Agnitè Maxim Wilfrid Straiker Edoh, Tahirou Djara, Abdou-Aziz Sobabe Ali Tahirou, A. Vianou
{"title":"移动平台上的生物识别认证方法","authors":"Agnitè Maxim Wilfrid Straiker Edoh, Tahirou Djara, Abdou-Aziz Sobabe Ali Tahirou, A. Vianou","doi":"10.4018/ijmcmc.334130","DOIUrl":null,"url":null,"abstract":"In this work, the authors propose a new biometric authentication system on mobile devices, enhancing security at these terminals and preserving user privacy. The proposed system uses a method of extracting strong features from minutiae with refinement of the method with regard to the further elimination of false minutiae by the calculation of geometric information (orientations and distances between minutiae) to obtain true terminations and stronger bifurcations facilitating the recognition of individuals. A series of tests carried out using a recognition and authentication application allowed us to achieve a false rejection rate of 13.81% and a false acceptance rate of almost zero (0.021%). The authors also propose a security model using hash functions and a random number to make the recognition system revocable, more difficult to compromise and thus reducing the risk of usurpation.","PeriodicalId":43265,"journal":{"name":"International Journal of Mobile Computing and Multimedia Communications","volume":"28 1","pages":""},"PeriodicalIF":0.4000,"publicationDate":"2023-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Biometric Authentication Methods on Mobile Platforms\",\"authors\":\"Agnitè Maxim Wilfrid Straiker Edoh, Tahirou Djara, Abdou-Aziz Sobabe Ali Tahirou, A. Vianou\",\"doi\":\"10.4018/ijmcmc.334130\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this work, the authors propose a new biometric authentication system on mobile devices, enhancing security at these terminals and preserving user privacy. The proposed system uses a method of extracting strong features from minutiae with refinement of the method with regard to the further elimination of false minutiae by the calculation of geometric information (orientations and distances between minutiae) to obtain true terminations and stronger bifurcations facilitating the recognition of individuals. A series of tests carried out using a recognition and authentication application allowed us to achieve a false rejection rate of 13.81% and a false acceptance rate of almost zero (0.021%). The authors also propose a security model using hash functions and a random number to make the recognition system revocable, more difficult to compromise and thus reducing the risk of usurpation.\",\"PeriodicalId\":43265,\"journal\":{\"name\":\"International Journal of Mobile Computing and Multimedia Communications\",\"volume\":\"28 1\",\"pages\":\"\"},\"PeriodicalIF\":0.4000,\"publicationDate\":\"2023-11-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Mobile Computing and Multimedia Communications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4018/ijmcmc.334130\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"TELECOMMUNICATIONS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Mobile Computing and Multimedia Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/ijmcmc.334130","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
Biometric Authentication Methods on Mobile Platforms
In this work, the authors propose a new biometric authentication system on mobile devices, enhancing security at these terminals and preserving user privacy. The proposed system uses a method of extracting strong features from minutiae with refinement of the method with regard to the further elimination of false minutiae by the calculation of geometric information (orientations and distances between minutiae) to obtain true terminations and stronger bifurcations facilitating the recognition of individuals. A series of tests carried out using a recognition and authentication application allowed us to achieve a false rejection rate of 13.81% and a false acceptance rate of almost zero (0.021%). The authors also propose a security model using hash functions and a random number to make the recognition system revocable, more difficult to compromise and thus reducing the risk of usurpation.