Skip to main content

A Novel Authentication Scheme Based on Torus Automorphism for Smart Card

  • Conference paper

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 21))

Abstract

A novel authentication scheme for smart card is proposed in this paper. In this scheme, the cardholder’s photograph is printed on the card. Meanwhile, the compressed image of the same photograph is encrypted by the torus automorphism. The encrypted image is stored in the smart card. The secret keys for decryption are shared by a trusted third party and the user. Only when all the secret keys are presented can the original image be recovered. The recovered image should be the same as the photograph printed on the card. The combination of the image encryption using torus automorphism and secret sharing provides high security for the proposed authentication scheme.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Sonwanshi, S.S., Ahirwal, R.R., Jain, Y.K.: An Efficient Smart Card Based Remote User Authentication Scheme Using Hash Function. In: Proc. 2012 IEEE Students’ Conference on Electrical, Electronics and Computer Science, SCEECS, pp. 1–4 (2012)

    Google Scholar 

  2. Sood, S.K., Sarje, A.K., Singh, K.: Smart Card Based Secure Authentication and Key Agreement Protocol. In: Proc. 2010 International Conference on Computer and Communication Technology, ICCCT, pp. 7–14 (2010)

    Google Scholar 

  3. Matanovic, G., Mikuc, M.: Implementing Certificate-Based Authentication Protocol on Smart Cards. In: Proc. 2012 Proceedings of the 35th International Convention, MIPRO, pp. 1514–1519 (2012)

    Google Scholar 

  4. Zhao, Q.F., Hsieh, C.H.: Card User Authentication Based on Generalized Image Morphing. In: Proc. 2011 3rd International Conference on Awareness Science and Technology, iCAST, pp. 117–122 (2011)

    Google Scholar 

  5. Thongkor, K., Amornraksa, T.: Digital Image Watermarking for Photo Authentication in Thai National ID Card. In: Proc. 2012 9th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology, ECTI-CON, pp. 1–4 (2012)

    Google Scholar 

  6. Yahaya, Y.H., Isa, M., Aziz, M.I.: Fingerprint Biometrics Authentication on Smart Card. In: Proc. Second International Conference on Computer and Electrical Engineering, ICCEE, pp. 671–673 (2009)

    Google Scholar 

  7. Das, A.K.: Analysis and Improvement on an Efficient Biometric-Based Remote User Authentication Scheme Using Smart Cards. IET Information Security 5(3), 145–151 (2011)

    Article  Google Scholar 

  8. Luo, X.Z., Fan, J.H., Wu, J.H.: Single-Channel Color Image Encryption Based on the Multiple-Order Discrete Fractional Fourier Transform and Chaotic Scrambling. In: Proc. 2012 International Conference on Information Science and Technology, ICIST, pp. 780–784 (2012)

    Google Scholar 

  9. Bhatnagar, G., Wu, Q.M.J.: Chaos-Based Security Solution for Fingerprint Data During Communication and Transmission. IEEE Transactions on Instrumentation and Measurement 61(4), 876–887 (2012)

    Article  MathSciNet  Google Scholar 

  10. Tao, R., Meng, X.Y., Wang, Y.: Image Encryption with Multiorders of Fractional Fourier Transforms. IEEE Transactions on Information Forensics and Security 5(4), 734–738 (2010)

    Article  Google Scholar 

  11. Percival, I., Vivaldi, F.: Arithmetical Properties of Strongly Chaotic Motions. Physica D: Nonlinear Phenomena 25(1-3), 105–130 (1987)

    Article  MathSciNet  MATH  Google Scholar 

  12. Voyatzis, G., Pitas, I.: Chaotic Mixing of Digital Images and Applications to Watermarking. In: Proc. ECMAST 1996, vol. 2, pp. 687–694 (1996)

    Google Scholar 

  13. Chen, G., Mao, Y., Chui, C.: A Symmetric Image Encryption Scheme Based on 3D Chaotic Cat Maps. Chaos, Solitons, Fractals 21(3), 749–761 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  14. Chang, C.C., Hsiao, J.Y., Chiang, C.L.: An Image Copyright Protection Scheme Based on Torus Automorphism. In: Proc. the First International Symposium on Cyber Worlds, pp. 217–224 (2002)

    Google Scholar 

  15. Shamir, A.: How to share a secret. Communications of the ACM 22(11), 612–613 (1979)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chin-Chen Chang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chang, CC., Mao, Q., Wu, HL. (2013). A Novel Authentication Scheme Based on Torus Automorphism for Smart Card. In: Pan, JS., Yang, CN., Lin, CC. (eds) Advances in Intelligent Systems and Applications - Volume 2. Smart Innovation, Systems and Technologies, vol 21. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35473-1_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35473-1_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35472-4

  • Online ISBN: 978-3-642-35473-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics