• DocumentCode
    3410153
  • Title

    Combining steganography and biometric cryptosystems for secure mutual authentication and key exchange

  • Author

    Al-Assam, H. ; Rashid, Rasber ; Jassim, S.

  • Author_Institution
    Dept. of Appl. Comput., Univ. of Buckingham, Buckingham, UK
  • fYear
    2013
  • fDate
    9-12 Dec. 2013
  • Firstpage
    369
  • Lastpage
    374
  • Abstract
    Although biometric authentication is perceived to be more reliable than traditional authentication schemes, it becomes vulnerable to several attacks when it comes to remote authentication over open networks. Steganography based techniques have been used in the context of remote authentication to hide biometric feature vectors. Biometric cryptosystems, on the other hand, are proposed to enhance the security of biometric systems and to create revocable representations of individuals. However, neither steganography nor biometric cryptosystems are immune against replay attack and other remote attacks. This paper proposes a novel approach that combines steganography with biometric cryptosystems effectively to establish robust remote mutual authentication between two parties as well as key exchange that facilitates one-time stego-keys. The proposal involves the use of random orthonormal projection and multifactor biometric key binding techniques, and relies on a mutual challenge/response and one-time stego-keys to prevent replay attacks and provide non-repudiation feature. Implementation details and simulation results based on face biometric show the viability of our proposal. Furthermore, we argue that the proposed scheme enhances security while it can be both user-friendly and cost-effective.
  • Keywords
    biometrics (access control); computer network security; message authentication; steganography; biometric cryptosystem; biometric feature vectors; key exchange; multifactor biometric key binding technique; nonrepudiation feature; one time stego-keys; open networks; random orthonormal projection; remote attacks; replay attack prevention; secure remote mutual authentication; steganography; Authentication; Biomedical imaging; Cryptography; Data mining; Feature extraction; Reed-Solomon codes; Robustness; biometrics; challenge-response; multi-factor authentication; mutual authentication; steganography key agreement;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Internet Technology and Secured Transactions (ICITST), 2013 8th International Conference for
  • Conference_Location
    London
  • Type

    conf

  • DOI
    10.1109/ICITST.2013.6750224
  • Filename
    6750224