63
Views
0
CrossRef citations to date
0
Altmetric
Research Article

An efficient privacy-preserving user authentication scheme using image processing and blockchain technologies

, &

References

  • Seqrite. (2018) Importance of user authentication in network security. [Online]. Available: https://blogs.seqrite.com/
  • C. Mathias. (2014) Why mobile user authentication is more important than ever.
  • C. Shi, J. Liu, H. Liu, and Y. Chen, “Smart User Authentication through Actuation of Daily Activities Leveraging WiFi-enabled IoT,” in MobiHoc 2017.
  • N. Clarke and S. Furnell., “Authentication of users on mobile telephones: A survey of attitudes and practices,” Comput. and Security, vol. 24, no. 7, pp. 519–527, 2005. doi: https://doi.org/10.1016/j.cose.2005.08.003
  • A. Vance. (2010) If your password is 12345, just make it hack me. [Online]. Available: http://www.nytimes.com/
  • H. League. (2018) What is Brute Force Attack?. [Online]. Available: https://medium.com/
  • Mahesh. (2019) How Hackers Hack Your Accounts And Passwords And Ways To Avoid Being Compromised.
  • M. Li, Y. Meng, J. Liu, H. Zhu, X. Liang, Y. Liu, and N. Ruan, “When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals,” in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, ser. CCS ‘16. NY, USA: ACM, 2016, pp. 1068–1079.
  • A. Kelly, “Cracking Passwords using Keyboard Acoustics and Language Modeling,” Master’s thesis, School of Informatics, University of Edinburgh, 2010.
  • N. Lord. (2018) Uncovering Password Habits: Are Users’ Password Security Habits Improving? (Infographic).: https://digitalguardian.com/
  • A. J. Aviv, K. Gibson, E. Mossop, M. Blaze, and J. M. Smith, “Smudge attacks on smartphone touch screens,” in 4th USENIX Conf. 2010, pp. 1–7.
  • P. Cheng, I. Bagci, U. Roedig, and J. Yan, “SonarSnoop: Active Acoustic Side-Channel Attacks,”.
  • S. R. Labs. Fingerprints are not fit for secure device locking, Security Research Labs.
  • L. H. Newman. (2016) Hackers Trick Facial-Recognition Logins with photos from Facebook (What else?).
  • R. Brandom. (2017) Two-Factor authentication is a mess. [Online]. Available: https://www.theverge.com
  • N. Gunsun, D. MArshall, H. Morton, and M. Jack, “User perceptions of security and usability of single-factor and two-factor authentication in automated telephone banking,” Computers and Security, vol. 30, no. 4, pp. 208–220, June 2011. doi: https://doi.org/10.1016/j.cose.2010.12.001
  • V. M. Patel, R. Chellappa, D. Chandra, and B. Barbello, “Continuous user authentication on mobile devices: Recent progress and remaining challenges,” IEEE Signal Processing Magazine, vol. 33, no. 4, pp. 49–61, July 2016. doi: https://doi.org/10.1109/MSP.2016.2555335
  • M. SandstrÃDom, “Liveness Detection in Fingerprint Recognition Systems,” in Linkopings University, Master Thesis, Sweden, June 2004.
  • T. V. Puttee and J. Kuening, “Biometrical fingerprint recognition: don’t get your fingers burned,” in In Proceedings of IFIP TC8/WG8.8 Fourth Working Conference on Smart Card Research and Advanced Applications, September 2000.
  • M. Sepasian, C. Mares, and W. Balachandran, “Liveness and spoofing in fingerprint identification: issues and challenges,” in recent ad volume 4, 2016.
  • C. Yuan, X. Sun, and Q. M. Wu, “Difference co-occurrence matrix using B.P. neural network for fingerprint liveness detection,” Soft Computing, April 2018.
  • Z. Xia, C. Yuan, R. Lv, X. Sun, N. N. Xiong, and Y. Shi, “A novel weber local binary descriptor for fingerprint liveness detection,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, pp. 1–11, 2018.
  • W. Yang, S. Wang, J. Hu, G. Zheng, and C. Valli, “Security and accuracy of fingerprint-based biometrics: A review,” Symmetry 2019, 11(2), 141, pp. 1–11.
  • A. Abhyankar, S. Schuckers, Wavelet-based approach to detecting liveness in fingerprint scanners, in Proceedings of the SPIE Defense and Security Symposium, Biometric Technology for Human Identification, April 2004, pp. 278-286.
  • P. Coli, G. L. Marcialis, F. Roli, Power spectrum-based fingerprint vitality detection, IEEE Workshop on Automatic Identification Adv. Tech. AutoID 2007.
  • J. Galbally, F. Alonso-Fernandez, J. Fierrez, J. Ortega-Garcia, A high performance fingerprint liveness detection method based on quality related features. Future Gener. Comput. Syst. 2012, 28, 311–321. doi: https://doi.org/10.1016/j.future.2010.11.024
  • W. Kim, Fingerprint Liveness Detection Using Local Coherence Patterns. IEEE Signal Process Lett 1, 2014, pp.1–5
  • H.Y. Jung, YS Heo, Fingerprint liveness map construction using convolutional neural network. Electron Lett 54(9), pp.8– 9, 2018. doi: https://doi.org/10.1049/el.2018.0621
  • Z. Xia, C. Yuan, Lv R, X. Sun, A Novel Weber Local Binary Descriptor for Fingerprint Liveness Detection. IEEE Trans Syst Man Cybern Syst, 1–11, 2018.
  • P. Tirlotkar, Chitrakathi K., Rohit Jadhav R., Khamkar A., Mishra M., Smart Attendance System Using Image Processing, International Journal Of Engineering Research & Technology (IJERT) ICIATE – 2017 vol. 5(01), 2017.
  • Hegde C, Manu S., Shenoy P. D., Venugopal K. R. and Patnaik L. M., “Secure Authentication using Image Processing and Visual Cryptography for Banking Applications,” 2008 16th International Conference on Advanced Computing and Communications, 2008, pp. 65-72, doi: https://doi.org/10.1109/ADCOM.2008.4760429.
  • Pintu R Shah, Image based Authentication System, International Journal of Computer Applications (0975 – 8887), International Conference on Communication Technology 2013, pp. 1-4, 2013.
  • T. Brewster. (2018) We Broke Into A Bunch Of Android Phones With A 3D-Printed Head.
  • (2017) Bkav’s new mask beats Face ID in “twin way”: Severity level raised, do not use Face ID in business transactions.
  • Samsung. (2016) Iris Recognition on Galaxy S8. [Online]. Available: https://www.samsung.com/au/iris/
  • D. Goodin. (2016) Breaking the iris scanner locking Samsung’s Galaxy S8 is laughably easy. [Online].
  • H. Zhong, S. S. Kanhere, and C. T. Chou, “VeinDeep: Smart Phone Unlock using Vein Patterns,” in Percom 2017.
  • J. Cox. (2018) Hackers Make a Fake Hand to Beat Vein Authentication. [Online]. Available: https://www.vice.com/
  • I. Martinovic, K. Rasmussen, M. Roeschlin, and G. Tsudik, “Authentication Using Pulse-response Biometrics,” Commun. ACM, vol. 60, no. 2, pp. 108–115, Jan. 2017. [Online]. Available: http://doi.acm.org/https://doi.org/10.1145/3023359
  • N. Zheng, K. Bai, H. Huang, and H. Wang, “You are How You Touch: User Verification on Smartphones via Tapping Behaviors,” in 2014 IEEE 22nd International Conference on Network Protocols, pp. 211–221.
  • Y. Chen, J. Sun, R. Zhang, and Y. Zhnag, “Your Song Your Way: RhythmBased Two-Factor Authentication for Multi-Touch Mobile Devices,” in 2015 IEEE Conference of Computer Communications (Infocom).
  • T. Feng, X. Zhao, N. DeSalvo, Z. Gao, X. Wang, and W. Shi, “Security after Login: Identity Change Detection on Smartphones Using Sensor Fusion,” in 2015 IEEE International Symposium on Technologies for Homeland Security (HST), pp. 1–6.
  • F. Zhang, A. Kondor, and S. Muftic, “A Location-Based Authentication and Authorization using Smart Phones,” in IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communication, 2012, pp. 1285–1292.
  • U. A. Abdurrahman, M. Kaiiali, and J. Muhammad, “A new mobilebased multi-factor authentication scheme using pre-shared number, GPS location and time stamp,” in 2013 International Conference on Electronics, Computer and Computation, pp. 293–296.
  • N. Karapanos, C. Marforio, C. Soriente, and S. Capkun, “Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound,” in 24th Usenix Security Symposium 2015, pp. 483–498.
  • RSA. (2019) RSA SecureID. [Online]. Available: https://www.rsa.com
  • Yubico. (2019) YubiKeys. [Online]. Available: https://www.yubico.com
  • Kwikset. (2019) Touch-to-Open Smart Lock. [Online]. Available: https://www.kwikset.com/kevo/default
  • M. Wollerton. (2016) Here’s what happened when someone hacked ‘the August Smart Lock. [Online]. Motiv. (2018) Motiv Ring now provides new, easy-to-use security features to protect your online identity. [Online].
  • Auth0. (2017) Two Factor Authentication Using Biometrics. [Online].
  • Biosig-id. (2018) Biometric Multi-factor Authentication Smart Password.
  • Shen M., Deng Y., Zhu L., Du X., Guizani N. Privacy-Preserving Image Retrieval for Medical IoT Systems: A Blockchain-Based Approach. IEEE Netw. 2019;33:27–33. doi: https://doi.org/10.1109/MNET.001.1800503.
  • Jabarulla M.Y., Lee H. Blockchain-Based Distributed Patient-Centric Image Management System. arXiv. 20202003.08054
  • Li Y., Tu Y., Lu J., Wang Y. A Security Transmission and Storage Solution about Sensing Image for Blockchain in the Internet of Things. Sensors. 2019;20:916. doi: https://doi.org/10.3390/s20030916.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.