A Novel Authentication Model Based on Multi- Biometric Hashing
A Novel Authentication Model Based on Multi- Biometric Hashing |
||
|
||
© 2023 by IJETT Journal | ||
Volume-71 Issue-8 |
||
Year of Publication : 2023 | ||
Author : Ahmed Y. Mahmoud, Mohammed Hazem M. Hamadaqa |
||
DOI : 10.14445/22315381/IJETT-V71I8P218 |
How to Cite?
Ahmed Y. Mahmoud, Mohammed Hazem M. Hamadaqa, "A Novel Authentication Model Based on Multi- Biometric Hashing," International Journal of Engineering Trends and Technology, vol. 71, no. 8, pp. 201-215, 2023. Crossref, https://doi.org/10.14445/22315381/IJETT-V71I8P218
Abstract
Authentication systems based on biometrics have been widely used in recent years as a means to enhance security and improve the user experience. However, traditional biometric authentication systems that rely on a single biometric modality, such as fingerprints or facial recognition, may not be able to provide a sufficient level of security and accuracy. This is particularly true in scenarios where the quality of the biometric samples is poor or when the users are trying to impersonate someone else. In this paper, we proposed a novel approach for biometric authentication that addresses these limitations by combining multiple biometric modalities. The proposed system uses fingerprints and the iris eye as the primary means of identification to increase security, reliability, and accuracy. The use of multiple modalities enables the system to account for variations in the quality of individual samples, thus reducing the chances of false rejections or acceptances. Furthermore, this paper proposes the use of hash functions for data retrieval as a way to reduce storage costs and improve the speed of the system. The paper investigates various hash algorithms, such as SHA1, SHA-256, and SHA-512; SHA3-256 and SHA3-512 give a 10% success rate in matching and also demonstrates that the use of Perceptual Hash, Average Hash, and Difference Hash algorithms result in an 83.33% success rate in matching.
Keywords
Average Hash, Biometric authentication, Difference Hash, Multi-biometric, Perceptual Hash.
References
[1] Maria Papathanasaki, Maglaras Leandros, and Nick Ayres, “Modern Authentication Methods: A Comprehensive Survey,” AI, Computer Science and Robotics Technology, pp. 1-24, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[2] R. Neha, and P. Monica, “A Review of Advancement in Multimodal Biometrics System,” International Journal of Scientific & Engineering Research, vol. 7, no. 12, pp. 241-248, 2016.
[Google Scholar] [Publisher Link]
[3] B. Miller, "Everything you need to Know about Biometric Identification,” Personal Identification News 1988 Biometric Industry Directory, Washington DC: Warfel& Miller Inc., Washington DC, 1988.
[4] James L. Wayman, “National Biometric Test Center Collected Works 1997–2000,” San Jose State University, 2000.
[Google Scholar] [Publisher Link]
[5] Bart Preneel, René Govaerts, and Joos Vandewalle, “Cryptographic Hash Functions: An Overview,” Proceedings of the 6th International Computer Security and Virus Conference, vol. 19, 1993.
[Google Scholar] [Publisher Link]
[6] Rui Zhang, and Zheng Yan, “A Survey on Biometric Authentication: Toward Secure and Privacy-Preserving Identification,” IEEE Access, vol. 7, pp. 5994-6009, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Atul N. Kataria et al., “A Survey of Automated Biometric Authentication Techniques,” Nirma University International Conference on Engineering, IEEE, pp. 1-6, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Anil K. Jain, Arun Ross, and Salil Prabhakar, “An Introduction to Biometric Recognition,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 14, no. 1, pp. 4-20, 2004.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Dapeng Zhang, and Wei Shu, “Two Novel Characteristics in Palmprint Verification: Datum Point Invariance and Line Feature Matching,” Pattern Recognition, vol. 32, no. 4, pp. 691-702, 1999.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Delac Kresimir, and Mislav Grgic, “A Survey of Biometric Recognition Methods,” Proceedings Elmar-2004, 46th International Symposium on Electronics in Marine, IEEE, pp. 184-193, 2004.
[Google Scholar] [Publisher Link]
[11] Alfred Victor Iannarelli, Ear Identification, Paramont Publishing Company, 1989
[Publisher Link]
[12] Mark Burge, and Wilhelm Burger, “Ear Biometrics in Computer Vision,” Proceedings 15th International Conference on Pattern Recognition, vol. 2, pp. 822-826, 2000.
[CrossRef] [Google Scholar] [Publisher Link]
[13] AlMahafzah, Harbi, and Maen Zaid Al Rwashdeh, “A Survey of Multibiometric Systems,” arXiv preprint, Computer Vision and Pattern Recognition, 2012.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Mohamed Deriche, “Trends and Challenges in Mono and Multi Biometrics,” First Workshops on Image Processing Theory, Tools and Applications, IEEE, pp. 1-9, 2008.
[CrossRef] [Google Scholar] [Publisher Link]
[15] M. S. Ahuja, and S. Chabbra, "A Survey of Multimodal Biometrics," International Journal of Computer Science and its Applications, vol. 1, no. pp. 157-160, 2011.
[16] Mahesh Kale, and Shrikant Dhamdhere, “Survey Paper on Different Types of Hashing Algorithm,” International Journal of Advance Scientific Research Algorithm, vol. 3, no. 2, pp. 14-16, 2018.
[Google Scholar] [Publisher Link]
[17] Ahmed Y. Mahmoud, “A Novel Hash Functions for Data Integrity Based on Affine Hill Cipher and Tensor Product,” International Journal of Engineering Trends and Technology, vol. 70, no. 11, pp. 1–9, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Andrea Drmic et al., “Evaluating Robustness of Perceptual Image Hashing Algorithms,” 40th International Convention on Information and Communication Technology, Electronics and Microelectronics, IEEE, pp. 995-1000, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[19] William Stallings, Cryptography and Network Security, Principles and Practice, 8th Edition, Pearson, 2023.
[Google Scholar] [Publisher Link]
[20] Zauner Christoph, “Implementation and Benchmarking of Perceptual Image Hash Functions,” Thesis, Sichere Informations Systeme in Hagenberg, 2010.
[Google Scholar] [Publisher Link]
[21] Ann Cavoukian, Alex Stoianov, and Fred Carter, “Biometric Encryption: A Positive-Sum Technology That Achieves Strong Authentication, Security and Privacy,” Policies and Research in Identity Management, vol. 261, pp. 55-77, 2008.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Abeng Enangha Eyam, and W. Adebisi Adesola, “Application of Hybrid Hash Message Authentication Code Approach in Biometrics Information System Design,” Global Journal of Pure and Applied Sciences, vol. 18, no. 1, pp. 59-66, 2012.
[Google Scholar] [Publisher Link]
[23] Idrus, Syed Zulkarnain Syed et al., “A Review on Authentication Methods,” Australian Journal of Basic and Applied Sciences, vol. 7, no. 5, pp. 95-107, 2013.
[Google Scholar] [Publisher Link]
[24] Bigun Josef et al., “Multimodal Biometric Authentication Using Quality Signals in Mobile Communications,” 12th International Conference on Image Analysis and Processing, pp. 2-11, 2003.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Julian Fierrez-Aguilar et al., “Kernel-Based Multimodal Biometric Verification Using Quality Signals,” Biometric Technology for Human Identification, vol. 5404, 2004.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Josef Kittler et al., “Quality Dependent Fusion of Intramodal and Multimodal Biometric Experts,” Biometric Technology for Human Identification, vol. 6539, 2007.
[CrossRef] [Google Scholar] [Publisher Link]
[27] Karthik Nanda Kumar et al., “Likelihood Ratio-Based Biometric Score Fusion,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 30, no. 2, pp. 342-347, 2007.
[CrossRef] [Google Scholar] [Publisher Link]
[28] Gatheejathul J. Kubra, and P. Rajesh et al., “Iris Recognition and its Protection Overtone using Cryptographic Hash Function," SSRG International Journal of Computer Science and Engineering, vol. 3, no. 5, pp. 1-9, 2016.
[CrossRef] [Publisher Link]
[29] Fronthaler Hartwig et al., “Fingerprint Image-Quality Estimation and Its Application to Multi Algorithm Verification,” IEEE Transactions on Information Forensics and Security, vol. 3, no. 2, pp. 331-338, 2008.
[CrossRef] [Google Scholar] [Publisher Link]
[30] Yi Chen, Sarat C. Dass, and Anil K. Jain, “Fingerprint Quality Indices for Predicting Authentication Performance,” International Conference on Audio- and Video-Based Biometric Person Authentication, vol. 3546, pp. 160-170, 2005.
[CrossRef] [Google Scholar] [Publisher Link]
[31] Xiufeng Gao et al., “Standardization of Face Image Sample Quality,” Advances in Biometrics: International Conference, vol. 4642, pp. 242-251, 2007.
[CrossRef] [Google Scholar] [Publisher Link]
[32] National Institute of Standards and Technology, Nist Speech Quality Assurance Package 2.3 Documentation," Hashing Algorithms.
[33] Müller Sascha, and Olaf Henniger, “Evaluating the Biometric Sample Quality of Handwritten Signatures,” Advances in Biometrics: International Conference on Biometrics, vol. 4642, pp. 407-414, 2007.
[CrossRef] [Google Scholar] [Publisher Link]
[34] Bengio Samyet al., “Confidence Measures for Multimodal Identity Verification,” Information Fusion, vol. 3, no. 4, pp. 267-276, 2002.
[CrossRef] [Google Scholar] [Publisher Link]
[35] Norman Poh, and SamyBengio, “Improving Fusion with Margin-Derived Confidence in Biometric Authentication Tasks,” International Conference on Audio- and Video-Based Biometric Person Authentication, vol. 3546, pp. 474-483, 2005.
[CrossRef] [Google Scholar] [Publisher Link]
[36] G. Prabhu, and S. Poornima, “Minimize Search Time through Gender Classification from Multimodal Biometrics,” Procedia Computer Science, vol. 50, pp. 289-294, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[37] Razzak Muhammad Imran, Rubiyah Yusof, and Marzuki Khalid, “Multimodal Face and Finger Veins Biometric Authentication,” Scientific Research and Essays, vol. 5, no. 17, pp. 2529-2534, 2010.
[CrossRef] [Google Scholar] [Publisher Link]
[38] Soltane Mohamed, Noureddine Doghmane, and Noureddine Guersi, “Face and Speech Based Multi-Modal Biometric Authentication,” International Journal of Advanced Science and Technology, vol. 21, pp. 41-56, 2010.
[Google Scholar] [Publisher Link]
[39] Dalka Piotr, and Andrzej Czyzewski, “Human-Computer Interface Based on Visual Lip Movement and Gesture Recognition,” International Journal of Computer Science and Applications, vol. 7, no. 3, pp. 124-139, 2010.
[Google Scholar] [Publisher Link]
[40] A.A. Darwish, R. Abd Elghafar, and A. Fawzi Ali, “Multimodal Face and Ear Images,” Journal of Computer Science, vol. 5, no. 5, pp. 374-379, 2009.
[CrossRef] [Google Scholar] [Publisher Link]
[41] Chander Kant, "Performance Improvement of Biometric System using Multimodal Approach," International Journal of Innovations & Advancement in Computer Science, pp. 2347-8616, 2014.
[42] Shigefumi Yamada, Toshio Endoh, and Takashi, “Evaluation of Independence between Palm Vein and Fingerprint for Multimodal Biometrics,” Proceedings of the International Conference of Biometrics Special Interest Group, IEEE, pp. 1-4, 2012.
[Google Scholar] [Publisher Link]
[43] V.D. Mhaske, and A.J. Patankar, “Multimodal Biometrics by Integrating Fingerprint and Palmprint for Security,” IEEE International Conference on Computational Intelligence and Computing Research, pp. 1-5, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[44] Vadhera Priyanka, and Bhumika Lall, “Review Paper on Secure Hashing Algorithm and Its Variants,” International Journal of Science and Research, vol. 3, no. 6, pp. 629-632, 2014.
[Google Scholar] [Publisher Link]
[45] Surbhi Aggarwal Gupta, Neha Goyal, and Kirti Aggarwal, “A Review of Comparative Study of MD5 and SHA Security Algorithm,” International Journal of Computer Applications, vol. 104, no. 14, pp. 1-4, 2014.
[Google Scholar] [Publisher Link]
[46] Shah B. Chaitya, and Drashti R. Panchal, “Secured Hash Algorithm-1: Review Paper,” International Journal of Advanced Research in Engineering Technology and Sciences, vol. 2, pp. 26-30, 2014.
[Google Scholar]
[47] Sampada Abhijit Dhole et al., “Multimodal Biometric Identification System using Random Selection of Biometrics,” SSRG International Journal of Electrical and Electronics Engineering, vol. 10, no. 1, pp. 63-73, 2023.
[CrossRef] [Publisher Link]
[48] Viies Vladimir, “Possible Application of Perceptual Image Hashing,” Master thesis, Tallinn University of Technology, Faculty of Information Technology, Department of Computer Engineering, 2015.
[Google Scholar]
[49] Yang Xin, Qiang Zhu, and Kwang-Ting Cheng, “My Finder: Near-Duplicate Detection for Large Image Collections,” Proceedings of the 17th ACM International Conference on Multimedia, pp. 1013-1014, 2009.
[CrossRef] [Google Scholar] [Publisher Link]
[50] Weiss Yair, Antonio Torralba, and Rob Fergus, “Spectral Hashing,” Proceedings of the 21st International Conference on Neural Information Processing Systems, pp. 1753-1760, 2008.
[Google Scholar] [Publisher Link]
[51] Wang Jun, Sanjiv Kumar, and Shih-Fu Chang, “Semi-Supervised Hashing for Scalable Image Retrieval,” IEEE Computer Society Conference on Computer Vision and Pattern Recognition, pp. 3424-3431, 2010.
[CrossRef] [Google Scholar] [Publisher Link]
[52] Chum Ondrej, James Philbin, and Andrew Zisserman, “Near Duplicate Image Detection: Min-hash and TF-IDF weighting,” Proceedings of the British Machine Vision Conference, 2008.
[CrossRef] [Google Scholar] [Publisher Link]
[53] R. Nanmaran et al., “Design and Development of an Improved Multimodal Biometric Authentication System using Machine learning Classifiers,” SSRG International Journal of Electrical and Electronics Engineering, vol. 10, no. 5, pp. 14-22, 2023.
[CrossRef] [Publisher Link]
[54] Liu Wei et al., “Hashing with Graphs,” Proceedings of the 28th International Conference on Machine Learning, pp. 1-8, 2011.
[Google Scholar] [Publisher Link]
[55] Kulis Brian, and Kristen Grauman, “Kernelized Locality-Sensitive Hashing for Scalable Image Search,” IEEE 12th International Conference on Computer Vision, pp. 2130-2137, 2009.
[Google Scholar] [Publisher Link]
[56] Lin Kevin et al., “Deep Learning of Binary Hash Codes for Fast Image Retrieval,” IEEE Conference on Computer Vision and Pattern Recognition Workshop, pp. 27-35, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[57] Rongkai Xia et al.., “Supervised Hashing for Image Retrieval via Image Representation Learning,” 28thAAAI Conference on Artificial Intelligence, vol. 28, no. 1, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[58] Talreja Veeru et al., “Deep Hashing for Secure Multimodal Biometrics,” IEEE Transactions on Information Forensics and Security, vol. 16, pp. 1306-1321, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[59] Sutcu Yagiz, Husrev Taha Sencar, and Nasir Memon, “A Secure Biometric Authentication Scheme Based on Robust Hashing,” Proceedings of the 7th Workshop on Multimedia and Security, pp. 111-116, 2005.
[CrossRef] [Google Scholar] [Publisher Link]
[60] Kryszczuk Krzysztof, and Andrzej Drygajlo, “Credence Estimation and Error Prediction in Biometric Identity Verification,” Signal Processing, vol. 88, no. 4, pp. 916-925, 2008.
[CrossRef] [Google Scholar] [Publisher Link]
[61] Pooja Goyal, Sushil Kumar, and Komal Kumar Bhatia, “Hashing and Clustering Based Novelty Detection,” SSRG International Journal of Computer Science and Engineering, vol. 6, no. 6, pp. 1-9, 2019.
[CrossRef] [Publisher Link]
[62] Verma Sandhya, and G.S. Prajapati, “A Survey of Cryptographic Hash Algorithms and Issues,” International Journal of Computer Security & Source Code Analysis, vol. 1, no. 3, pp. 17-20, 2015.
[Google Scholar] [Publisher Link]
[63] Chum Ondrej, Michal Perd'och, and Jiri Matas, “Geometric Min-Hashing: Finding a (thick) Needle in a Haystack,” IEEE Conference on Computer Vision and Pattern Recognition, pp. 17-24, 2009.
[CrossRef] [Google Scholar] [Publisher Link]