Abstract
This paper studies the smartcard based fingerprint encrytion/auth-entication scheme for ATM banking systems. In this scheme, the system authenticates each user by both his/her possession (smartcard) and biometrics (fingerprint). A smartcard is used for the first layer of authentication. Based on the successful pass of the first layer authentication, a subsequent process of the biometric fingerprint authentication proceeds. The proposed scheme is fast and secure. Computer simulations and statistical analyze are presented.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Soutar, C., Roberge, D., Stoianov, A., Gilory, R., Kumar, B.V.: Biometric encryption, www.bioscrypt.com
Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.K.: Biometric cryptosystems: Issue and challenges. Proceedings of the IEEE 92, 948–960 (2004)
Jain, A.K., Prabhakar, S., Hong, L., Pankanti, S.: Filterbank-based fingerprint matching. IEEE Trans. on Image Processing 9, 846–859 (2000)
Lee, J.K., Ryu, S.R., Yoo, K.Y.: Fingerprint-based remote user authentication scheme using smart cards. Electronics Lett. 38, 554–555 (2002)
Clancy, T.C., Kiyavash, N., Lin, D.J.: Secure smartcard-based fingerprint authentication. In: ACM workshop on Biometric Methods and Applications, Berkeley, California (November 2003)
Waldmann, U., Scheuermann, D., Eckert, C.: Protect transmission of biometric user authentication data for oncard-matching. In: ACM symp. on Applied Computing, Nicosia, Cyprus (March 2004)
Jain, A.K., Prabhakar, S., Hong, L.: A multichannel approach to fingerprint classification. IEEE Trans. on Pattern Anal. Machine Intell. 21, 348–359 (1999)
Kocarev, L., Jakimoski, G., Stojanovski, T., Parlitz, U.: From chaotic maps to encryption schemes. In: Proc. IEEE Sym. Circuits and Syst, Monterey, California, June 1998, pp. 514–517 (1998)
Chen, G., Mao, Y., Chui, C.: A symmetric encryption scheme based on 3D chaotic cat map. Chaos, Solitons & Fractals 21, 749–761 (2004)
Fridrich, J.: Symmetric Ciphers Based on two-dimensional chaotic maps. Int. J. Bifurcation and Chaos 8, 1259–1284 (1998)
Menezes, A., Oorschot, P., Vanston, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)
Uludag, U., Ross, A., Jain, A.K.: Biometric template selection and update: a case study in fingerprints. Pattern Recognit. 37, 1533–1542 (2004)
Ratha, N.K., Karu, K., Chen, S., Jain, A.K.: A real-time matching system for large fingerprint databases. IEEE Trans. on Pattern Anal. Machine Intell. 18, 799–813 (1996)
Zhou, J., Gu, J.: A model-based method for the computation of fingerprints’ orientation field. IEEE Trans. on Image Processing 13, 821–835 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Han, F., Hu, J., Yu, X., Feng, Y., Zhou, J. (2005). A Novel Hybrid Crypto-Biometric Authentication Scheme for ATM Based Banking Applications. In: Zhang, D., Jain, A.K. (eds) Advances in Biometrics. ICB 2006. Lecture Notes in Computer Science, vol 3832. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11608288_90
Download citation
DOI: https://doi.org/10.1007/11608288_90
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-31111-9
Online ISBN: 978-3-540-31621-3
eBook Packages: Computer ScienceComputer Science (R0)