Abstract
User authentication procedures should be enhanced its security on Smart phone. And more secure system should be implemented to minimize the user’s privacy disclosure. Although image-based authentication mechanism was introduced recently, replay attack is also possible on existing one-time password based authentication system. In this paper, we implemented pseudo biometric image based OTP generation mechanism, which uses transformation function on captured biometric image from each user for providing enhanced secure authentication service on smart phone.
This research was supported by Basic Science Research Program though the NRF of Korea funded by the MEST (No.2010-0016882) and also partially supported by MKE (Ministry of Knowledge Economy), Korea, under the ITRC (Information Technology Research Center) support program supervised by NIPA (National IT Industry Promotion Agency)” (NIPA- 2011-(C1090-1031-0005)).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Lamport, L.: Password authentication with insecure communication. Communications of the ACM 24, 770–772 (1981)
Haller, N.M.: A one-time password system. Tech. Rep. RFC 1938 (May 1996)
Haller, N.M., Metz, C., Nesser II, P.J., Straw, M.: A one-time password system. RFC 2289 (February 1998), http://www.ietf.org/rfc/rfc2289.txt
Jang, W.J., Lee, H.W.: Biometric one-time password generation mechanism and its application on SIP authentication. Journal of the Korea Convergence Society 1(1), 93–100 (2010)
Lin, M.H., Chang, C.C.: A secure one-time password authentication scheme with low-computation for mobile communications. ACM SIGOPS Operating Systems Review 38(2), 76–84 (2004)
http://confidenttechnologies.com/products/confident-imageshield
http://www.darkreading.com/authentication/security/client/showArticle.jhtml?articleID=228200140
Ang, R., Rei, S.N., McAven, L.: Cancelable Key-Based Fingerprint Templates. In: Boyd, C., González Nieto, J.M. (eds.) ACISP 2005. LNCS, vol. 3574, pp. 242–252. Springer, Heidelberg (2005)
Hirata, S., Takahashi, K.: Cancelable Biometrics with Perfect Secrecy for Correlation-Based Matching. In: Tistarelli, M., Nixon, M.S. (eds.) ICB 2009. LNCS, vol. 5558, pp. 868–878. Springer, Heidelberg (2007)
Kong, B., et al.: An analysis of Biohashing and its variants. Elsevier - Pattern Recognition 39(7), 1359–1368 (2006)
Lee, Y.J., et al.: One-Time Templates for Face Authentication. In: International Conference on Convergence Information Technology (ICCIT 2007), pp. 1818–1823 (2007)
Savvides, M., Vijaya Kumar, B.V.K., Khosla, P.K.: Cancelable Biometrics Filters for Face Recognition. In: Int. Conf. of Pattern Recognition, vol. 3, pp. 922–925 (2004)
Wang, D.-S., Li, J.-P.: A new fingerprint-based remote user authentication scheme using mobile devices. In: International Conference on Apperceiving Computing and Intelligence Analysis, ICACIA 2009, pp. 65–68 (2009)
Yoon, E.J., Yoo, K.Y.: A secure chaotic hash-based biometric remote user authentication scheme using mobile devices. In: Chang, K.C.-C., Wang, W., Chen, L., Ellis, C.A., Hsu, C.-H., Tsoi, A.C., Wang, H. (eds.) APWeb/WAIM 2007. LNCS, vol. 4537, pp. 612–623. Springer, Heidelberg (2007)
Khan, M.K., Zhang, J.S., Wang, X.M.: Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices. Chaos, Solutions & Fractals 35, 519–524 (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jang, W., Cho, S., Lee, HW. (2011). User-Oriented Pseudo Biometric Image Based One-Time Password Mechanism on Smart Phone. In: Kim, Th., Adeli, H., Robles, R.J., Balitanas, M. (eds) Information Security and Assurance. ISA 2011. Communications in Computer and Information Science, vol 200. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23141-4_42
Download citation
DOI: https://doi.org/10.1007/978-3-642-23141-4_42
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-23140-7
Online ISBN: 978-3-642-23141-4
eBook Packages: Computer ScienceComputer Science (R0)