A note on biometrics-based authentication with portable device

Shinsuke Ohtsuka, Satoshi Kawamoto, Shigeru Takano, Kensuke Baba, Hiroto Yasuura

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Individual authentication technologies are essential for electronic systems as social infrastructures. Especially, biometrics-based authentication has been receiving increasing attention and is expected to be implemented on systems with portable devices such as mobile phones for realizing more useful services. The most important problem in biometrics-based authentication is to prevent a leakage of biological information. This paper focuses on the leakage which enables a spoofing and consider two cases, a leakage from data stored in a server for verification of biological information and a leakage by a cheating detection. This paper proposes a solution by applying a function to biological information and shows the properties required for the function to solve the problem. Moreover, this paper proposes an idea of biometrics-based authentication system with portable devices which is provided a function to capture biological information.

Original languageEnglish
Title of host publicationSECRYPT 2008 - International Conference on Security and Cryptography, Proceedings
Pages99-102
Number of pages4
Publication statusPublished - 2008
Externally publishedYes
EventInternational Conference on Security and Cryptography, SECRYPT 2008 - Porto, Portugal
Duration: Jul 26 2008Jul 29 2008

Publication series

NameSECRYPT 2008 - International Conference on Security and Cryptography, Proceedings

Conference

ConferenceInternational Conference on Security and Cryptography, SECRYPT 2008
Country/TerritoryPortugal
CityPorto
Period7/26/087/29/08

Keywords

  • Authentication
  • Biometrics
  • Mobile system
  • Spoofing

ASJC Scopus subject areas

  • Artificial Intelligence
  • Information Systems
  • Software
  • Control and Systems Engineering

Fingerprint

Dive into the research topics of 'A note on biometrics-based authentication with portable device'. Together they form a unique fingerprint.

Cite this