Advertisement

User-Oriented Pseudo Biometric Image Based One-Time Password Mechanism on Smart Phone

  • Wonjun Jang
  • Sikwan Cho
  • Hyung-Woo Lee
Part of the Communications in Computer and Information Science book series (CCIS, volume 199)

Abstract

User authentication procedures should be enhanced its security on Smart phone. And more secure system should be implemented to minimize the user’s privacy disclosure. Although image-based authentication mechanism was introduced recently, replay attack is also possible on existing one-time password based authentication system. In this paper, we implemented pseudo biometric image based OTP generation mechanism, which uses transformation function on captured biometric image from each user for providing enhanced secure authentication service on smart phone.

Keywords

Pseudo Biometric Image Authentication One-time password Smart phone 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Lamport, L.: Password authentication with insecure communication. Communications of the ACM 24, 770–772 (1981)CrossRefGoogle Scholar
  2. 2.
    Haller, N.M.: A one-time password system. Tech. Rep. RFC 1938 (May 1996)Google Scholar
  3. 3.
    Haller, N.M., Metz, C., Nesser II, P.J., Straw, M.: A one-time password system. RFC 2289 (February 1998), http://www.ietf.org/rfc/rfc2289.txt
  4. 4.
    Jang, W.J., Lee, H.W.: Biometric one-time password generation mechanism and its application on SIP authentication. Journal of the Korea Convergence Society 1(1), 93–100 (2010)Google Scholar
  5. 5.
    Lin, M.H., Chang, C.C.: A secure one-time password authentication scheme with low-computation for mobile communications. ACM SIGOPS Operating Systems Review 38(2), 76–84 (2004)MathSciNetCrossRefGoogle Scholar
  6. 6.
  7. 7.
  8. 8.
  9. 9.
    Ang, R., Safavi-Naini, R., McAven, L.: Cancelable Key-Based Fingerprint Templates. In: Boyd, C., González Nieto, J.M. (eds.) ACISP 2005. LNCS, vol. 3574, pp. 242–252. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  10. 10.
    Hirata, S., Takahashi, K.: Cancelable Biometrics with Perfect Secrecy for Correlation-Based Matching. In: Tistarelli, M., Nixon, M.S. (eds.) ICB 2009. LNCS, vol. 5558, pp. 868–878. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  11. 11.
    Kong, B., et al.: An analysis of Biohashing and its variants. Pattern Recognition 39(7), 1359–1368 (2006)CrossRefzbMATHGoogle Scholar
  12. 12.
    Lee, Y.J., et al.: One-Time Templates for Face Authentication. In: International Conference on Convergence Information Technology, ICCIT 2007, pp. 1818–1823 (2007)Google Scholar
  13. 13.
    Savvides, M., Vijaya Kumar, B.V.K., Khosla, P.K.: Cancelable Biometrics Filters for Face Recognition. In: Int. Conf. of Pattern Recognition, vol. 3, pp. 922–925 (2004)Google Scholar
  14. 14.
    Wang, D.-S., Li, J.-P.: A new fingerprint-based remote user authentication scheme using mobile devices. In: International Conference on Apperceiving Computing and Intelligence Analysis, ICACIA 2009, pp. 65–68 (2009)Google Scholar
  15. 15.
    Yoon, E.J., Yoo, K.Y.: A secure chaotic hash-based biometric remote user authentication scheme using mobile devices. In: APWeb/WAI 2007, pp. 612–623 (2007)Google Scholar
  16. 16.
    Khan, M.K., Zhang, J.S., Wang, X.M.: Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices. Chaos, Solutions & Fractals 35, 519–524 (2008)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Wonjun Jang
    • 1
  • Sikwan Cho
    • 1
  • Hyung-Woo Lee
    • 1
  1. 1.School of Computer EngineeringHanshin UniversityKorea

Personalised recommendations