DocumentCode
3410153
Title
Combining steganography and biometric cryptosystems for secure mutual authentication and key exchange
Author
Al-Assam, H. ; Rashid, Rasber ; Jassim, S.
Author_Institution
Dept. of Appl. Comput., Univ. of Buckingham, Buckingham, UK
fYear
2013
fDate
9-12 Dec. 2013
Firstpage
369
Lastpage
374
Abstract
Although biometric authentication is perceived to be more reliable than traditional authentication schemes, it becomes vulnerable to several attacks when it comes to remote authentication over open networks. Steganography based techniques have been used in the context of remote authentication to hide biometric feature vectors. Biometric cryptosystems, on the other hand, are proposed to enhance the security of biometric systems and to create revocable representations of individuals. However, neither steganography nor biometric cryptosystems are immune against replay attack and other remote attacks. This paper proposes a novel approach that combines steganography with biometric cryptosystems effectively to establish robust remote mutual authentication between two parties as well as key exchange that facilitates one-time stego-keys. The proposal involves the use of random orthonormal projection and multifactor biometric key binding techniques, and relies on a mutual challenge/response and one-time stego-keys to prevent replay attacks and provide non-repudiation feature. Implementation details and simulation results based on face biometric show the viability of our proposal. Furthermore, we argue that the proposed scheme enhances security while it can be both user-friendly and cost-effective.
Keywords
biometrics (access control); computer network security; message authentication; steganography; biometric cryptosystem; biometric feature vectors; key exchange; multifactor biometric key binding technique; nonrepudiation feature; one time stego-keys; open networks; random orthonormal projection; remote attacks; replay attack prevention; secure remote mutual authentication; steganography; Authentication; Biomedical imaging; Cryptography; Data mining; Feature extraction; Reed-Solomon codes; Robustness; biometrics; challenge-response; multi-factor authentication; mutual authentication; steganography key agreement;
fLanguage
English
Publisher
ieee
Conference_Titel
Internet Technology and Secured Transactions (ICITST), 2013 8th International Conference for
Conference_Location
London
Type
conf
DOI
10.1109/ICITST.2013.6750224
Filename
6750224
Link To Document