JCC  Vol.2 No.4 , March 2014
Biometric-PKI Authentication System Using Fingerprint Minutiae
Abstract

A digital certificate under Public Key Infrastructure has a defect of Man-in-the-Middle Attack that performs hash collision attacks. In this paper, we propose a robust biometric-PKI authentication system against Man-in-the-Middle Attack. The biometric-PKI authentication system consists of current PKI authentication and biometric authentication, which employs biometric data and a public key from a digital certificate. In the proposed biometric-PKI authentication system, an au- thentication process performs that it extracts consistent features of fingerprint images, encrypts consistent features, and matches features with prepared templates. The simulation results of the proposed authentication system prove that our system achieves low false acceptance rate and high accuracy rate.


Cite this paper
Jang, H. and Lee, H. (2014) Biometric-PKI Authentication System Using Fingerprint Minutiae. Journal of Computer and Communications, 2, 25-30. doi: 10.4236/jcc.2014.24004.
References

[1]   Adams, C. and Farrell, S. (1999) Internet X.509 Public Key Infrastructure Certificate Management Protocols. RFC 2510 (Proposed Standard). http://www.ietf.org/rfc/rfc2510.txt

[2]   Schaad, J. (2005) Internet X.509 Public Key In-frastructure Certificate Request Message Format (CRMF). RFC 4211 (Proposed Standard). http://www.ietf.org/rfc/rfc4211.txt

[3]   Althobaiti, O.S. and Aboalsamh, H.A. (2012) An Enhanced Elliptic curve Cryptography for Biometric. Proceedings of the 7th International Conference on Computing and Convergence Technology, Seoul, 3-5 December 2012, 1048-1055.

[4]   Scheirer, W., Bishop, B. and Boult, T. (2010) Beyond PKI: The Biocryptographic Key Infrastructure. Proceedings of the IEEE International Workshop on Information Forensics and Security, Seattle, 12-15 December 2010, 1-6. http://dx.doi.org/10.1109/WIFS.2010.5711435

[5]   Jain, A., Prabhakar, S., Hong, L. and Pankanti, S. (2000) Filter-bank-Based Fingerprint Matching. IEEE Transactions on Image Processing, 9, 846-859. http://dx.doi.org/10.1109/83.841531

[6]   Jain, A., Hong, L. and Bolle, R. (1997) On-Line Fingerprint Verification. IEEE Transactions on Pattern Analysis and Machine Intelligence, 19, 302-314. http://dx.doi.org/10.1109/34.587996

[7]   Rao, A.R. (1990) A Taxonomy for Texture Description and Identification. Springer, New York. http://dx.doi.org/10.1007/978-1-4613-9777-9

[8]   Hong, L., Wan, Y. and Jain, A.K. (1998) Fingerprint Image Enhancement: Algorithm and Performance Evaluation. IEEE Transactions on Pattern Analysis and Machine Intelligence, 20, 777-789. http://dx.doi.org/10.1109/34.709565

[9]   Maltoni, D., Maio, D., Jain, A.K. and Prabhakar, S. (2009) Handbook of Fingerprint Recognition. 2nd Edition, Springer, London. http://dx.doi.org/10.1007/978-1-84882-254-2

[10]   Sotirov, A., et al. (2008) Creating a Rogue CA Certificate. http://www.tue.nl/hashclash/rogue-ca/

[11]   Maio, D., Maltoni, D., Cappelli, R. and Wayman, J.L. (2002) FVC2002: Second Fingerprint Verification Competition. Proceedings of the 16th International Conference on Pattern Recognition, 3, 811-814. http://dx.doi.org/10.1109/ICPR.2002.1048144

 
 
Top