Thumb based Biometric Authentication Scheme in WLAN using Gauss Iterated Map and One Time Password

Similar documents
Irisbased Authentication Scheme in WLAN Using Logistic Map with MAC

CIS 4360 Secure Computer Systems Biometrics (Something You Are)

CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018

Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint

Encryption of Text Using Fingerprints

Biometric Security Roles & Resources

ICT 6541 Applied Cryptography Lecture 8 Entity Authentication/Identification

International Journal on Electronics & Wireless Communication Engineering (IJEWCE) ISSN: Volume 10 Issue 10 March 2018.

Image Encryption Algorithm Based on. Logistic Map and Pixel Mapping Table. Hazem Al-Najjar Asem Al-Najjar

BIOMETRIC MECHANISM FOR ONLINE TRANSACTION ON ANDROID SYSTEM ENHANCED SECURITY OF. Anshita Agrawal

REINFORCED FINGERPRINT MATCHING METHOD FOR AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 5, Oct-Nov, 2013 ISSN:

A Combined Encryption Compression Scheme Using Chaotic Maps

Security Flaws of Cheng et al. s Biometric-based Remote User Authentication Scheme Using Quadratic Residues

IMAGE ENCRYPTION BASED ON ARNOLD TRANSFORMATION

Stuart Hall ICTN /10/17 Advantages and Drawbacks to Using Biometric Authentication

Security Weaknesses of a Biometric-Based Remote User Authentication Scheme Using Smart Cards

Research Article International Journals of Advanced Research in Computer Science and Software Engineering ISSN: X (Volume-7, Issue-6)

Biometrics- Fingerprint Recognition

Cryptography Functions

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP ( 1

Comparative Analysis of Various Edge Detection Techniques in Biometric Application

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 10, April 2014

An Overview of Biometric Image Processing

Combined Fingerprint Minutiae Template Generation

MySQL and MATLAB Interfacing for Biometric Template Protection with Encryption M.Mani Roja

Ujma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India. IJRASET: All Rights are Reserved

Feature Level Fusion of Multibiometric Cryptosystem in Distributed System

Authentication Objectives People Authentication I

1. Introduction. 2. Related work

Bio-Chaotic Stream Cipher-Based Iris Image Encryption

Information Security Identification and authentication. Advanced User Authentication II

Cryptographic Concepts

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

CIS 4360 Introduction to Computer Security Fall WITH ANSWERS in bold. First Midterm

An improved image encryption algorithm based on chaotic maps

A New Chaos Based Image Encryption and Decryption Using a Hash Function

Authentication. Chapter 2

Abstract -Fingerprints are the most widely. Keywords:fingerprint; ridge pattern; biometric;

International Journal of Advanced Research in Computer Science and Software Engineering

Keywords Palmprint recognition, patterns, features

Fingerprint Image Enhancement Algorithm and Performance Evaluation

Palmprint Recognition Using Transform Domain and Spatial Domain Techniques

Minutiae Based Fingerprint Authentication System

Chapter 3: User Authentication

Fingerprint Recognition using Fuzzy based image Enhancement

What is Authentication? All requests for resources have to be monitored. Every request must be authenticated and authorized to use the resource.

An Image Encryption Algorithm based on 3D Lorenz map

Chapter 2: Access Control and Site Security. Access Control. Access Control. ACIS 5584 E-Commerce Security Dr. France Belanger.

MULTI-FACTOR AUTHENTICATION USING GRAPHICAL PASSWORDS THROUGH HANDHELD DEVICE

Identification, authentication, authorisation. Identification and authentication. Authentication. Authentication. Three closely related concepts:

Keywords security model, online banking, authentication, biometric, variable tokens

An image encryption based on DNA coding and 2DLogistic chaotic map

Finger Print Enhancement Using Minutiae Based Algorithm

Touchless Fingerprint recognition using MATLAB

CompTIA Security+ (Exam SY0-401) Course 01 Security Fundamentals

Chaotic Image Encryption via Convex Sinusoidal Map

Keywords:- Fingerprint Identification, Hong s Enhancement, Euclidian Distance, Artificial Neural Network, Segmentation, Enhancement.

Comparison of fingerprint enhancement techniques through Mean Square Error and Peak-Signal to Noise Ratio

Cryptosystem based Multimodal Biometrics Template Security

Effective and Key Sensitive Security Algorithm For An Image Processing Using Robust Rubik Encryption & Decryption Process

On the Security of Yoon and Yoo s Biometrics Remote User Authentication Scheme

CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM

AIT 682: Network and Systems Security

Authentication. Identification. AIT 682: Network and Systems Security

RESEARCH ON IMAGE ENCRYPTION ALGORITHM BASED ON WAVELET TRANSFORM

Network Security Issues and Cryptography

MODULE NO.28: Password Cracking

An approach for Fingerprint Recognition based on Minutia Points

AN EFFICIENT BINARIZATION TECHNIQUE FOR FINGERPRINT IMAGES S. B. SRIDEVI M.Tech., Department of ECE

6. Multimodal Biometrics

FAST HASH FUNCTION BASED ON BCCM ENCRYPTION ALGORITHM FOR E-COMMERCE (HFBCCM)

A Survey On SecureImage Encryption Technique Using Blowfish And Chaos

A new image encryption algorithm based on hyper-chaos

Biometric Palm vein Recognition using Local Tetra Pattern

Location Based Authentication: A New Approach towards Providing Security

International Journal of Advanced Research in Computer Science and Software Engineering

Research and Design of Crypto Card Virtualization Framework Lei SUN, Ze-wu WANG and Rui-chen SUN

Biometric Security Technique: A Review

Authentication Methods

AN INTEGRATED BLOCK AND STREAM CIPHER APPROACH FOR KEY ENHANCEMENT

Fingerprint Mosaicking &

SECURED TRANSMISSION OF BIOMETRIC CONTENT USING VISUAL CRYPTOGRAPHY

Network Security CHAPTER 31. Solutions to Review Questions and Exercises. Review Questions

Fusion of Digital Signature & Fingerprint Watermarking using Bit plane slicing

FINGERPRINT BIOMETRICS

CIS 6930/4930 Computer and Network Security. Topic 6. Authentication

The Research and Application of the Fingerprint Key based USB-Key Pin Number Protection System Yu Lu 1, a, Zhong Liang 2, b, Chen Yue 3, c

ARTICLE IN PRESS. Optik xxx (2015) xxx xxx. Contents lists available at ScienceDirect. Optik. jo ur nal homepage:

FINGERPRINT DATABASE NUR AMIRA BINTI ARIFFIN THESIS SUBMITTED IN FULFILMENT OF THE DEGREE OF COMPUTER SCIENCE (COMPUTER SYSTEM AND NETWORKING)

Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm

Unit-VI. User Authentication Mechanisms.

Attacking Your Two-Factor Authentication (PS: Use Two-Factor Authentication)

Mechanism-based PKI - A real-time key generation from fingerprints -

Computer Security: Principles and Practice

CSC 474 Network Security. Authentication. Identification

A Novel Data Encryption Technique by Genetic Crossover of Robust Finger Print Based Key and Handwritten Signature Key

Smart Card and Biometrics Used for Secured Personal Identification System Development

A Two-Fold Authentication Mechanism for Network Security

Transcription:

Thumb based Biometric Authentication Scheme in WLAN using Gauss Iterated Map and One Time Password Sanjay Kumar* Department of Computer Science and Engineering National Institute of Technology Jamshedpur, Jharkhand, India sanjay.cse@nitjsr.ac.in Surjit Paul Department of Computer Science and Engineering National Institute of Technology Jamshedpur, Jharkhand, India paul.surjit55@gmail.com Abstract Due to advancement in E-commerce, M-Commerce and rapid development in wireless technology shift of users from wired network to wireless network have increased day by day. Since wireless networks are easy to break and prone to security threats, it is important that all wireless users are required to be authenticated before using the information present in the wireless LAN. Also doing secured online transaction in wireless LAN, authentication of user is the upmost requirement. Due to uniqueness of biometric traits it can be used in authentication. In this paper, we proposed a finger based biometric authentication scheme. During enrollment, minutia points are generated and encrypted using Gauss Iterated Map. The encrypted template is stored in the template database. During authentication, a matcher algorithm is used to match the minutia points of the decrypted thumb template of the particular user captured during enrollment with the minutia points generated during authentication. If match is found then server will generate a One Time Password (OTP) and send to the user for further level of authentication. If user enters the correct OTP through client interface to the server then ARAS (Advanced Remote Authentication Server) grants permission to access the system to that user otherwise access is denied to the user. Keywords: Wireless LAN; OTP; Gauss Iterated Map; Bio-cryptography; Authentication. 1. Introduction Traditionally, username and password was common method for authentication and was initially used in plaintext format. Later on username and hashed password was used. To further strengthen the authentication scheme, salted hashed password is used. People use small passwords because it is difficult to remember long and complex password which can be easily guessed by the attackers. Further to increase the level of authentication two authentication factors is used i.e. something known and something possesses like debit card and PIN number. But there is chance of stealing and loss of the debit card. Because of the problem with username and password, PIN number stated above; researchers started looking into the alternative method for authentication. Biometric traits are unique feature for every person and it cannot be stolen or lost. It is categorized into two categories i.e. physiological and behavioral. In Physiological finger print, thumb images, retina, palm print, DNA, Voice, and Face etc. are used whereas for behavioral keystroke, signature, voice etc. are used. Our proposed biometric authentication system consists of two phases. The first phase is enrollment phase and the second is the authentication phase. In the enrollment phase, the thumb biometric sensor is used to capture the thumb print of an individual and then preprocessing and feature extraction is carried out to generate a template. Then the template is encrypted using Gauss iterated Map. The encrypted thumb print is stored in the database along with user credentials like username, address, mobile no. etc. During authentication phase again thumb biometric sensor is used to capture the thumb then preprocessing and feature extraction is done on the capture thumb image to generate the template. The minutia points of decrypted thumb template of the user are matched with the minutia points of the current template in order to verify the claimed identity. Further to ensure higher level of authentication, an OTP is generated by the ARAS (Advance Radius authentication server) and sent to the requester s registered mobile. The requester has to enter the sent OTP through client interface. If OTP is matched then the system grants permission to the user and is authenticated to access the system. The paper consists of five sections. Section 1 Introduction, Section 2 deals with related work, Section 3 deals with system architecture of the proposed authentication scheme; Experimental results are discussed in Section 4. Finally, section 5 deals with conclusion and future work. Vol. 8 No. 5 Oct-Nov 2017 594

2. Related work Based on the comparison of password and password with fingerprint system was studied for 96 volunteers. It was found that account created using password with fingerprint was1/3000 times difficult to break than password (Wimberly and Liebrock, 2011) [1]. An efficient smart card based one-way collision free hash function using fingerprint user authentication scheme was proposed (Khan and Zhang, 2006) [2]. This system enhances the security. Image encryption technique in which, image pixels are shuffled and then hyper chaotic was applied for diffusion in order to gain security and large key space (Gao and Chen, 2008) [3]. To expand the secret key space and to improve anti-aggressive ability a two Chaos algorithm namely Lorenz Chaotic system and Logistics map was used to generate the pseudo-random sequences (Jun et al., 2010) [4]. To encrypt the color images, a Coupled Nonlinear Chaotic Map and a chaos-based image encryption algorithm were used (Mazloom and Moghadam, 2009) [5]; in which, a symmetric key cryptography and a stream cipher were used. In this combined structure, 240 bits key was used to generate the seed and parameter of the chaotic map. The privacy and security trade-off of a single biometric system were measured by information theory techniques and by biometric measurements respectively (Lai et al., 2011) [6]. To increase the security, various different biometric traits are used. The Logistic and BSPS (Bio chaotic Security aware packet scheduling) were combined to strengthen the security levels in the WLAN (Kumar and Shaw, 2015) [7]. 3. Proposed scheme In the proposed biometric system there are two phases i) Enrollment and ii) Authentication. i) Enrollment: In the enrollment phase, thumb is captured by Manta MFS 100 thumb scanner. Then the raw thumb image is preprocessed and correct minutia points are extracted from all the minutia points and stored in the file. To make the encryption process simple the binarized template is further divided into small blocks of 128 bits. From these blocks, a random block is chosen to generate the initial condition for the secret key. The image bits of this block are encrypted by using Gauss Iterated Map and stored in the template database. The block diagram of the proposed scheme is shown in Fig 1 and its corresponding steps have been discussed as follows. Fig 1. Block diagram of proposed biometric system 3.1. Preprocessing and feature extraction Under this phase, firstly the thumb image was captured by thumb biometric scanner. The captured image was brightened, filtered, converted into gray scale, eroded and dilated as shown in the Fig 2 to Fig 6. Fig 2. Original image and corresponding brightened image Vol. 8 No. 5 Oct-Nov 2017 595

Fig 3. Brightened image and its corresponding gray image Noise removal: Median filter is used to remove the noise present in the thumb image. Dilation and Erosion: To add pixels to the boundary of the thumb image Dilation is used where as to remove the pixels from the boundary of the thumb image, erosion is used. Fig 4. Noisy image and its corresponding median filtered image Where B={-β β B} Fig 5a Fig 5b Dilation with rolling ball element Dilation with line structure element Fig 6a Erosion with rolling ball element Fig 6b Erosion with line structure element Vol. 8 No. 5 Oct-Nov 2017 596

Sanjay Kumar et al. / Indian Journal of Computer Science and Engineering (IJCSE) Feature Extraction: During feature extraction, the binarize image is converted into thin image. From thin image minutia points are generated which contains false minutia points also. This is further removed by using Euclidian distance between two points.then region of interest (ROI) is selected and corresponding minutia points within ROI is generated and stored in the file for matching of minutia point during authentication. The following figure Fig 7 shows the steps used in feature extraction. Binary Image Minutia Points Thinning Minutia Points after removing false points Region of Interest (ROI) ROI Orientation Fig 7. Steps of Feature Extraction 3.2. Segmentation In this process, the thumb image is partitioned into different non-overlapping region shown in Fig 7. Thresholding: Here we convert the gray-scale thumb image into a binary image based on a threshold value. Fig 8. segmented image Fig 9.Threshold image Vol. 8 No. 5 Oct-Nov 2017 597

3.3. Encryption Process In this process, encrypted image is generated from the thumb template image by doing XORing operation. The flowchart of the proposed chaotic algorithm is shown in Fig 9. Its algorithm is as follows. Step 1: Initial Condition X0 is generated by obtaining a random value in between 0 and 255. Step 2: Using the initial condition obtains the series 2 Xn+1=Exp (-α.xn ) + β Where n=1, 2, 3 is the map iteration index. The value of α is any positive value, whereas the value of β ranges between [-1, 1]. We generate the gauss iterated map for different values α and β. which is in the next section. Step 3: The biometric key is obtained by selecting a random number between 0 and 1. For every Pixel(x,y). KEY[x,y] = Xi, where i is a random number between 0 to 1. Step 4: Ciphered Image is obtained by XORing the KEY with input image. Ciphered Image= P[x,y] XOR KEY[x,y] START READ TEMPLATE IMAGE SELECT X 0 = rand (0, 255) Using eqn. X n+1 = Exp (-αx n 2 )+β Generate a series upto n=127 For every pixel P[x,y] Key[x,y]=X[I]=rand(1) OUTPUT Cipher Image R[x,y] = P[x,y] XOR Key[x,y] Fig 10. Flow Chart of Chaotic Algorithm 3.4. Decryption Process In this process, decryption is done by XORing of the encrypted templates of a particular user stored in the template database with the same key used in the encryption process. Plain Image = Encrypted Image Key Where indicates Exclusive OR operation. ii) Authentication In the authentication phase, the thumb image is captured using the Mantra MFS100 finger scanner. The captured image is preprocessed and its features are extracted. Finally its template is generated. This template contains the minutia points which are used to match with the minutia points generated after decryption of the stored template in the template database. If match is found then the ARAS (Advance remote authentication server) will generate an OTP (One time password)and send to the client. Client has to enter the OTP sent by the ARAS server. The both OTP (client and server) is matched by the ARAS. If match is found then user is authenticated and gained access to the system otherwise the system denied to access the system. 4. Experimental results In our proposed system the encryption and decryption is performed using Gauss Iterated Map. It is derived based on the following mathematical function. Vol. 8 No. 5 Oct-Nov 2017 598

Xn+1= Exp (-α.xn 2 ) + β Where, α is any positive value. β value ranges between [-1, 1]. The experiment is conducted for encryption and decryption of the thumb image for various value of α and β shown in Fig 11. For the value of α=4.9 and β=-0.38, the Gauss Iterated Map shows the maximum randomness and chaotic behavior. It is used for generating the key for encryption and decryption of the template. α =4.9 β=-0.38 α=1.90 β=-0.25 α =2.25 β=-0.29 α=2.70 β=-0.42 α=4.90 β=0.58 Fig11. Encryption and decryption of thumb images Vol. 8 No. 5 Oct-Nov 2017 599

Fig 12. Minutia point matched Minutia points of the region of the interest (ROI) are matched with the minutia points of the region of interest of decrypted template. If 95% of the points are matched then user is authenticated otherwise user is not authenticated. Matched minutia points of the thumb image are shown in the Fig 12. 5. Conclusion The system security is judged by how robust its encryption technique is. In the proposed scheme, 128 bit symmetric key generated by gauss iterated map is chaotic in nature and it is difficult to guess by the adversary. The variation of key generated by Gauss Iterated Map for different values α and β are numerous and any one of them can be chosen for encryption and decryption. But for α=4.9 and β=-0.38, the Gauss Iterated Map shows the maximum randomness and chaotic behavior. Further OTP enhances the security mechanism and makes the system robust. References [1] Wimberly, H; Liebrock, L.M. (2011): Using Fingerprint Authentication to Reduce System Security: An Empirical Study. IEEE Symposium on Security and Privacy, pp. 32-46. [2] Khan, M. K; Zhang, J. (2006): An Efficient and Practical Fingerprint-Based Remote User Authentication Scheme with Smart Cards. Second International Conference, ISPEC 2006, Hangzhou, China, DOI 10.1007/11689522_24, pp. 260-268. [3] Gao, T; Chen, Z. (2008): A new image encryption algorithm based on hyper-chaos. Physics Letters A, 372(4), pp. 394 400. [4] Jun, Z; Jinping, L; Luqian,W. (2010): A New Compound Chaos Encryption Algorithm for Digital Images. International Forum on Information Technology and Applications (IFITA-2010), Kunming, China, DOI: 10.1109/IFITA.2010.117, pp. 277-279. [5] Mazloom, S; Moghadam, A. M. E. (2009): Color image encryption based on Coupled Nonlinear Chaotic Map. Chaos, Solitons and Fractals, 42(3), pp 1745-1754. [6] Lai,L; Ho, Siu-Wai; Poor, H.V. (2011): Privacy Security Trade-Offs in Biometric Security Systems Part I: Single Use Case. IEEE Transactions on Information Forensics and Security, 6(1), pp.122-139. [7] Kumar, S; Shaw, D.K. (2015): Chaos based Encryption Mechanism for Wireless Local Area Network Authentication. International Journal of Applied Engineering Research, 10(15), pp. 35147-35152. Vol. 8 No. 5 Oct-Nov 2017 600