Skip to main content

Personal Authenticator on the Basis of Two-Factors: Palmprint Features and Tokenized Random Data

  • Conference paper
AI 2004: Advances in Artificial Intelligence (AI 2004)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3339))

Included in the following conference series:

Abstract

This paper presents a novel two-factor authenticator which hashes tokenized random data and moment based palmprint features to produce a set of private binary string, coined as Discrete-Hashing code. This novel technique requires two factors (random number + authorized biometrics) credentials in order to access the authentication system. Absence of either factor will just handicap the progress of authentication. Besides that, Discrete-Hashing also possesses high discriminatory power, with highly correlated bit strings for intra-class data. Experimental results show that this two-factor authenticator surpasses the classic biometric authenticator in terms of verification rate. Our proposed approach provides a clear separation between genuine and imposter population distributions. This implies that Discrete-Hashing technique allows achievement of zero False Accept Rate (FAR) without jeopardizing the False Reject Rate (FRR) performance, which is hardly possible to conventional biometric systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bolle, R.M., Connel, J.H., Ratha, N.K.: Biometric Perils and Patches. The Journal of the Pattern Recognition Society 35, 2727–2738 (2002)

    Article  MATH  Google Scholar 

  2. Matsumoto, T.: Importance of Open Discussion on Adversarial Analyses for Mobile Security Technology. In: ITU-T Workshop on Security, Seoul (May 2002)

    Google Scholar 

  3. Connie, T., Michael, G.K.O., Andrew, T.B.J., David, N.C.L.: An Automated Biometric Palmprint Verification System. In: The 3rd International Symp. on Communications & Info. Tech (ISCIT 2003), Thailand, vol. 2, pp. 714–719 (2002)

    Google Scholar 

  4. Teh, C.H., Chin, R.T.: On Image Analysis by the Methods of Moments. IEEE Trans. Pattern Analysis Machine Intell. 10, 496–512 (1988)

    Article  MATH  Google Scholar 

  5. Mukundan, R., Ramakrishnan, K.R.: Moment Functions in Image Analysis – Theory and Applications. World Scientific Publishing, Singapore (1998)

    MATH  Google Scholar 

  6. Pang, Y.H., Andrew, T.B.J., David, N.C.L.: Palmprint Authentication with Zernike moment Invariants. In: Proceeding of the 3rd International Sym. On Signal Processing and Information technology, MP3-3_ISSPIT2003, Darmstadt, Germany (December 2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Pang, YH., Jin, A.T.B., Ling, D.N.C. (2004). Personal Authenticator on the Basis of Two-Factors: Palmprint Features and Tokenized Random Data. In: Webb, G.I., Yu, X. (eds) AI 2004: Advances in Artificial Intelligence. AI 2004. Lecture Notes in Computer Science(), vol 3339. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30549-1_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30549-1_21

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-24059-4

  • Online ISBN: 978-3-540-30549-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics