Source Java Implementation of Machine Readable Travel Documents. Accessed 12 Sept 2018
  22. 22.
    ACR122U USB NFC Reader. Accessed 12 Sept 2018
  23. 23.
    ODroid USB camera product page. Accessed 12 Sept 2018
  24. 24.
    ODroid XU4 product page. Accessed 12 Sept 2018
  25. 25.
    Mostowski, W.I., Poll, E.: Electronic passports in a nutshell. ICIS, Nijmegen (2010)Google Scholar
  26. 26.
    Shaikh, R.A., Adi, K., Logrippo, L.: Dynamic risk-based decision methods for access control systems. Comput. Secur. 31(4), 447–464 (2012)CrossRefGoogle Scholar
  27. 27.
    Fall, D., Okuda, T., Kadobayashi, Y., Yamaguchi, S.: Risk adaptive authorization mechanism (RAdAM) for cloud computing. J. Inf. Process. 24(2), 371–380 (2016)Google Scholar
  28. 28.
    World Economic Forum: Canada to Test Advancements in Biometrics and Blockchain to Welcome International Travellers. Accessed 12 Sept 2018
  29. 29.
    Kaunert, C., Léonard, S., MacKenzie, A.: The social construction of an EU interest in counter-terrorism: US influence and internal struggles in the cases of PNR and SWIFT. Eur. Secur. 21(4), 474–496 (2012)CrossRefGoogle Scholar
  30. 30.
    Carpanelli, E., Lazzerini, N.: PNR: passenger name record, problems not resolved? The EU PNR conundrum after opinion 1/15 of the CJEU. Air Space Law 42(4), 377–402 (2017)Google Scholar
  31. 31.
    Li, X., Jiang, P., Chen, T., Luo, X., Wen, Q.: A survey on the security of blockchain systems. Future Gener. Comput. Syst. pp. 1–25 (2017).
  32. 32.
    Cavoukian, A., Chibba, M.: Cognitive cities, big data and citizen participation: the essentials of privacy and security. In: Portmann, E., Finger, M. (eds.) Towards Cognitive Cities. SSDC, vol. 63, pp. 61–82. Springer, Cham (2016). Scholar
  33. 33.
    Sheth, A., Anantharam, P., Henson, C.: Physical-cyber-social computing: an early 21st century approach. IEEE Intell. Syst. 1, 78–82 (2013)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • David Bissessar
    • 1
  • Maryam Hezaveh
    • 1
    Email author
  • Fayzah Alshammari
    • 1
  • Carlisle Adams
    • 1
  1. 1.University of OttawaOttawaCanada

Personalised recommendations