Abstract
A novel smart card user authentication scheme is proposed in this paper. It is the first authentication scheme that can achieve “one-card-pass” functionality, that is, an authorized card user may register with any department in an organization, and then, by just passing the face-to-face authentication but without conducting any extra registration, the card user can use his/her card to gain different services from all authorized departments in this organization. To enhance the security, image morphing and de-morphing techniques are used in our proposed scheme. Both the theoretical analyses and experimental results show that our proposed scheme is secure and very simple to implement.
Similar content being viewed by others
References
Lamport L (1981) Password authentication with insecure communication. Commun ACM 24:770–772
Hwang MS, Li LH (2000) A new remote user authentication scheme using smart card. IEEE Trans Consum Electron 46:28–30
Sun HM (2000) An efficient remote user authentication scheme using smart cards. IEEE Transon Consum Electron 46:958–961
Juang WS, Chen ST, Liaw HT (2008) Robust and efficient password-authenticated key agreement using smart card. IEEE Trans Ind Electron 55:2551–2556
Kim SK, Chung MG (2009) More secure remote user authentication scheme. Comput Commun 32:1018–1021
Song R (2010) Advanced smart card based password authentication protocol. Comput Stand Interfaces 32:321–325
Li X, Niu J, Khan MK, Liao J (2013) An enhanced smart card based remote user password authentication scheme. J Netw Comput Appl 36:1365–1371
Li CT (2013) A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card. IET Inf Secur 7:3–10
Yu PL, Sadler BM (2011) MIMO authentication via deliberate fingerprinting at the physical layer. IEEE Trans Inf Forensics Secur 6:606–615
Kim DJ, Chung KW, Hong KS (2010) Person authentication using face, teeth and voice modalities for mobile device security. IEEE Trans Consum Electron 56:2678–2685
Huang X, Xiang Y, Chonka A, Zhou J, Deng RH (2011) A generic framework for three-factor authentication: preserving security and privacy in distributed systems. IEEE Trans Parallel Distrib Syst 22:1390–1397
Li X, Niu J, Wang Z, Chen C (2014) Applying biometrics to design three-factor remote user authentication scheme with key agreement. Secur Commun Netw 7:1488–1497
Yu J, Wang G, Mu Y, Gao W (2014) An efficient generic framework for three-factor authentication with provably secure instantiation. IEEE Trans Inf Forensics Secur 9:2302–2313
Zhao Q (2009) Technique, method, and system for card holder authentication. Tokugan 2009–144420
Zhao Q, Akatsuka M, Hsieh CH (2012) Generating facial images for steganography based on IGA and image morphing. IEEE Int Conf Syst Man Cybern 364–369
Zhao Q, Hsieh CH (2011) Card user authentication based on generalized image morphing. The 3rd Int Conf Aware Sci Technol 117–122
Beier T, Neely S (1992) Feature-based image metamorphosis. Proc 19th Annu Conf Comput Gr Interact Tech 35–42
Wolberg G (1989) Skeleton-based image warping. Vis Comput 5:95–108
Zhu L, Yang Y, Haker S, Tannenbaum A (2007) An image morphing technique based on optimal mass preserving mapping. IEEE Trans Image Process 16:1481–1495
Mao Q, Bharanitharan K, Chang CC (2010) Edge directed automatic control point selection algorithm for image morphing. IETE Tech Rev 30:343–243
Mao Q, Chang CC, Harn L, Chang SC (2015) An image-based key agreement protocol using the morphing technique. Multimed Tools Appl 74:3207–3229
Mao Q, Bharanitharan K, Chang CC (2014) A proxy user authentication protocol using source-based image morphing. Comput J. doi:10.1093/comjnl/bxu094
AT&T face database, http://www.cl.cam.ac.uk/research/dtg/attarchive/facedatabase.html
Yale face database, http://cvc.yale.edu/projects/yalefaces/yalefaces.html
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Liu, Y., Chang, CC. A one-card-pass user authentication scheme using image morphing. Multimed Tools Appl 76, 21247–21264 (2017). https://doi.org/10.1007/s11042-016-4077-8
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-016-4077-8