Two-factor cancelable biometrics authenticator

Ying Han Pang, Beng Jin Teoh, N. C.L. David

Research output: Contribution to journalArticle

1 Citation (Scopus)

Abstract

Biometrics-based authentication system offers advantages of providing high reliability and accuracy. However, the contemporary authentication system is impuissance to compromise. If a biometrics data is compromised, it cannot be replaced and rendered unusable. In this paper, a cancelable biometrics-based authenticator is proposed to solve this irrevocability issue. The proposed approach is a two-factor authentication system, which requires both of the random data and facial feature in order to access the system. In this system, tokenized pseudo-random data is coupled with moment-based facial feature via inner product algorithm. The output of the product is then discretized to generate a set of private binary code, coined as 2factor-Hashing code, which is acted as verification key. If this biometrics-based verification key is compromised, a new one can be issued by replacing a different set of random number via token replacement. Then, the compromised one is rendered completely useless. This feature offers an extra protection layer against biometrics fabrication since the verification code is replaceable. Experimental results demonstrate that the proposed system provides zero Equal Error Rate in which there is a clear separation in between the genuine and the imposter distribution populations.

Original languageEnglish
Pages (from-to)54-59
Number of pages6
JournalJournal of Computer Science and Technology
Volume22
Issue number1
DOIs
Publication statusPublished - 2007 Jan 1

Fingerprint

Biometrics
Authentication
Population distribution
Binary codes
Hashing
Random number
Binary Code
Scalar, inner or dot product
Replacement
Error Rate
Fabrication
Moment
Output
Zero
Experimental Results
Demonstrate

All Science Journal Classification (ASJC) codes

  • Software
  • Theoretical Computer Science
  • Hardware and Architecture
  • Computer Science Applications
  • Computational Theory and Mathematics

Cite this

Pang, Ying Han ; Teoh, Beng Jin ; David, N. C.L. / Two-factor cancelable biometrics authenticator. In: Journal of Computer Science and Technology. 2007 ; Vol. 22, No. 1. pp. 54-59.
@article{4c31cd8c5c054d1ca169f1ca8a8351d4,
title = "Two-factor cancelable biometrics authenticator",
abstract = "Biometrics-based authentication system offers advantages of providing high reliability and accuracy. However, the contemporary authentication system is impuissance to compromise. If a biometrics data is compromised, it cannot be replaced and rendered unusable. In this paper, a cancelable biometrics-based authenticator is proposed to solve this irrevocability issue. The proposed approach is a two-factor authentication system, which requires both of the random data and facial feature in order to access the system. In this system, tokenized pseudo-random data is coupled with moment-based facial feature via inner product algorithm. The output of the product is then discretized to generate a set of private binary code, coined as 2factor-Hashing code, which is acted as verification key. If this biometrics-based verification key is compromised, a new one can be issued by replacing a different set of random number via token replacement. Then, the compromised one is rendered completely useless. This feature offers an extra protection layer against biometrics fabrication since the verification code is replaceable. Experimental results demonstrate that the proposed system provides zero Equal Error Rate in which there is a clear separation in between the genuine and the imposter distribution populations.",
author = "Pang, {Ying Han} and Teoh, {Beng Jin} and David, {N. C.L.}",
year = "2007",
month = "1",
day = "1",
doi = "10.1007/s11390-007-9006-x",
language = "English",
volume = "22",
pages = "54--59",
journal = "Journal of Computer Science and Technology",
issn = "1000-9000",
publisher = "Springer New York",
number = "1",

}

Two-factor cancelable biometrics authenticator. / Pang, Ying Han; Teoh, Beng Jin; David, N. C.L.

In: Journal of Computer Science and Technology, Vol. 22, No. 1, 01.01.2007, p. 54-59.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Two-factor cancelable biometrics authenticator

AU - Pang, Ying Han

AU - Teoh, Beng Jin

AU - David, N. C.L.

PY - 2007/1/1

Y1 - 2007/1/1

N2 - Biometrics-based authentication system offers advantages of providing high reliability and accuracy. However, the contemporary authentication system is impuissance to compromise. If a biometrics data is compromised, it cannot be replaced and rendered unusable. In this paper, a cancelable biometrics-based authenticator is proposed to solve this irrevocability issue. The proposed approach is a two-factor authentication system, which requires both of the random data and facial feature in order to access the system. In this system, tokenized pseudo-random data is coupled with moment-based facial feature via inner product algorithm. The output of the product is then discretized to generate a set of private binary code, coined as 2factor-Hashing code, which is acted as verification key. If this biometrics-based verification key is compromised, a new one can be issued by replacing a different set of random number via token replacement. Then, the compromised one is rendered completely useless. This feature offers an extra protection layer against biometrics fabrication since the verification code is replaceable. Experimental results demonstrate that the proposed system provides zero Equal Error Rate in which there is a clear separation in between the genuine and the imposter distribution populations.

AB - Biometrics-based authentication system offers advantages of providing high reliability and accuracy. However, the contemporary authentication system is impuissance to compromise. If a biometrics data is compromised, it cannot be replaced and rendered unusable. In this paper, a cancelable biometrics-based authenticator is proposed to solve this irrevocability issue. The proposed approach is a two-factor authentication system, which requires both of the random data and facial feature in order to access the system. In this system, tokenized pseudo-random data is coupled with moment-based facial feature via inner product algorithm. The output of the product is then discretized to generate a set of private binary code, coined as 2factor-Hashing code, which is acted as verification key. If this biometrics-based verification key is compromised, a new one can be issued by replacing a different set of random number via token replacement. Then, the compromised one is rendered completely useless. This feature offers an extra protection layer against biometrics fabrication since the verification code is replaceable. Experimental results demonstrate that the proposed system provides zero Equal Error Rate in which there is a clear separation in between the genuine and the imposter distribution populations.

UR - http://www.scopus.com/inward/record.url?scp=33847040327&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33847040327&partnerID=8YFLogxK

U2 - 10.1007/s11390-007-9006-x

DO - 10.1007/s11390-007-9006-x

M3 - Article

VL - 22

SP - 54

EP - 59

JO - Journal of Computer Science and Technology

JF - Journal of Computer Science and Technology

SN - 1000-9000

IS - 1

ER -