A note on biometrics-based authentication with portable device

Shinsuke Ohtsuka, Satoshi Kawamoto, Shigeru Takano, Kensuke Baba, Hiroto Yasuura

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Individual authentication technologies are essential for electronic systems as social infrastructures. Especially, biometrics-based authentication has been receiving increasing attention and is expected to be implemented on systems with portable devices such as mobile phones for realizing more useful services. The most important problem in biometrics-based authentication is to prevent a leakage of biological information. This paper focuses on the leakage which enables a spoofing and consider two cases, a leakage from data stored in a server for verification of biological information and a leakage by a cheating detection. This paper proposes a solution by applying a function to biological information and shows the properties required for the function to solve the problem. Moreover, this paper proposes an idea of biometrics-based authentication system with portable devices which is provided a function to capture biological information.

Original languageEnglish
Title of host publicationSECRYPT 2008 - International Conference on Security and Cryptography, Proceedings
Pages99-102
Number of pages4
Publication statusPublished - 2008
EventInternational Conference on Security and Cryptography, SECRYPT 2008 - Porto, Portugal
Duration: Jul 26 2008Jul 29 2008

Other

OtherInternational Conference on Security and Cryptography, SECRYPT 2008
CountryPortugal
CityPorto
Period7/26/087/29/08

Fingerprint

Biometrics
Authentication
Mobile phones
Servers

All Science Journal Classification (ASJC) codes

  • Artificial Intelligence
  • Information Systems
  • Software
  • Control and Systems Engineering

Cite this

Ohtsuka, S., Kawamoto, S., Takano, S., Baba, K., & Yasuura, H. (2008). A note on biometrics-based authentication with portable device. In SECRYPT 2008 - International Conference on Security and Cryptography, Proceedings (pp. 99-102)

A note on biometrics-based authentication with portable device. / Ohtsuka, Shinsuke; Kawamoto, Satoshi; Takano, Shigeru; Baba, Kensuke; Yasuura, Hiroto.

SECRYPT 2008 - International Conference on Security and Cryptography, Proceedings. 2008. p. 99-102.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Ohtsuka, S, Kawamoto, S, Takano, S, Baba, K & Yasuura, H 2008, A note on biometrics-based authentication with portable device. in SECRYPT 2008 - International Conference on Security and Cryptography, Proceedings. pp. 99-102, International Conference on Security and Cryptography, SECRYPT 2008, Porto, Portugal, 7/26/08.
Ohtsuka S, Kawamoto S, Takano S, Baba K, Yasuura H. A note on biometrics-based authentication with portable device. In SECRYPT 2008 - International Conference on Security and Cryptography, Proceedings. 2008. p. 99-102
Ohtsuka, Shinsuke ; Kawamoto, Satoshi ; Takano, Shigeru ; Baba, Kensuke ; Yasuura, Hiroto. / A note on biometrics-based authentication with portable device. SECRYPT 2008 - International Conference on Security and Cryptography, Proceedings. 2008. pp. 99-102
@inproceedings{4dfbefc0680c4d739f7d659144776507,
title = "A note on biometrics-based authentication with portable device",
abstract = "Individual authentication technologies are essential for electronic systems as social infrastructures. Especially, biometrics-based authentication has been receiving increasing attention and is expected to be implemented on systems with portable devices such as mobile phones for realizing more useful services. The most important problem in biometrics-based authentication is to prevent a leakage of biological information. This paper focuses on the leakage which enables a spoofing and consider two cases, a leakage from data stored in a server for verification of biological information and a leakage by a cheating detection. This paper proposes a solution by applying a function to biological information and shows the properties required for the function to solve the problem. Moreover, this paper proposes an idea of biometrics-based authentication system with portable devices which is provided a function to capture biological information.",
author = "Shinsuke Ohtsuka and Satoshi Kawamoto and Shigeru Takano and Kensuke Baba and Hiroto Yasuura",
year = "2008",
language = "English",
isbn = "9789898111593",
pages = "99--102",
booktitle = "SECRYPT 2008 - International Conference on Security and Cryptography, Proceedings",

}

TY - GEN

T1 - A note on biometrics-based authentication with portable device

AU - Ohtsuka, Shinsuke

AU - Kawamoto, Satoshi

AU - Takano, Shigeru

AU - Baba, Kensuke

AU - Yasuura, Hiroto

PY - 2008

Y1 - 2008

N2 - Individual authentication technologies are essential for electronic systems as social infrastructures. Especially, biometrics-based authentication has been receiving increasing attention and is expected to be implemented on systems with portable devices such as mobile phones for realizing more useful services. The most important problem in biometrics-based authentication is to prevent a leakage of biological information. This paper focuses on the leakage which enables a spoofing and consider two cases, a leakage from data stored in a server for verification of biological information and a leakage by a cheating detection. This paper proposes a solution by applying a function to biological information and shows the properties required for the function to solve the problem. Moreover, this paper proposes an idea of biometrics-based authentication system with portable devices which is provided a function to capture biological information.

AB - Individual authentication technologies are essential for electronic systems as social infrastructures. Especially, biometrics-based authentication has been receiving increasing attention and is expected to be implemented on systems with portable devices such as mobile phones for realizing more useful services. The most important problem in biometrics-based authentication is to prevent a leakage of biological information. This paper focuses on the leakage which enables a spoofing and consider two cases, a leakage from data stored in a server for verification of biological information and a leakage by a cheating detection. This paper proposes a solution by applying a function to biological information and shows the properties required for the function to solve the problem. Moreover, this paper proposes an idea of biometrics-based authentication system with portable devices which is provided a function to capture biological information.

UR - http://www.scopus.com/inward/record.url?scp=58049165784&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=58049165784&partnerID=8YFLogxK

M3 - Conference contribution

SN - 9789898111593

SP - 99

EP - 102

BT - SECRYPT 2008 - International Conference on Security and Cryptography, Proceedings

ER -