signature=3bed159966be4e0143cfc019c5f1b89b,基于加密安全保护并多重生物识别有效实施电子护照方案(IJIEEB-V4-N1-3)...

本文探讨了使用面部、指纹、掌纹和虹膜生物特征的电子护照设计,以及它们在提高电子护照持有者生物信息安全方面的加密安全性分析。文章指出,生物识别技术有助于增强边境安全,减少伪造,并通过更准确的身份验证限制假冒证件的使用。同时,指出了电子护照存在的潜在威胁,如数据被非法读取(‘ skimming’或‘ eavesdropping’)和攻击方式(如‘ splicing attack’和‘ fake finger attack’)。

摘要生成于 C知道 ,由 DeepSeek-R1 满血版支持, 前往体验 >

592e827e83014a544db94231a39ebcaf.png

I.J. Information Engineering and Electronic Business, 2012, 1, 18-24

Published Online February 2012 in MECS (http://www.doczj.com/doc/4ea123c7b0717fd5360cdcc0.html/)

DOI: 10.5815/ijieeb.2012.01.03

Efficient Implementation of Electronic Passport Scheme Using Cryptographic Security Along

With Multiple Biometrics

1 V.K. NARENDIRA KUMAR,

2 B. SRINIVASAN,

3 P.NARENDRAN

1Assistant Professor, Department of Information Technology,

2, 3Associate Professor, PG & Research Department of Computer Science,

Gobi Arts & Science College (Autonomous),

Gobichettipalayam – 638 453, Erode District, Tamil Nadu, India.

1 kumarmcagobi@http://www.doczj.com/doc/4ea123c7b0717fd5360cdcc0.html,

2 srinivasan_gasc@http://www.doczj.com/doc/4ea123c7b0717fd5360cdcc0.html,

3 narendranp@http://www.doczj.com/doc/4ea123c7b0717fd5360cdcc0.html

Abstract --Electronic passports have known a wide and fast deployment all around the world since the International Civil Aviation Organization the world has adopted standards whereby passports can store biometric identifiers. The use of biometrics for identification has the potential to make the lives easier, and the world people live in a safer place. The purpose of biometric passports is to prevent the illegal entry of traveler into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. The paper analyses the face, fingerprint, palm print and iris biometric e-passport design. The paper also provides a cryptographic security analysis of the e-passport using face fingerprint, palm print and iris biometric that are intended to provide improved security in protecting biometric information of the e-passport bearer.

Index Terms — E-Passport, Biometrics, Cryptographic, Face, Fingerprint, Palm print and Iris.

1.Introduction

An electronic passport (e-Passport) is an identification document which possesses relevant biographic and biometric information of its bearer. It also has embedded

in it a Radio Frequency Identification (RFID) Tag which

is capable of cryptographic functionality. The successful implementation of biometric technologies in documents such as e-Passports aims to strengthen border security by reducing forgery and establishing without doubt the identity of the documents' bearer. Biometrics is measurable characteristics of an individual used to identify him or her. Biometric systems can function in verification or identification modes depending on their intended use. In a verification task, a person presents an identity claim to the system and the system only needs to verify the claim. In an identification task, an unknown individual presents himself or herself to the system, and it must identify them. In general, there are three approaches to authentication. In order of least secure and least convenient to most secure and most convenient, they are: Something you have - card, token, key. Something you know- PIN, password. Something you are - biometric [1]. Introduction to the three constituent technologies in E-Passports: Biometric and Public Key Infrastructure. Researcher also effectively summarizes the contents of three technical reports which describe the protocols and the functioning of the e-Passport specifications. The first work that analyses the protocols behind the e-Passport. Researcher also presents some feasible threats to the e-Passport protocol.

2.Literature Survey

Juels et al (2005) discussed security and privacy issues that apply to e-passports. They expressed concerns that, the contact-less chip embedded in an e-passport allows the e-passport contents to be read without direct contact with an IS and, more importantly, with the e-passport booklet closed. They argued that data stored in the chip could be covertly collected by means of “skimming” or “eavesdropping”. Because of low entropy, secret keys stored would be vulnerable to brute force attacks as demonstrated by Laurie (2007). Kc and Karger (2005) suggested that an e-passport may be susceptible to “splicing attack”, “fake finger attack” and other related attacks that can be carried out when an e-passport bearer presents the e-passport to hotel clerks. There has been considerable press coverage (Johnson, 2006; Knight, 2006; Reid, 2006) on security weaknesses in e-passports. These reports indicated that it might be possible to “clone” an e-passport.

2.1. Technical Challenges

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值