Electronic passports have known a wide and fast employment all around the world since the International Civil Aviation Organization (ICAO) the human race has adopted standards whereby electronic passports can store biometrics identifiers. The purpose of electronic passports is to prevent the illegal entry of traveler into a particular country and frontier the use of counterfeit documents by more accurate recognition of an individual. The electronic passport, as it is sometimes called, represents a bold initiative in the employment of two new technologies: Cryptography protocols and biometrics. An electronic passport contains the significant personal information of holder such as photo, name, date of birth and place, nationality, date of issue, date of expiry, authority and so on. The goal of the adoption of the electronic passport is not only to expedite dealing out at border crossings, but also to increase safety measures and privacy. Important in their own right, electronic passports are also the harbinger of a wave of nextgeneration electronic passports: numerous national governments plan to set up electronic passport integrating cryptography safety measures algorithm and biometrics. We walk around the privacy and safety measures implications of this impending worldwide experiment in biometrics certification technology. We describe privacy issues that apply to electronic passports, and then analyze these issues in the context of the ICAO standard for electronic passports. An overall safety measures process that involves people, technology and procedures can overcome limitations of the cryptography protocols and biometrics technologies.
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...ijait
Advancements in technology have created the possibility of greater assurance of proper travel document ownership, but some concerns regarding security and effectiveness remain unaddressed. Electronic passports have known a wide and fast deployment all around the world since the International Civil
Aviation Organization the world has adopted standards whereby passports can store biometric identifiers. The use of biometrics for identification has the potential to make the lives easier, and the world people live in a safer place. The purpose of biometric passports is to prevent the illegal entry of traveler into a specific
country and limit the use of counterfeit documents by more accurate identification of an individual. This paper analyses the face, fingerprint, palmprint and iris biometric e-passport design. This papers focus on privacy and personal security of bearers of e-passports, the actual security benefit countries obtained by
the introduction of e-passports using face, fingerprint, palmprint and iris recognition systems. Researcher analyzed its main cryptographic features; the face fingerprint, palmprint and iris biometrics currently used with e-passports and considered the surrounding procedures. Researcher focused on vulnerabilities since anyone willing to bypass the system would choose the same approach. On the contrary, solely relying on them may pose a risk that did not exist with previous passports and border controls. The paper also provides a security analysis of the e-passport using face fingerprint, palmprint and iris biometric that are intended to provide improved security in protecting biometric information of the e-passport bearer.
This article looks at one of the evolving crimes of the digital age; identity theft. It argues and explains that if three key technologies were implemented together namely biometrics, smart cards, and PKI, then they can deliver a robust and trusted identification and authentication infrastructure. The article concludes that such infrastructure may provide the foundation for e-government and e-commerce initiatives as it addresses the need for strong user authentication of virtual identities.
Face Recognition Using ML in Public Transportsijtsrd
Modernization of railways has forever been an issue focused on the development of the fundamental infrastructure of a nation. Since the railways represent one of the most effective modes of transport offered to the people, It is important to keep a check on the security issues that are arising in todays world. According to the need there must be an upgradation in systems we use. One such upgradation is that the role of Artificial Intelligence and e ticketing that is achieved with the assistance of face recognition technology. This technology has been extensively employed as a biometric method and hence can be used for passenger verification. Mangal Kotkar | Shubham Gawade | Shubham Mandavkar | Prathamesh Gujar "Face Recognition Using ML in Public Transports" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-6 , October 2021, URL: https://www.ijtsrd.com/papers/ijtsrd47656.pdf Paper URL : https://www.ijtsrd.com/engineering/information-technology/47656/face-recognition-using-ml-in-public-transports/mangal-kotkar
Enhancing Smart Cities' Security with Biometrics! Explore how #Biometrics fortify access control in #SmartCities, paving the way for a secure and efficient future.
https://bahaaabdulhadi.com/biometrics-securing-smart-cities/
#TechSecurity #IoT #DataProtection
Biometric Based Human Recognition Systems for Institutions using Exeat Monito...ijtsrd
Exeat is a primary term generally used to describe a period of nonattendance from a centre of learning either for the entire day or parts of a day for appointments and interviews in a secured academic environment. The current method of monitoring students movement is inefficient. It brings difficulty to the University Halls management by checking students into the halls of residence and impersonation during exams. For this reason, a Biometric Based Human Recognition System for Institutions is needed to use Exeat Monitoring System. The motive of the study is to develop a user friendly online interface embedded with a fingerprint biometric authentication system through which the school portal can monitor students who exit from school premises or a school campus. Nexus combination techniques were adopted. The results showed that exeat monitoring systems are less prone to forgery since they can prevent impersonation among students, and its purely digital since it is a GSM based devices. Issa Lukman Oluwadare | Ogunsanya Mobolaji Mojisola | Ojenomo Paul Ozabereme | Makinde Kayode | Sunday David "Biometric-Based Human Recognition Systems for Institutions using Exeat Monitoring System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-7 , December 2022, URL: https://www.ijtsrd.com/papers/ijtsrd52436.pdf Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/52436/biometricbased-human-recognition-systems-for-institutions-using-exeat-monitoring-system/issa-lukman-oluwadare
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...ijait
Advancements in technology have created the possibility of greater assurance of proper travel document ownership, but some concerns regarding security and effectiveness remain unaddressed. Electronic passports have known a wide and fast deployment all around the world since the International Civil
Aviation Organization the world has adopted standards whereby passports can store biometric identifiers. The use of biometrics for identification has the potential to make the lives easier, and the world people live in a safer place. The purpose of biometric passports is to prevent the illegal entry of traveler into a specific
country and limit the use of counterfeit documents by more accurate identification of an individual. This paper analyses the face, fingerprint, palmprint and iris biometric e-passport design. This papers focus on privacy and personal security of bearers of e-passports, the actual security benefit countries obtained by
the introduction of e-passports using face, fingerprint, palmprint and iris recognition systems. Researcher analyzed its main cryptographic features; the face fingerprint, palmprint and iris biometrics currently used with e-passports and considered the surrounding procedures. Researcher focused on vulnerabilities since anyone willing to bypass the system would choose the same approach. On the contrary, solely relying on them may pose a risk that did not exist with previous passports and border controls. The paper also provides a security analysis of the e-passport using face fingerprint, palmprint and iris biometric that are intended to provide improved security in protecting biometric information of the e-passport bearer.
This article looks at one of the evolving crimes of the digital age; identity theft. It argues and explains that if three key technologies were implemented together namely biometrics, smart cards, and PKI, then they can deliver a robust and trusted identification and authentication infrastructure. The article concludes that such infrastructure may provide the foundation for e-government and e-commerce initiatives as it addresses the need for strong user authentication of virtual identities.
Face Recognition Using ML in Public Transportsijtsrd
Modernization of railways has forever been an issue focused on the development of the fundamental infrastructure of a nation. Since the railways represent one of the most effective modes of transport offered to the people, It is important to keep a check on the security issues that are arising in todays world. According to the need there must be an upgradation in systems we use. One such upgradation is that the role of Artificial Intelligence and e ticketing that is achieved with the assistance of face recognition technology. This technology has been extensively employed as a biometric method and hence can be used for passenger verification. Mangal Kotkar | Shubham Gawade | Shubham Mandavkar | Prathamesh Gujar "Face Recognition Using ML in Public Transports" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-6 , October 2021, URL: https://www.ijtsrd.com/papers/ijtsrd47656.pdf Paper URL : https://www.ijtsrd.com/engineering/information-technology/47656/face-recognition-using-ml-in-public-transports/mangal-kotkar
Enhancing Smart Cities' Security with Biometrics! Explore how #Biometrics fortify access control in #SmartCities, paving the way for a secure and efficient future.
https://bahaaabdulhadi.com/biometrics-securing-smart-cities/
#TechSecurity #IoT #DataProtection
Biometric Based Human Recognition Systems for Institutions using Exeat Monito...ijtsrd
Exeat is a primary term generally used to describe a period of nonattendance from a centre of learning either for the entire day or parts of a day for appointments and interviews in a secured academic environment. The current method of monitoring students movement is inefficient. It brings difficulty to the University Halls management by checking students into the halls of residence and impersonation during exams. For this reason, a Biometric Based Human Recognition System for Institutions is needed to use Exeat Monitoring System. The motive of the study is to develop a user friendly online interface embedded with a fingerprint biometric authentication system through which the school portal can monitor students who exit from school premises or a school campus. Nexus combination techniques were adopted. The results showed that exeat monitoring systems are less prone to forgery since they can prevent impersonation among students, and its purely digital since it is a GSM based devices. Issa Lukman Oluwadare | Ogunsanya Mobolaji Mojisola | Ojenomo Paul Ozabereme | Makinde Kayode | Sunday David "Biometric-Based Human Recognition Systems for Institutions using Exeat Monitoring System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-7 , December 2022, URL: https://www.ijtsrd.com/papers/ijtsrd52436.pdf Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/52436/biometricbased-human-recognition-systems-for-institutions-using-exeat-monitoring-system/issa-lukman-oluwadare
Design and develop authentication in electronic payment systems based on IoT ...TELKOMNIKA JOURNAL
Biometrics is a highly reliable technology where it has become possible to use the characteristics of a person or user (biometrics) along with traditional passwords, and we can even say that it has become an indispensable complement in modern authentication systems today, especially with regard to bank accounts, banks, financial technology (FinTech) internet of things (IoT) devices and all a process related to money and privacy, and biometric methods are multiple and increasing day by day, the most famous of which is (iris, face chart, palm, fingerprint, and others). Biometric systems are immune and immune from modern electronic attacks, such as plagiarism or electronic theft, because the authentication here takes place when all conditions are met. Then the authentication is done and the process is completed, and the aim is to reach the highest levels of accuracy and security and to make the user more comfortable to deal with these modern systems that provide him with many advantages and high privacy.
Enhancing cryptographic protection, authentication, and authorization in cell...IJECEIAES
This research article provides an extensive analysis of novel methods of cryptographic protection as well as advancements in authentication and authorization techniques within cellular networks. The aim is to explore recent literature and identify effective authentication and authorization methods, including high-speed data encryption. The significance of this study lies in the growing need for enhanced data security in scientific research. Therefore, the focus is on identifying suitable authentication and authorization schemes, including blockchain-based approaches for distributed mobile cloud computing. The research methodology includes observation, comparison, and abstraction, allowing for a comprehensive examination of advanced encryption schemes and algorithms. Topics covered in this article include multi-factor authentication, continuous authentication, identity-based cryptography for vehicle-to-vehicle (V2V) communication, secure blockchain-based authentication for fog computing, internet of things (IoT) device mutual authentication, authentication for wireless sensor networks based on blockchain, new secure authentication schemes for standard wireless telecommunications networks, and the security aspects of 4G and 5G cellular networks. Additionally, in the paper a differentiated authentication mechanism for heterogeneous 6G networks blockchain-based is discussed. The findings presented in this article hold practical value for organizations involved in scientific research and information security, particularly in encryption and protection of sensitive data.
Information Leakage Prevention Using Public Key Encryption System and Fingerp...CSCJournals
The increase in the use of the internet around the world provided easier way of communication and information sharing that has led to the huge challenge of data leakage on the network. In an academic environment such as higher institutions of learning, the need to ensure that access to data and sensitive information are given to authorized users become imperative. However, this is not always the case as security bridges are often experienced. This study proposed a RSA public key encryption system and biometric fingerprint augmented with Apriori algorithm to prevent information leakages. The fingerprint verifies the identity of the owner of incoming message and the Apriori algorithm is used as the detection system instead of biometric that requires additional hardware for detecting fingerprint. This study developed a system based on the proposed algorithm. The developed system was tested on Federal Polytechnic, Ilaro local area network achieving a high level of security that prevents interception of valuable data by intruders or eavesdroppers. The system developed RSA public key encryption and fingerprint augmented with Apriori algorithm thus provided the required security mechanism that prevents information leakage in a public environment.
HISTOGRAM OF NEIGHBORHOOD TRIPARTITE AUTHENTICATION WITH FINGERPRINT-BASED BI...IJCNCJournal
Internet of Things (IoT) and services is an interesting topic with a wide range of potential applications like smart home systems, health care, telemedicine, and intelligent transportation. Traditionally, key agreement schemes have been evaluated to access IoT services which are highly susceptible to security. Recently, Biometric-based authentication is also used to access IoT services and devices. They are involving a larger amount of memory with increased running time and found to be computationally infeasible. To provide robust authentication for IoT services, Histogram of Neighborhood Tripartite Authentication with Fingerprint Biometrics (HNTA-FB) for IoT services is proposed in this paper. This proposed HNTA-FB method uses binary patterns and a histogram of features to extract the region of interest. To reduce the memory requirements while providing access to IoT services, Histogram of Neighborhood Binary Pattern Pre-processing (HNBPP) model is proposed. The discriminative power of Neighbourhood Binary Pattern Registration (NBPR) is integrated with the normalized sparse representation based on the histogram. Additionally, this work presents a new Tripartite User Authentication model for fingerprint biometric template matching process. When compared with different state-of-the-art methods, the proposed method depicts significantly improved performance in terms of matching accuracy, computational overhead and execution speed and is highly effective in delivering smart home services.
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...CSCJournals
This paper addresses a biometric watermarking technology sturdy towards image manipulations, like JPEG compression, image filtering, and additive noise. Application scenarios include information transmission between client and server, maintaining e-database and management of signatures through insecure distribution channels. Steps involved in this work are, a) generation of binary signature code for biometric, b) embedding of the binary signature to the host image using intrinsic local property, that ensures signature protection, c) host image is then made exposed to various attacks and d) signature is extracted and matched based on an empirical threshold to verify the robustness of proposed embedding method. Embedding relies on binary signature manipulating the lower order AC coefficients of Discrete Cosine Transformed sub-blocks of host image. In the prediction phase, DC values of the nearest neighbor DCT blocks is utilized to predict the AC coefficients of centre block. Surrounding DC values of a DCT blocks are adaptively weighed for AC coefficients prediction. Linear programming is used to calculate the weights with respect to the image content. Multiple times embedding of watermark ensures robustness against common signal processing operations (filtering, enhancement, rescaling etc.) and various attacks. The proposed algorithm is tested for 50 different types of host images and public data collection, DB3, FVC2002. FAR and FRR are compared with other methods to show the improvement.
Abstract: Contactless smart card technology work on a secure microcontroller or embedded in a device that communicates with a reader with use of a contactless radio frequency (RF) interface. Smart Cards are secure portable storage devices used for many applications especially security related which involving access to system’s database. For the future of smart card to be bright, it is important to look into several aspects and factors especially those resulted due to the rapid advancement in communication technology. This paper looks into current trends in smart card technology and highlights what is likely to happen in the future. Moreover, the paper addresses other aspects in order to identify the core concepts that are of interest to smart card developers and researchers. Keywords: contactless, security
The use of digital devices in day to day life has increased tremendously. Mobile devices have become an vital part of our day to day routine and they are prone to facilitating illegal activity or otherwise being involved when crimes occur. Whereas computers, laptops, servers, and gaming devices might have many users, in the vast majority of cases, mobile devices generally belong to an individual. The science behind recovering digital evidence from mobile phones is called mobile forensics. Digital evidence is defined as data and information that is stored on, received, or transmitted by an electronic device that is used for investigations. Digital evidence encompasses any and all digital data that can be used as evidence in a case. Mobile devices present many challenges from a forensic viewpoint. With new models being developed each day, it is extremely difficult to develop a single process or tool to address all the possibilities an investigator may face. Court cases also need to be taken into consideration as mobile devices are being seized and analyzed. Mr. I. A. Attar | Mr. M. M. Kapale "Conceptual Study of Mobile Forensics" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-1 , December 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29476.pdfPaper URL: https://www.ijtsrd.com/computer-science/world-wide-web/29476/conceptual-study-of-mobile-forensics/mr-i-a-attar
A novel multi-biometric technique for verification of secure e-documentIJECEIAES
Extracting unique and distinctive traits is one of the most important challenges that researchers face, who rely on biometrics to extract exceptional traits for an individual. A large amount of biometric evidence that can be identified and found in various research has been done. In this paper, a biometrics system is proposed that combines the benefits of fingerprinting and uses a novel strategy to combine it with the image-based fingerprint vein feature set. The proposed system is fast and performs effective personal identification by combining both features. The features extracted from the venous print and fingerprint are matched to the nearest neighbors of the authorized person forms to verify the identity of the person. Several experiments have been performed on selected datasets to evaluate the performance of the new biometrics system. The obtained results prove that our proposed system is superior to biometric systems that use the feature of single biometrics. However, our goal is to set up an algorithm that is inexpensive in terms of time complexity while keeping it at the required security levels.
Information security is concerned with the
assurance of confidentially, integrity and availability of
information in all forms. This is the ancient Greek word:
bios = “life” and metron = “measure.” In the present day
world, online shopping using WAP enabled mobile phone
has widely come into use. Credit cards serve as the currency
during e-business and e-Shopping. As the Hacking or
Spoofing or the Misuse of the credit card is continuously
increasing even you are using a secure network. Also, some
Spam software is sent to your system or device through the
internet that helps spammers to get the
desires relevant information about your credit card and
financial data. To solve these problems or get out of these
insecurities the Bio-metric System that provides the secure
E-transaction by improving the prevention of data spoofing.
So in this paper, we have proposed a multi-biometric model
(integrating voice, fingerprint and facial scanning) that can
be embedded in a mobile phone, this making e-transactions
more secure.
Enhancing Security of Multimodal Biometric Authentication System by Implement...IOSR Journals
Abstract : Conventional personal identification techniques for instance passwords, tokens, ID card and PIN
codes are prone to theft or forgery and thus biometrics isa solution thereto. Biometrics is the way of recognizing
and scrutinizing the physical traits of a person. Automated biometrics verification caters as a conducive and
legitimate method, but there must be an assurance to its cogency. Furthermore, in most of the cases unimodal
biometric recognition is not able to meet the performance requirements of the applications. According to recent
trends, recognition based on multimodal biometrics is emerging at a greater pace. Multimodal biometrics
unifies two or more biometric traits and thus the issues that emerge in unimodal recognition can be mitigated in
multimodal biometric systems. But with the rapid ontogenesis of information technology, even the biometric
data is not secure. Digital watermarking is one such technique that is implemented to secure the biometric data
from inadvertent or premeditated attacks.This paper propounds an approach that is projected in both the
directions of improving the performance of biometric identification system by going multimodal and, increasing
the security through watermarking. The biometric traits are initially transformed using Discrete Wavelet and
Discrete Cosine Transformation and then watermarked using Singular Value Decomposition. Scheme depiction
and presented outcomes justifies the effectiveness of the scheme.
Keywords: Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT), Multimodal biometrics,
Singular Value Decomposition, Watermarking
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
More Related Content
Similar to Safety Measures and Privacy in E-Passport Scheme using Cryptographic Protocols and Biometrics Technology
Design and develop authentication in electronic payment systems based on IoT ...TELKOMNIKA JOURNAL
Biometrics is a highly reliable technology where it has become possible to use the characteristics of a person or user (biometrics) along with traditional passwords, and we can even say that it has become an indispensable complement in modern authentication systems today, especially with regard to bank accounts, banks, financial technology (FinTech) internet of things (IoT) devices and all a process related to money and privacy, and biometric methods are multiple and increasing day by day, the most famous of which is (iris, face chart, palm, fingerprint, and others). Biometric systems are immune and immune from modern electronic attacks, such as plagiarism or electronic theft, because the authentication here takes place when all conditions are met. Then the authentication is done and the process is completed, and the aim is to reach the highest levels of accuracy and security and to make the user more comfortable to deal with these modern systems that provide him with many advantages and high privacy.
Enhancing cryptographic protection, authentication, and authorization in cell...IJECEIAES
This research article provides an extensive analysis of novel methods of cryptographic protection as well as advancements in authentication and authorization techniques within cellular networks. The aim is to explore recent literature and identify effective authentication and authorization methods, including high-speed data encryption. The significance of this study lies in the growing need for enhanced data security in scientific research. Therefore, the focus is on identifying suitable authentication and authorization schemes, including blockchain-based approaches for distributed mobile cloud computing. The research methodology includes observation, comparison, and abstraction, allowing for a comprehensive examination of advanced encryption schemes and algorithms. Topics covered in this article include multi-factor authentication, continuous authentication, identity-based cryptography for vehicle-to-vehicle (V2V) communication, secure blockchain-based authentication for fog computing, internet of things (IoT) device mutual authentication, authentication for wireless sensor networks based on blockchain, new secure authentication schemes for standard wireless telecommunications networks, and the security aspects of 4G and 5G cellular networks. Additionally, in the paper a differentiated authentication mechanism for heterogeneous 6G networks blockchain-based is discussed. The findings presented in this article hold practical value for organizations involved in scientific research and information security, particularly in encryption and protection of sensitive data.
Information Leakage Prevention Using Public Key Encryption System and Fingerp...CSCJournals
The increase in the use of the internet around the world provided easier way of communication and information sharing that has led to the huge challenge of data leakage on the network. In an academic environment such as higher institutions of learning, the need to ensure that access to data and sensitive information are given to authorized users become imperative. However, this is not always the case as security bridges are often experienced. This study proposed a RSA public key encryption system and biometric fingerprint augmented with Apriori algorithm to prevent information leakages. The fingerprint verifies the identity of the owner of incoming message and the Apriori algorithm is used as the detection system instead of biometric that requires additional hardware for detecting fingerprint. This study developed a system based on the proposed algorithm. The developed system was tested on Federal Polytechnic, Ilaro local area network achieving a high level of security that prevents interception of valuable data by intruders or eavesdroppers. The system developed RSA public key encryption and fingerprint augmented with Apriori algorithm thus provided the required security mechanism that prevents information leakage in a public environment.
HISTOGRAM OF NEIGHBORHOOD TRIPARTITE AUTHENTICATION WITH FINGERPRINT-BASED BI...IJCNCJournal
Internet of Things (IoT) and services is an interesting topic with a wide range of potential applications like smart home systems, health care, telemedicine, and intelligent transportation. Traditionally, key agreement schemes have been evaluated to access IoT services which are highly susceptible to security. Recently, Biometric-based authentication is also used to access IoT services and devices. They are involving a larger amount of memory with increased running time and found to be computationally infeasible. To provide robust authentication for IoT services, Histogram of Neighborhood Tripartite Authentication with Fingerprint Biometrics (HNTA-FB) for IoT services is proposed in this paper. This proposed HNTA-FB method uses binary patterns and a histogram of features to extract the region of interest. To reduce the memory requirements while providing access to IoT services, Histogram of Neighborhood Binary Pattern Pre-processing (HNBPP) model is proposed. The discriminative power of Neighbourhood Binary Pattern Registration (NBPR) is integrated with the normalized sparse representation based on the histogram. Additionally, this work presents a new Tripartite User Authentication model for fingerprint biometric template matching process. When compared with different state-of-the-art methods, the proposed method depicts significantly improved performance in terms of matching accuracy, computational overhead and execution speed and is highly effective in delivering smart home services.
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...CSCJournals
This paper addresses a biometric watermarking technology sturdy towards image manipulations, like JPEG compression, image filtering, and additive noise. Application scenarios include information transmission between client and server, maintaining e-database and management of signatures through insecure distribution channels. Steps involved in this work are, a) generation of binary signature code for biometric, b) embedding of the binary signature to the host image using intrinsic local property, that ensures signature protection, c) host image is then made exposed to various attacks and d) signature is extracted and matched based on an empirical threshold to verify the robustness of proposed embedding method. Embedding relies on binary signature manipulating the lower order AC coefficients of Discrete Cosine Transformed sub-blocks of host image. In the prediction phase, DC values of the nearest neighbor DCT blocks is utilized to predict the AC coefficients of centre block. Surrounding DC values of a DCT blocks are adaptively weighed for AC coefficients prediction. Linear programming is used to calculate the weights with respect to the image content. Multiple times embedding of watermark ensures robustness against common signal processing operations (filtering, enhancement, rescaling etc.) and various attacks. The proposed algorithm is tested for 50 different types of host images and public data collection, DB3, FVC2002. FAR and FRR are compared with other methods to show the improvement.
Abstract: Contactless smart card technology work on a secure microcontroller or embedded in a device that communicates with a reader with use of a contactless radio frequency (RF) interface. Smart Cards are secure portable storage devices used for many applications especially security related which involving access to system’s database. For the future of smart card to be bright, it is important to look into several aspects and factors especially those resulted due to the rapid advancement in communication technology. This paper looks into current trends in smart card technology and highlights what is likely to happen in the future. Moreover, the paper addresses other aspects in order to identify the core concepts that are of interest to smart card developers and researchers. Keywords: contactless, security
The use of digital devices in day to day life has increased tremendously. Mobile devices have become an vital part of our day to day routine and they are prone to facilitating illegal activity or otherwise being involved when crimes occur. Whereas computers, laptops, servers, and gaming devices might have many users, in the vast majority of cases, mobile devices generally belong to an individual. The science behind recovering digital evidence from mobile phones is called mobile forensics. Digital evidence is defined as data and information that is stored on, received, or transmitted by an electronic device that is used for investigations. Digital evidence encompasses any and all digital data that can be used as evidence in a case. Mobile devices present many challenges from a forensic viewpoint. With new models being developed each day, it is extremely difficult to develop a single process or tool to address all the possibilities an investigator may face. Court cases also need to be taken into consideration as mobile devices are being seized and analyzed. Mr. I. A. Attar | Mr. M. M. Kapale "Conceptual Study of Mobile Forensics" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-1 , December 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29476.pdfPaper URL: https://www.ijtsrd.com/computer-science/world-wide-web/29476/conceptual-study-of-mobile-forensics/mr-i-a-attar
A novel multi-biometric technique for verification of secure e-documentIJECEIAES
Extracting unique and distinctive traits is one of the most important challenges that researchers face, who rely on biometrics to extract exceptional traits for an individual. A large amount of biometric evidence that can be identified and found in various research has been done. In this paper, a biometrics system is proposed that combines the benefits of fingerprinting and uses a novel strategy to combine it with the image-based fingerprint vein feature set. The proposed system is fast and performs effective personal identification by combining both features. The features extracted from the venous print and fingerprint are matched to the nearest neighbors of the authorized person forms to verify the identity of the person. Several experiments have been performed on selected datasets to evaluate the performance of the new biometrics system. The obtained results prove that our proposed system is superior to biometric systems that use the feature of single biometrics. However, our goal is to set up an algorithm that is inexpensive in terms of time complexity while keeping it at the required security levels.
Information security is concerned with the
assurance of confidentially, integrity and availability of
information in all forms. This is the ancient Greek word:
bios = “life” and metron = “measure.” In the present day
world, online shopping using WAP enabled mobile phone
has widely come into use. Credit cards serve as the currency
during e-business and e-Shopping. As the Hacking or
Spoofing or the Misuse of the credit card is continuously
increasing even you are using a secure network. Also, some
Spam software is sent to your system or device through the
internet that helps spammers to get the
desires relevant information about your credit card and
financial data. To solve these problems or get out of these
insecurities the Bio-metric System that provides the secure
E-transaction by improving the prevention of data spoofing.
So in this paper, we have proposed a multi-biometric model
(integrating voice, fingerprint and facial scanning) that can
be embedded in a mobile phone, this making e-transactions
more secure.
Enhancing Security of Multimodal Biometric Authentication System by Implement...IOSR Journals
Abstract : Conventional personal identification techniques for instance passwords, tokens, ID card and PIN
codes are prone to theft or forgery and thus biometrics isa solution thereto. Biometrics is the way of recognizing
and scrutinizing the physical traits of a person. Automated biometrics verification caters as a conducive and
legitimate method, but there must be an assurance to its cogency. Furthermore, in most of the cases unimodal
biometric recognition is not able to meet the performance requirements of the applications. According to recent
trends, recognition based on multimodal biometrics is emerging at a greater pace. Multimodal biometrics
unifies two or more biometric traits and thus the issues that emerge in unimodal recognition can be mitigated in
multimodal biometric systems. But with the rapid ontogenesis of information technology, even the biometric
data is not secure. Digital watermarking is one such technique that is implemented to secure the biometric data
from inadvertent or premeditated attacks.This paper propounds an approach that is projected in both the
directions of improving the performance of biometric identification system by going multimodal and, increasing
the security through watermarking. The biometric traits are initially transformed using Discrete Wavelet and
Discrete Cosine Transformation and then watermarked using Singular Value Decomposition. Scheme depiction
and presented outcomes justifies the effectiveness of the scheme.
Keywords: Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT), Multimodal biometrics,
Singular Value Decomposition, Watermarking
Similar to Safety Measures and Privacy in E-Passport Scheme using Cryptographic Protocols and Biometrics Technology (20)
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Thesis Statement for students diagnonsed withADHD.ppt
Safety Measures and Privacy in E-Passport Scheme using Cryptographic Protocols and Biometrics Technology
1. International Journal on Cryptography and Information Security (IJCIS),Vol.2, No.3, September 2012
DOI:10.5121/ijcis.2012.2302 21
SAFETY MEASURES AND PRIVACY IN E-PASSPORT
SCHEME USING CRYPTOGRAPHIC PROTOCOLS AND
BIOMETRICS TECHNOLOGY
V.K. Narendira Kumar 1
and B. Srinivasan 2
1
Assistant Professor, Department of Information Technology,
2
Associate Professor, PG & Research Department of Computer Science,
Gobi Arts & Science College (Autonomous), Gobichettipalayam – 638 453,
Erode District, Tamil Nadu, India.
Email ID: kumarmcagobi@yahoo.com,srinivasan_gasc@yahoo.com
ABSTRACT
Electronic passports have known a wide and fast employment all around the world since the International
Civil Aviation Organization (ICAO) the human race has adopted standards whereby electronic passports
can store biometrics identifiers. The purpose of electronic passports is to prevent the illegal entry of
traveler into a particular country and frontier the use of counterfeit documents by more accurate
recognition of an individual. The electronic passport, as it is sometimes called, represents a bold initiative
in the employment of two new technologies: Cryptography protocols and biometrics. An electronic passport
contains the significant personal information of holder such as photo, name, date of birth and place,
nationality, date of issue, date of expiry, authority and so on. The goal of the adoption of the electronic
passport is not only to expedite dealing out at border crossings, but also to increase safety measures and
privacy. Important in their own right, electronic passports are also the harbinger of a wave of next-
generation electronic passports: numerous national governments plan to set up electronic passport
integrating cryptography safety measures algorithm and biometrics. We walk around the privacy and safety
measures implications of this impending worldwide experiment in biometrics certification technology. We
describe privacy issues that apply to electronic passports, and then analyze these issues in the context of
the ICAO standard for electronic passports. An overall safety measures process that involves people,
technology and procedures can overcome limitations of the cryptography protocols and biometrics
technologies.
KEYWORDS
Biometrics, Electronic Passport, Face, Fingerprint, Palmprint, Iris, Recognition, Verification and
Database.
1. INTRODUCTION
An electronic Passport is a document issued by a government to one of its citizens that provides a
means of authenticate the individuality and nationality of that citizen. An electronic Passport is
required for almost all worldwide travel. An electronic passport is constructed by attaching an
electronic chip to a passports document. In the electronic passport, this chip is a Radio Frequency
Identification device that includes the information within the customary electronic passport and
can be read by a machine at border crossings [10].
2. International Journal on Cryptography and Information Security (IJCIS),Vol.2, No.3, September 2012
22
The electronic passport is an enhancement upon the old system because it provides additional
protection against fake as well as a potential decrease in the time required at customs checkpoints.
The electronic passport system, however, does not improve the strength of the confirmation of a
person’s identity. Considering that identity confirmation is the primary function of a passport, that
additional measures to facilitate identity authentication should be included in the electronic
passport [11].
The deployment of biometrics technology in passports and other travel documents, for purposes
of machine-assisted identity confirmation, is one aspects of the ICAO strategy to improve border
clearance process with machine readable travel document and associated technology. Moreover,
ICAO urges Contracting States to make stronger their efforts to protect the security and
truthfulness of their electronic passports, to protect their passports against electronic passport
hoax, and to assist one another in this subject.
Electronic passport honesty is a significant factor in the security of the worldwide travel system,
and confidence in the integrity of a State’s pass through documents on the part of border control
authorities promotes facilitation of border control formalities. Biometrics detection is considered
an important tool for States to use to strengthen the safety measures of their documents and
enlarge the level of that confidence [9].
The electronic passport specifies the choice of facial recognition as the internationally
interoperable biometrics technology for machine-assisted individuality confirmation. The
technical and realistic consideration in deploy biometrics technologies in MRTDs lists the reasons
for this choice. At the same time, acknowledges that States may elect to add fingerprint, palmprint
and/or iris recognition to supplement facial recognition to support machine-assisted verification
and/or identification. The technical specifies that the chosen biometric(s) be stored on the
document as images rather than templates, in the interests of global interoperability.
The prepared measurement of the compatibility of biometrics technologies sought to assess each
currently available biometric data from a comprehensive scheme requirements perspective. The
study considered that biometrics equipment must support both verification and identification,
defined as follows [1]:
Verification confirming individuality by comparing individuality details of the person
claiming to be a specific living individual against details previously recorded on that person.
Identification determining possible individuality by comparing individuality details of the
presenting person beside details previously recorded on a number of living persons.
1.1. Purpose of the Study
The primary goal of the study is to produce new knowledge with respect to safety measures of
biometric techniques in an electronic passport setting. The results of the work should be useful for
those making electronic passport design decisions with respect to cryptographic protocols and
multiple biometric technologies in electronic passport settings.
1.2. Statement of the Problem
The purpose of electronic passports is to prevent the against the law entry of travelers into a
specific country and to edge the use of fake documents by more correct identification of persons.
It is interesting to find out to what extent the integration of cryptographic protocols and biometric
recognition information into electronic passports will improve their healthiness against identity
theft.
3. International Journal on Cryptography and Information Security (IJCIS),Vol.2, No.3, September 2012
23
2. LITERATURE SURVEY
Juels et al 2005 discussed security and privacy issues that apply to electronic passports. They
articulated concerns that, the contact-less chip entrenched in an electronic passport permit the
electronic passport contents to be read without straight contact with an Inspection System and,
more importantly, with the electronic passport booklet closed. They argued that information
stored in the chip could be covertly composed by means of “skimming” or “eavesdropping”.
Because of small entropy, secret keys stored would be weak to brute force attacks as confirmed
by Laurie 2007. Karger 2005 recommended that an electronic passport may be vulnerable to
“splicing attack”, “fake finger show aggression” and other related attacks that can be approved
out when an electronic passport holder current the electronic passport to hotel clerks. There has
been significant press coverage Johnson, 2006, Knight, 2006 and Reid, 2006 on security
weakness in electronic passports. These reports point out that it might be possible to “clone” an
electronic passport.
2.1. Technology Evaluation
The technology test evaluates the knowledge itself: it measures the concert of the corresponding
algorithms under controlled conditions in a laboratory. The reason of an expertise evaluation is to
determine the state of the art and to determine the most capable approaches. In a technology
evaluation, the algorithms to be experienced are given a database of biometric identifiers. One
part of the database is given to the passport applicant so that they can be familiar with the
biometrics identifiers in the database and the additional part is used for testing. The outcomes
from an expertise test are repeatable since the technology tests are done under controlled
conditions. The products of the technology evaluation are the verification, identification and
pocket watch list performance metrics.
2.2. Technical Challenges
The electronic passport is secure will prove considerably more difficult than actually secure it
biometrics technology in passports. It is fairly clear, however, that contactless chips offer
important advantages, including larger capacities and lesser costs. The expertise also has yet to
experience extensive deployment in either the private or public sector, though such exploitation
can be expected in the private sector in the next few years. Contact-based chips purely lack the
strength of contactless technology. A lack of accessible barcodes, in addition to the fact that RFID
is a superior tracking technology compared to virtually any available, has led main retailers like
Walmart to consider inclusion of RFID in its supply chain. As this deployment occurs, RFID may
also turn out to be an integral part of many other everyday tasks, such as toward the inside a place
of work or creation a credit card transaction.
2.3. Biometric
Biometrics technologies are automated method of recognize an person based on their
physiological or behavioral characteristics such as face, fingerprints, palm print, hand and iris.
Biometric systems are application of biometrics technologies and can be used to confirm a
person’s claimed individuality and to establish a person’s individuality.
In an ideal biometrics system, every person has the characteristic, no two persons have the similar
characteristic, the characteristic remain everlasting over time and does not vary under the
conditions in which it is composed and the biometrics system resists counter measures.
Assessment of biometric systems quantifies how well biometrics systems contain the properties
4. International Journal on Cryptography and Information Security (IJCIS),Vol.2, No.3, September 2012
24
of a perfect biometric system. All of existing biometrics systems suffers from the same problems:
false acceptance & false rejection caused by the unpredictability of conditions at the human-
machine boundary. A common characteristic of any system that uses biometrics is a tradeoff
between high safety measures and a more usable system.
2.4. Multiple Biometric Systems
Limits of single biometric systems can be defeat by using multiple biometrics system. A multiple
biometrics systems use multiple applications to capture different kind of biometrics. This allows
the combination of two or more types of biometric identification and verification systems in order
to meet severe performance requirements. Such systems are predictable to be more reliable due to
the being there of multiple, independent pieces of confirmation. These systems are also able to get
together the strict performance requirements compulsory by a variety of applications [5].
A multiple scheme could be, for instance, a arrangement of fingerprint authentication, face
identification, voice authentication and smart-card or any other combination of biometric. This
enhanced structure takes advantage of the proficiency of each person biometric and can be used to
overcome some of the limits of a single biometric. For instance, it is estimated that 5% of the
people does not have legible fingerprints, a voice could be altered by a cold and face
identification systems are susceptible to change in ambient glow and the pose of the subject's
head. A multiple system, which combines the finale made by a number of not related biometrics
indicator, can overcome many of these limitations [3].
2.5. Biometrics in Electronic passports
Biometrics in electronic passports meet the terms with the ICAO standard consists of a
compulsory facial image and fingerprints. While the former are used by a important number of
countries and thus in order on them is widely accessible, the latter is at present used seldom.
Therefore, this section only covers the vulnerabilities of facial images, fingerprints, palm print
and iris images.
2.5.1. Face Image
Facial images are the most frequent biometric trait used by humans to make an individual
recognition, hence the idea to use this biometrics in technology. This is a nonintrusive method
and is appropriate for covert identification applications. Face authentication involves extracting a
characteristic set from a two-dimensional image of the user face and matching it with the template
store in a database. The most popular approaches to face identification are based on either: The
location and shape of facial attribute such as eyes, eyebrows, nose, lips and chin, and their spatial
relationships, or the overall analysis of the face image that represent a face as a weighted
combination of a amount of canonical faces. It is questionable if a face itself is an adequate basis
for recognize a person from a great number of identity with an tremendously high level of
confidence. Facial detection system should be able to by design sense a face in an image, extract
its features and then identify it from a general point of view (i.e., from any pose) which is a rather
hard task. An additional problem is the fact that the face is a variable social organ display a
variety of expressions [4].
2.5.2. Fingerprint
A fingerprint is a model of ridges and furrows positioned on the tip of each finger. Fingerprints
were used for individual recognition for many centuries and the matching correctness was very
5. International Journal on Cryptography and Information Security (IJCIS),Vol.2, No.3, September 2012
25
high. Patterns have been extracting by creating an inked idea of the fingertip on paper. Today,
solid sensors provide digital descriptions of these patterns. Fingerprint identification for
recognition acquires the initial image through live scan of the finger by direct contact with a
reader device that can also check for validates attributes such as high temperature and pulse. In
real-time authentication systems, images acquired by sensors are used by the feature extraction
component to compute the feature values. The feature values characteristically correspond to the
position and orientation of certain critical points known as minutiae points. One problem with the
current fingerprint identification systems is that they need a large amount of computational
possessions [2].
2.5.3. Palmprint
The palmprint identification module is designed to carry out the person recognition process for
the unknown person. The palmprint image is the only enter data for the identification process.
The person recognition details are the expected output value. The input image feature is compare
with the database image features. The relevancy is predictable with reference to the entry value.
The most appropriate image is selected for the person’s detection. If the relationship result does
not match with the input image then the identification process is declared as unknown person.
The identification module is divided into four sub modules. They are palmprint collection, result
particulars, ordinal list and ordinal measurement. The palmprint image selection sub unit is
designed to select the palmprint input image. The file open dialog is used to choose the input
image file. The result particulars produce the list of applicable palmprint with their similarity ratio
details. The ordinal list shows the ordinal feature based comparison. The ordinal measurement
sub section shows the ordinal values for each region.
2.5.4. Iris Recognition
Iris identification technology is based on the distinctly colored ring contiguous the pupil of the
eye. Made from expandable connective tissue, the iris is a very well-off source of biometric
information, having approximately 266 distinctive characteristics. These include the trabecular
meshwork, a tissue that gives the look of dividing the iris very, with striations, rings, furrows, a
corona, and freckles. Iris identification technology uses about 173 of these distinctive
characteristics. Iris identification can be used in both verification and recognition systems. Iris
identification systems use a small, high-class camera to capture a black and white, high-resolution
image of the iris. The system then defines the limitations of the iris, establish a organize system
over the iris, and define the zones for examination within the coordinate system [12].
2.6. Biometric System Modules
Enrollment Unit: The enrollment section registers individuals into the biometrics system
database. During this phase, a biometrics reader scans the individual’s biometrics characteristic to
produce its digital illustration.
Feature Extraction Unit: This section processes the input model to generate a compact image
called the template, which is then stored in a central database or a smartcard issued to the person.
Matching Unit: This module compare the current input with the pattern. If the system performs
identity authentication, it compares the new characteristics to the users’ master template and
produce a score or match value (one to one matching). A system performing arts identification
matches the new characteristics against the master templates of several users resulting in many
match values (one too many matching).
6. International Journal on Cryptography and Information Security (IJCIS),Vol.2, No.3, September 2012
26
Decision Maker: This section accepts or rejects the client based on a safety measures threshold
and matching score [5].
2.7. Cryptographic
The information stored in the electronic passport is highly top secret; the Contactless IC chip
must have mechanism for safeguard and truthfulness of the data. A cryptographic protocols
checksum is used to keep data integrity. The system can identify if information has been altered
by compare the checksum in the electronic passport against the real-time working out of the
stored data. Symmetric or asymmetric secret keys can be use to make sure data privacy.
Electronic Passport issuing country has the option not to encrypt the information. A digital
watermark is used to save from harm the integrity of face, fingerprint, palmprint and iris image. A
number of digital bits may be buried into an image for further authentication purposes without
degrading the excellence of the image. Unique IC chip serial numbers are used to check cloning
of chips. A Public Key Infrastructure for production and management is required.
3. ELECTRONIC PASSPORT SPECIFICATION
An electronic passport bearer presents his/her document to a border security officer who scans the
MRZ information in the electronic passport through a MRZ reader and then places the electronic
passport near an electronic passport reader to fetch data from the microchip. The current
implementation consists of three protocols:
Basic Access Control: It provides encrypted communication involving the chip and the
Inspection System.
Passive Authentication: A border safety measures officer reads and verifies the legitimacy of
electronic passport content store in the chip.
Active Authentication: It provides honesty verification of electronic passport information.
The two novel protocols that intend to replace active authentication and thus now consists of
the subsequent four protocols:
Basic Access Control: It smooths the progress of the electronic passport and the inspection
system to establish an encrypted communication channel.
Chip Authentication: A method to identify cloned electronic passports
Passive Authentication Protocol: As in earliest generation electronic passport customary.
Terminal Authentication: Only if all protocols are finished successfully, the electronic
passport releases sensitive in order like secondary biometrics identifiers. The electronic
passports perform the gathering of protocols as specified in the first generation electronic
passports, therefore providing backward compatibility [6].
4. ELECTRONIC PASSPORT LOGICAL DATA STRUCTURE
The ICAO issued a consistent data structure called Logical Data Structure for the storage of data
essentials. This was to ensure that worldwide interoperability for electronic passport Tags and
Readers could be maintain. The provision state that all the 16 data groups are write confined and
can be written only at the point in time of issue of the electronic passport by the issuing state
shown in table 1. A mix up of data groups 1-15 are store in the safety measures data element,
each of these mix up should be indication by the issuing state [6].
7. International Journal on Cryptography and Information Security (IJCIS),Vol.2, No.3, September 2012
27
Table 1: Passport Logical Data Structure
Data Group Data Element
1 Document Details
2 Encoded Face
3 Encoded Fingerprint
4 Encoded Palmprint
5 Encoded Iris biometrics
6 Displayed Portrait
7 Reserved for Future Use
8 Signature
9 Data features
10 Additional Details
11-14 CA Public Key
15 AA Public Key
16 Persons to Notify
SDE Security Data Element
Requirements of the Logical Data Structure: The predefined, consistent LDS must meet a number
of compulsory requirements: Guarantee well-organized and optimum facilitation of the legal
holder. Ensure safety measures of details recorded in the possible capacity growth technology.
Allow worldwide interchange of capacity expanded information based on the use of a solitary
LDS familiar to all. Address the various optional capacity development needs of issuing state. It
provides development capacity as client needs and available knowledge evolve. It supports a
mixture of data protection options. It supports the adding together of details by a receiving state
while maintain the legitimacy and truthfulness of data shaped by the issuing state. LDS make use
of existing global standards to the utmost extent possible in exacting the emerging worldwide
standards for internationally interoperable biometrics.
5. IMPLEMENTATION OF ELECTRONIC PASSPORT SYSTEM
In order to employ this electronic passport scheme using cryptographic safety measures and
biometrics technology efficiently, ASP.NET language is used. ASP.NET language could speed up
the enlargement of this scheme because it has facilities to represent forms and to insert library
easily. There are three ways of doing authentication and authorization in ASP.NET:
Windows Authentication: In this method ASP.NET web pages will use local windows users and
groups to verify and give permission resources.
Forms Authentication: This is a cookie based verification where user name and password are
stored on client machines as cookie files or they are sent through URL for every request. Form
based verification presents the user with an HTML based Web page that at the appointed time the
user for credentials.
Passport Authentication: Passport authentication is based on the electronic passport website
provided by the ASP.NET. So when user login with credentials it will be accomplish to the
electronic passport website where verification will happen. If verification is successful it will
return a token to your website.
8. International Journal on Cryptography and Information Security (IJCIS),Vol.2, No.3, September 2012
28
Anonymous access: If you do not want any kind of verification then you will go for anonymous
right of entry.
5.1. Public Key Infrastructure
In normal situations, certificate issuing association known as Certificates Authorities are grouped
in a trust pecking order. All CA’s in a straight line or indirectly trust the top-level Root CA.
When a private key is compromise, the country cannot robotically cancel all the electronic
passports issued with this key. The electronic passport signed by any private key is predictable to
last for the issuing time. It is not feasible to ask hundreds or still thousands of electronic passport
holders to renew their electronic passports every point in time a key is revoked. Instead, these
electronic passports should be used as usual, and a system should alert the custom officials
inspect the electronic passport in superior detail. For each country, there is a Country Signing CA
responsible for create a public and private key pair, which is used to sign the Document Signer
Certificates. This key pair should be generate and stored in an extremely protected, offline CA
communications by the issuing country. The lifetime of a Country Signing CA Key is supposed to
be the longer of:
The length of moment in time the key will be used to issue electronic passports
The duration of the electronic passport issued by the key.
To ensure safety measures, the recommended the countries to put back the CA key every 3-5
years. Under each country, there are several electronic passports issuing office. Each of them is a
Document Signer with a public and private key pair and has a Document Signer Certificate. Each
electronic passport is signed by the Document Signer Certificate to ensure data honesty.
In order to keep away from large amount of electronic passports with invalid keys when a
Document Signer Certificate Key is revoked, the recommended duration of the key should be
about three months, less if the office issue a lot of electronic passports per period of time. If a key
or a permit needs to be revoked, the Country CA must be in touch bilaterally to all other countries
and to the Public Key Directory within 48 hours [7]. In addition, a full revocation list should be
exchange every 90 days.
All the private key of Document Signer is store in the electronic passport issuing office; where as
the public key is store in the Public Key Directory. The directory is a innermost source used to
deal out the public key to the participate countries. Each member country is accountable for
downloading the newest version of the keys and making sure electronic passports are indeed
signed by the Document Signer [9].
5.2. Passive Authentication
Passive Authentication is the only compulsory cryptographic protocol. Its main goal is to permit a
Reader to confirm that the biometric data in the electronic passport is genuine. This method is
known as passive authentication since the Tag carry out no dispensation and is only inertly
involved in the protocol. One must note that Passive Authentication does not tie the Tag to a
electronic passport.
The Inspection System gets back the official document of the issuing essay verifier; using the
public key from the official document it verifies the digital signature and biometrics used to sign
the biometric data. Once the legitimacy of the signature is recognized, the Reader calculates the
mix up of each of these passport data elements and compares them with the mix up values store.
If there is a match, it can be recognized that the data on the Tag was not manipulate [7].
9. International Journal on Cryptography and Information Security (IJCIS),Vol.2, No.3, September 2012
29
5.3. Active Authentication
Active Authentication is a non-compulsory protocol. Using a simple challenge response method,
it aims to notice if a Tag has been substituted or cloned. If Active Authentication is support, the
Tag on the electronic passport provisions a public key KPuAA in Data and its mix up
representation. The corresponding private key KPrAA is stored in the safe and sound section of
Tag memory. In order for the Tag to set up its authenticity, it must prove to the Reader that it
have this private key.
The Reader sends an arbitrarily generated 64 bit string (R) to the Tag.
The Tag signs this string using the key and sends this signature to the Reader.
The Reader gets hold of the public key store in biometrics Data.
The Reader confirms the correctness of the signed string using its information of R and
KPuAA.
5.4. Basic Access Control
Basic Access Control (BAC) is a non-compulsory protocol that tries to ensure that only Readers
with substantial access to the electronic passport can read Tag data. When a reader attempts to
scan the Basic Access Control enabled electronic passport, it engages in a protocol which requires
the Reader to prove information of a pair of secret keys called “access keys” that are derived from
biometrics data on the Machine Readable Zone of the electronic passport. From these keys, a
session key which is used for safe and sound messaging is obtained [8].
5.5. Chip Authentication
The Chip Authentication protocol is aims to replace Active Authentication as a mechanism to
detect cloned electronic passports. If Chip Authentication is performing effectively it establishes a
new pair of encryption and MAC keys to replace Basic Access Control C derived session keys
and enable protected messaging. Note that the electronic passport Tag by now has a Chip
Authentication public key and private key (in secure memory) [13].
6. ELECTRONIC PASSPORT AUTHENTICATE
Figure 1 shows the different entities involved in confirm with electronic passport state of affairs
and the traffic that is exchange between them. A TCP connection from the electronic passport to
the user is created as soon as the user loads the login page. In the current performance this is
accomplished by placing an ASP.NET owned by the identity supplier on the web page to be more
precise, what is placed on the web page is an HTML tag linking to code on the web server. The
website is signed by the identity provider and also loaded from the electronic passport web server
so that the Runtime Environment at the users’ client trusts this piece to allow it to set up a
connection back to the electronic passport server. The website was given permission to connect to
the contactless reader in a electronic passport policy file which was installed during employment.
The TCP connection is used for subsequent communication between the identity provider and the
user’s electronic passport.
10. International Journal on Cryptography and Information Security (IJCIS),Vol.2, No.3, September 2012
30
Figure 1. Message sequence chart of validate with electronic passport development
Using the managed electronic passport acquired during enrollment the user can attempt to login.
One extra step is taken by the identity provider after receiving a token request from the client. In
this extra step the identity provider checks if the user has a valid electronic passport and it reads
the user’s details from the e-passport. As soon as the client actually requests a token at the
identity provider, the identity provider will look at the provided token and send the appropriate
BAC data to the e-passport authenticating the identity provider at the electronic passport. The
identity provider will request the electronic passport’s AA public key and SOD. With the SOD it
can check if the public key has been signed by the issuing country. It can then send a random
challenge to the electronic passport which encrypts it using the AA private key. This proves that
the passport is authentic and not a simple clone. The identity provider will request the minimal
needed information from the electronic passport to confirm to the token request. The token is sent
back to the client and from here on the normal Information scenario continues.
To summarize, the identity provider uses BAC, AA, and PA and then reads Data Group. Based on
the results of the security protocols the identity provider knows that the information in Data
Group correctly identifies a citizen of the issuing country (for as far as the identity provider trusts
11. International Journal on Cryptography and Information Security (IJCIS),Vol.2, No.3, September 2012
31
the country’s CSC, of course). Remember that Data Group contains basic textual card holder
information (name, date of birth, date of expiry of document, document number, gender,
nationality, and in the case even the citizen ID). The information in this data group is used in the
token created by the identity provider and only the required fields (as requested by the relying
party’s policy) are sent to the relying party (via the user’s client). No other information is sent to
the relying party and the relying party needs to trust the identity provider that it has done its job in
checking the validity of the user’s electronic passport.
7. ELECTRONIC PASSPORT PROTOCOLS
The electronic passport is a complex protocol suite that consists of three sub protocols namely,
Basic Access Control, Passive Authentication and Active Authentication. Such a protocol suite is
not only difficult to formalize, but also confirmation of such systems more often leads to an
exponential state-space explosions. Examiner model the flow of electronic passport protocols
according to the following stages:
When an electronic passport is presented at a border safety measures checkpoint, the chip and
the electronic passport reader carry out the Basic Access Control protocol, in order to
establish a secure encrypted communication channel between them.
On successful completion of Basic Access Control, the electronic passport reader performs
Passive Authentication.
On successful completion of Passive Authentication the chip and the electronic passport
reader perform the Active Authentication protocol.
The electronic passport verification heavily relies on PKI. Examiner representation only one level
of certification hierarchy, up to the document signer and we assume that document signer public
key is certified by its country signing influence and, is valid and secluded. This does not weaken
the confirmation process of the electronic passport protocol suite, but only indicates that the
model assumes the “ideal” PKI implementation. Researcher also presumes that cryptographic
primitives and biometrics used in the system like face, fingerprints, palmprint, iris and generation
of keys are safe [8]. In the electronic passport protocol, this verification protocol was used only
when access to biometrics data was required.
7.2. Electronic Passport Initial Setup
All entities involved in the protocol share the public quantities p, q, g where:
p is the modulus, a prime number of the order 1024 bits or more.
q is a prime number in the range of 159 -160 bits.
g is a generator of order q, where Ai < q, gi
≠ 1 mod p.
Each entity has its own public key and private key pair (PKi,SKi) where PKi = g(SK
i
)
mod
p
Entity i’s public key (PKi) is certified by its root certification authority (j), and is
represented as CERTj(PKi, i).
The public parameters p, q, g used by an electronic passport are also certified by its root
certification authority [14].
12. International Journal on Cryptography and Information Security (IJCIS),Vol.2, No.3, September 2012
32
7.3. Phase One – Passport Inspection System Verification
Step 1: When an electronic passport is presented to an Inspection System, the Inspection System
reads the MRZ information on the electronic passport using an MRZ reader and issues the
command GET CHALLENGE to the electronic passport chip.
Step 2: The electronic passport chip then generates a random eP £ R 1 ≤ eP ≤ q - 1 and computes
KeP = geP
mod p, playing its part in the key agreement process to establish a session key.
The electronic passport replies to the GET CHALLENGE command by sending KeP and
its domain parameters p, q, g.
eP → Inspection System : KeP , p, q, g
Step 3: On receiving the response from the electronic passport, the Inspection System generates a
random Inspection System £R 1 ≤ IS ≤ q - 1 and computes its part of the session key as KIS
= gIS
mod p. The Inspection System digitally signs the message containing MRZ value of
the electronic passport and KeP.
SIS = SIGNSKIS (MRZ || KeP)
It then contacts the nearest DV of the electronic passports issuing country and obtains its
public key. The Inspection System encrypts and sends its signature SIS along with the
electronic passport’s MRZ information and KeP using the DV’s public key PKDV.
Inspection System → DV: ENCPK DV (SIS, MRZ, KeP), CERTCVCA(PKIS, IS)
Step 4: The DV decrypts the message received from the Inspection System and verifies the
CERTCVCA (PKIS, IS) and the signature SIS. If the verification holds, the DV knows that
the Inspection System is genuine, and creates a digitally-signed message SDV to prove the
Inspection System’s authenticity to the electronic passport.
SDV = SIGNSKDV (MRZ || KeP || PKIS), CERTCVCA (PKDV, DV)
The DV encrypts and sends the signature SDV using the public key PKIS of Inspection
System.
DV → IS: ENCPKIS (SDV, [PKeP])
The DV may choose to send the public key of the electronic passport if required. This has
an obvious advantage, because the Inspection System system now trusts the DV to be
genuine. It can obtain a copy of electronic passport’s PK to verify during electronic
passport authentication.
Step 5: After decrypting the message received, the Inspection System computes the session key
KePIS = (KIS)eP
and encrypts the signature received from the DV, the electronic passport
MRZ information and KeP using KePIS. It also digitally signs its part of the session key
KIS.
Inspection System → eP : KIS, SIGNSKIS (KIS, p, q, g), ENCKePIS (SDV,MRZ,KeP )
Step 6: On receiving the message from the Inspection System, the electronic passport computes
the session key KePIS = (KIS)eP
. It decrypts the message received using the session key and
verifies the signature SDV and VERIFYPKIS (SIGNSKIS (KIS, p, q, g)). On successful
13. International Journal on Cryptography and Information Security (IJCIS),Vol.2, No.3, September 2012
33
verification, the electronic passport is convinced that the Inspection System system is
genuine and can proceed further in releasing its details. All further communications
between an electronic passport and Inspection System are encrypted using the session key
KePIS.
7.4. Phase Two - Electronic Passport Authentication
Step 1: The Inspection System issues an INTERNAL AUTHENTICATE command to the
electronic passport. The electronic passport on receiving the command, the electronic
passport creates a signature SeP = SIGNSKeP (MRZ || KePIS) and sends its domain parameter
certificate to the Inspection System. The entire message is encrypted using the session
key KePIS.
eP → IS : ENCKePIS (SeP , CERTDV (PKeP), CERTDV (p, q, g))
Step 2: The Inspection System decrypts the message and verifies CERTDV (p, q, g), CERTDV
(PKeP) and SeP. If all three verifications hold then the Inspection System is convinced that
the electronic passport is genuine and authentic.
During the Inspection System authentication phase, and Inspection System sends the electronic
passport’s MRZ information to the nearest electronic passport’s DV, which could be an electronic
passport country’s embassy. Embassies are DV’s because they are allowed to issue electronic
passports to their citizens and because most embassies are located within an Inspection System’s
home country, any network connection issues will be minimal. Sending the MRZ information is
also advantageous, because the embassy now has a list of all its citizens that have passed through
a visiting country’s border security checkpoint. We do not see any privacy implications, because,
in most cases, countries require their citizens to register at embassies when they are visiting a
foreign country.
8. EXPERIMENTAL RESULTS
A successful design, deployment and process of biometric passport scheme depend extremely on
the results for presented biometrics technology and mechanism. These presented technologies as
well as new solutions need to be evaluating on their electronic passport system performance.
However it is often forgotten that the biometrics such as iris, finger, face, and palm prints is only
one part of a fully organize application.
As biometric systems are often not intended with safety measures and or privacy in mind, system
integrators will need to deal with the requirements of the deployed purpose in this light. The fears
and concern of an important segment of the user inhabitants need to be addressed as early as
achievable in the design progression, to ensure that suitable mechanisms are in place to restore
confidence such users. These concerns may relate to privacy or to safety concern, which may be
addressed in part through authorized and authoritarian measures. This article discusses the
requirements, design and application scenarios of biometrics systems in general and the
introduction of a new biometrical passport in particular.
The chip in the electronic passport will be a nearness contactless chip that must be held within ten
centimeters of a reader in order to be read. Moreover, the data on the chip cannot be access unless
the machine-readable zone on read, which means that the electronic passport book must be open.
Border authorities equipped with electronic passport readers will insert the traveler’s electronic
passport into a biometric scanner, which will read the machine-readable zone, thereby opening
14. International Journal on Cryptography and Information Security (IJCIS),Vol.2, No.3, September 2012
34
the chip so that it can be read as well. The machine also checks other safety measures features,
such as the country's signature. Border authorities who are not operational with electronic
passport readers will continue to scrutinize travelers’ biometric passports as they do now.
9. CONCLUSIONS
The work represents an attempt to acknowledge and account for the presence on electronic
passport using biometrics recognition towards their improved identification. The application of
facial, fingerprint, palm print and iris identification in electronic passports requires high
accurateness rates; safe and sound data storage, protected transfer of data and reliable generation
of biometrics data. The electronic passport data is not required to be encrypted, identity thief and
terrorists can easily obtain the biometric information. The discrepancy in privacy laws between
different countries is a barrier for worldwide implementation and recognition of biometric
passport. A possible solution to unencrypted wireless right of entry to electronic passport data is
to store a unique cryptographic key in printed form that is also obtained upon justification. The
key is then used to decrypt electronic passport data and forces thieves to physically obtain
electronic passports to steal personal information. More research into the technology, additional
access and auditing policies, and further safety measures enhancements are required before
biometric identification is considered as a viable solution to biometric safety measures in
electronic passports. The adversaries might exploit the electronic passports with the lowest level
of safety measures. The inclusion of biometrics recognition information into machine readable
electronic passports will improve their robustness against identity theft if additional security
measures are employing in order to compensate for the limitations of the biometric technologies.
It enables countries to digitize their safety measures at border control and provides faster and
safer dealing out of an electronic passport bearer. The main cryptographic features and biometrics
used with electronic passports and considered the surrounding procedures. Electronic passports
may provide valuable experience in how to build more safe and sound and biometric recognition
platforms in the years to come.
REFERENCES
[1] A.K.Jain, R.Bolle, “Biometrics identification in networked society” Norwell, MA: Kluwer, 2010.
[2] Barral and A. Tria. “Fake fingers in fingerprint identification: Glycerin supersedes gelatin”, In Formal
to Practical Security. Springer, 2009.
[3] Bergman, “Multiple biometric match-on-card alliance formed,” Biometric Technology Today, vol.
13, no. 5, p. 6, 2005.
[4] C.Hesher, A.Srivastava, G.Erlebacher, “A novel technique for face identification using range images”
in the Proceedings of Seventh International Symposium on Signal Processing and Its Application,
2003.
[5] Chang, “New multiple biometric approaches for improved personal identification,” PhD Dissertation,
Department of Computer Science and Engineering, University of Notre Dame, 2004.
[6] D. Monar, A. Juels, and D. Wagner, “Security and privacy issues in e-passports”, Cryptology ePrint
Archive, 2005.
[7] Gaurav S. Kc and Paul A. Karger. “Security and privacy issues in machine readable passport travel
documents”, IBM Technical Report, IBM T. J.Watson Research Labs, April 2005.
[8] HOME AFFAIRS JUSTICE, “Specifications for security features and biometrics in passport”,
Technical report, European Union, 2006.
[9] ICAO, “Machine readable passport documents”, Technical report, ICAO 2006.
[10] ICAO, “Machine Readable Travel Documents”, Part 1 Machine Readable Passports. ICAO, Fifth
Edition, 2003.
[11] ICAO, “Biometrics passport Deployment of Machine Readable Travel Documents”, Version 2.0, May
2004.
15. International Journal on Cryptography and Information Security (IJCIS),Vol.2, No.3, September 2012
35
[12] John Daugman, “How iris identification works.” IEEE Transactions on Circuits and Systems for
Video Technology, 21–30, 2009.
[13] KLUGLER, D., “Advance security mechanisms for passport machine readable travel documents,
Technical report”, Federal Office for Information Security (BSI), Germany, 2005.
[14] Riscure Security Lab, “Electronic passport security and privacy attack”, at the Cards Asia Singapore,
April 2006.
First Author Profile:
Mr. V.K. NARENDIRA KUMAR M.C.A., M.Phil., Assistant Professor, Department of
Information Technology, Gobi Arts & Science College (Autonomous), Gobichettipalayam
– 638 453, Erode District, Tamil Nadu, India. He received his M.Phil Degree in Computer
Science from Bharathiar University in 2007. He has authored more than 22 articles in
international journal. He has authored or co-authored more than 58 technical papers and
conference presentations. He is an editorial board member for several international
journals. His research interests are focused on Internet Security, Biometrics, Advanced
Networking, Electronic Identification Systems, Visual Human-Computer Interaction, and Multiple
Biometrics Technologies.
Second Author Profile:
Dr. B. SRINIVASAN M.C.A., M.Phil., M.B.A., Ph.D., Associate Professor, PG &
Research Department of Computer Science, Gobi Arts & Science College (Autonomous),
Gobichettipalayam – 638 453, Erode District, Tamil Nadu, India. He received his Ph.D.
Degree in Computer Science from Vinayaka Missions University in 11.11.2010. He has
authored more than 22 articles in international journal. He has authored or co-authored
more than 70 technical papers and conference presentations. He is a editorial board for
several scientific e-journals. His research interests include automated biometrics,
computer networking, Internet security, and performance evaluation.