A steganography-based fingerprint authentication mechanism to counter fake physical biometrics and trojan horse attacks

K. K. H. Karunathilake, A. Shahan, M. N. M. Shamry, M. W. D. S. De Silva, A. Senarathne, K. Yapa
{"title":"A steganography-based fingerprint authentication mechanism to counter fake physical biometrics and trojan horse attacks","authors":"K. K. H. Karunathilake, A. Shahan, M. N. M. Shamry, M. W. D. S. De Silva, A. Senarathne, K. Yapa","doi":"10.1109/iemcon53756.2021.9623240","DOIUrl":null,"url":null,"abstract":"In the modern world, unique biometrics of every individual play a vital role in authentication processes. However, as convenient as it seems, biometrics come with their own set of drawbacks. For instance, if a passphrase is compromised (which is highly likely), changing it to a new passphrase would solve the issue. However, when someone's biometrics are compromised, there is no turning back. Simultaneously, biometric systems are often compromised due to the use of fake physical biometrics and trojan horse attacks that are capable of modifying the authentication process to fulfill a malicious user's intents. This research focuses on proposing a novel and secure authentication process that uses steganography. This “all-in-one” solution also focuses on mitigating the aforementioned drawbacks with the use of four modules, namely, the feature extraction module, the payload generation and authentication module, the fake physical biometrics countering module and the trojan horse countering module. This solution is implemented such that the idea behind it can be easily adopted to enhance the existing biometric authentication systems as well as improve the overall condition and user experience of the multi-factor authentication processes that are widely in use today.","PeriodicalId":272590,"journal":{"name":"2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/iemcon53756.2021.9623240","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

In the modern world, unique biometrics of every individual play a vital role in authentication processes. However, as convenient as it seems, biometrics come with their own set of drawbacks. For instance, if a passphrase is compromised (which is highly likely), changing it to a new passphrase would solve the issue. However, when someone's biometrics are compromised, there is no turning back. Simultaneously, biometric systems are often compromised due to the use of fake physical biometrics and trojan horse attacks that are capable of modifying the authentication process to fulfill a malicious user's intents. This research focuses on proposing a novel and secure authentication process that uses steganography. This “all-in-one” solution also focuses on mitigating the aforementioned drawbacks with the use of four modules, namely, the feature extraction module, the payload generation and authentication module, the fake physical biometrics countering module and the trojan horse countering module. This solution is implemented such that the idea behind it can be easily adopted to enhance the existing biometric authentication systems as well as improve the overall condition and user experience of the multi-factor authentication processes that are widely in use today.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
一种基于隐写术的指纹认证机制,以对抗假物理生物识别和特洛伊木马攻击
在现代社会,每个人的独特生物特征在身份验证过程中起着至关重要的作用。然而,尽管看起来很方便,生物识别技术也有自己的缺点。例如,如果一个密码短语被泄露(这是很有可能的),将其更改为一个新的密码短语将解决问题。然而,当某人的生物特征被泄露时,就没有回头路了。与此同时,生物识别系统经常因为使用虚假的物理生物识别和特洛伊木马攻击而受到损害,这些攻击能够修改身份验证过程以实现恶意用户的意图。本研究的重点是提出一种使用隐写术的新型安全认证过程。这种“一体化”解决方案还侧重于通过使用四个模块来减轻上述缺点,即特征提取模块,有效载荷生成和认证模块,虚假物理生物识别对抗模块和特洛伊木马对抗模块。该解决方案的实现使得其背后的思想可以很容易地用于增强现有的生物识别身份验证系统,并改善目前广泛使用的多因素身份验证过程的整体状况和用户体验。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Maximization of the User Association of a Low-Power Tier Deploying Biased User Association Scheme in 5G Multi-Tier Heterogeneous Network A Deep Reinforcement Learning: Location-based Resource Allocation for Congested C-V2X Scenario A Deep Learning Approach to Predict Chronic Kidney Disease in Human Evaluation of a bio-socially inspired secure DSA scheme using testbed-calibrated hybrid simulations Siamese Network based Pulse and Signal Attribute Identification
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1