Published January 4, 2018 | Version v1
Journal article Open

A STUDY ON MULTIFACTOR AUTHENTICATION MODEL USING FINGERPRINT HASH CODE, PASSWORD AND OTP

  • 1. Research Scholar, College of Computer and Information Science, Srinivas University, Mangaluru, Karnataka
  • 2. College of Computer and Information Science, Srinivas University, Mangaluru, Karnataka

Description

By definition, Authentication is using one or multiple mechanisms to show that you are who you claim to be. As soon as the identity of the human or machine is demonstrated, then human or machine is authorized to grant some services. The modern research study reveals that fingerprint is not so secured like secured a password which consists of alphanumeric characters, number and special characters. Fingerprints are left at crime places, on materials or at the door which is usually class of latent fingerprints. We cannot keep fingerprint as secure like rigid passwords. Using some modern technology with copper and graphite spray it's easy to mimic fingerprint image. Fingerprints are a half-secret if passwords are leaked or hacked, it easily revocable using another password. But in a biometric security system, which uses only biometric features, is not easy to change fingerprint key or fingerprint are static biometric, which never change much throughout the lifespan. Fingerprints are left at car, door or anyplace where every person goes and places his finger. Fingerprint Hash code is not used for full security or authentication purpose but it can be combined with other security elements like password or OTP in order to enhance security. In this paper, a novel method for Authentication is proposed by making use of Fingerprint Hash Code, Password, and OTP. In this study, we make use of Euclidean Distance to generate fingerprint Hash Code. Fingerprint Hash code is generated using MD5 Hash Function. The Model is implemented using MATLAB2015a. This paper also analyzes novel Authentication model used in this study with the aid of ABCD analysis. 

Files

94.pdf

Files (593.8 kB)

Name Size Download all
md5:9a6a0ad644c5ece1668361ed2a4e64bb
593.8 kB Preview Download

Additional details

References

  • 1. Parmar, H., Nainan, N., & Thaseen, S. (2012). Generation of secure one-time password based on image Authentication. Journal of Computer Science and Information Technology, 7, 195-206. 2. M'raihi, D., Bellare, M., Hoornaert, F., Naccache, D., & Ranen, O. (2005). Hotp: An hmac-based one-time password algorithm (No. RFC 4226). 3. Krishna Prasad, K. & Aithal, P.S. (2017). A Critical Study on Fingerprint Image Sensing and Acquisition Technology. International Journal of Case Studies in Business, IT and Education (IJCSBE), 1(2), 86-92. DOI: http://dx.doi.org/10.5281/zenodo.1130581. 4. Krishna Prasad, K. & Aithal, P.S. (2017). A Conceptual Study on Image Enhancement Techniques for Fingerprint Images. International Journal of Applied Engineering and Management Letters (IJAEML), 1(1), 63-72. DOI: http://dx.doi.org/10.5281/zenodo.831678. 5. Krishna Prasad, K. & Aithal, P.S. (2017). Literature Review on Fingerprint Level 1 and Level 2 Features Enhancement to Improve Quality of Image. International Journal of Management, Technology, and Social Sciences (IJMTS), 2(2), 8-19. DOI: http://dx.doi.org/10.5281/zenodo.835608. 6. Krishna Prasad, K. & Aithal, P.S. (2017). Fingerprint Image Segmentation: A Review of State of the Art Techniques. International Journal of Management, Technology, and Social Sciences (IJMTS), 2(2), 28-39. DOI: http://dx.doi.org/10.5281/zenodo.848191. 7. Krishna Prasad, K. & Aithal, P.S. (2017). A Novel Method to Contrast Dominating Gray Levels during Image contrast Adjustment using Modified Histogram Equalization. International Journal of Applied Engineering and Management Letters (IJAEML), 1(2), 27-39. DOI: http://dx.doi.org/10.5281/zenodo. 896653 8. Krishna Prasad, K. & Aithal, P.S. (2017).Two Dimensional Clipping Based Segmentation Algorithm for Grayscale Fingerprint Images. International Journal of Applied Engineering and Management Letters (IJAEML), 1(2), 51-65. DOI: http://dx.doi.org/10.5281/zenodo.1037627. 9. Krishna Prasad, K. & Aithal, P.S. (2017). A conceptual Study on Fingerprint Thinning Process based on Edge Prediction. International Journal of Applied Engineering and Management Letters (IJAEML), 1(2), 98-111. DOI: http://dx.doi.org/10.5281/zenodo.1067110 10. Krishna Prasad, K. & Aithal, P.S. (2017). A Study on Fingerprint Hash Code Generation Using Euclidean Distance for Identifying a User. International Journal of Management, Technology, and Social Sciences (IJMTS), 2(2), 116-126. DOI : http://doi.org/10.5281/zenodo.1133545 11. Tulyakov, S., Farooq, F., Mansukhani, P., & Govindaraju, V. (2007). Symmetric hash functions for secure fingerprint biometric systems. Pattern Recognition Letters, 28(16), 2427-2436. 12. Das, P. P., Chakrabarti, P. P., & Chatterji, B. N. (1987). Distance functions in digital geometry. Information Sciences, 42(2), 113-136. 13. Yamada, H. (1984). Complete Euclidean distance transformation by parallel operation. In Proc. of 7th Int. Conf. on Pattern Recognition, Montreal (Vol. 1, pp. 69-71). 14. Borgefors, G. (1986). Distance transformations in digital images. Computer vision, graphics, and image processing, 34(3), 344-371. 15. Danielsson, P. E. (1980). Euclidean distance mapping. Computer Graphics and image processing, 14(3), 227-248. 16. Yamashita, M., & Ibaraki, T. (1986). Distances defined by neighborhood sequences. Pattern Recognition, 19(3), 237-246. 17. Brainard, J., Juels, A., Rivest, R. L., Szydlo, M., & Yung, M. (2006, October). Fourth-factor authentication: somebody you know. In Proceedings of the 13th ACM conference on Computer and communications security (pp. 168-178). ACM. 18. Bemmel, V., & Mian, S. (2009). U.S. Patent No. 7,512,567. Washington, DC: U.S. Patent and Trademark Office. 19. Aloul, F. A., Zahidi, S., & El-Hajj, W. (2009, May). Two factor authentication using mobile phones. In AICCSA (pp. 641-644). 20. Jakobsson, M., Shi, E., Golle, P., & Chow, R. (2009, August). Implicit authentication for mobile devices. In Proceedings of the 4th USENIX conference on hot topics in security (pp. 9-9). USENIX Association. 21. Angulo, J., & Wästlund, E. (2011, September). Exploring touch-screen biometrics for user identification on smart phones. In IFIP Prime Life International Summer School on Privacy and Identity Management for Life (pp. 130-143). Springer Berlin Heidelberg. 22. Delac, K., & Grgic, M. (2004, June). A survey of biometric recognition methods. In Electronics in Marine, 2004. Proceedings Elmar 2004. 46th International Symposium (pp. 184-193). IEEE. 23. Seo, H., Kim, E., & Kim, H. K. (2012). A novel biometric identification based on a users input pattern analysis for intelligent mobile devices. International Journal of Advanced Robotic Systems, 9, 1-10. 24. De Marsico, M., Galdi, C., Nappi, M., & Riccio, D. (2014). FIRME: face and iris recognition for mobile engagement. Image and Vision Computing, 32(12), 1161-1172. 25. Kumar, D., & Ryu, Y. (2009). A brief introduction of biometrics and fingerprint payment technology. International Journal of advanced science and Technology, 4, 25-38. 26. Aithal, P. S. (2016). A Review on Advanced Security Solutions in Online Banking Models, International Journal of Scientific Research and Modern Education (IJSRME), 1(1), 421-429. DOI: http://doi.org/10.5281/zenodo.160971. 27. Aithal, P. S. (2015). Biometric Authenticated Security Solution to Online Financial Transactions. International Journal of Management, IT and Engineering (IJMIE), 5(7), 455-464, DOI: http://doi.org/10.5281/zenodo.268875. 28. Yoo, J. H., Ko, J. G., Chung, Y. S., Jung, S. U., Kim, K. H., Moon, K. Y., & Chung, K. (2007, December). Design of embedded multimodal biometric systems. In Signal-Image Technologies and Internet-Based System, 2007. SITIS'07. Third International IEEE Conference on (pp. 1058-1062). IEEE. 29. Xi, K., & Hu, J. (2009, June). Biometric mobile template protection: a composite feature based fingerprint fuzzy vault. In 2009 IEEE International Conference on Communications (pp. 1-5). IEEE. 30. Aithal, P. S., Shailashree, V. T., & Kumar, P. M. (2015). Application of ABCD Analysis Model for Black Ocean Strategy. International Journal of Applied Research, 1(10), 331-337. DOI: http://doi.org/10.5281/zenodo.163424. 31. Aithal, P. S. (2016). Study on ABCD analysis technique for business models, business strategies, operating concepts & business systems, International Journal in Management and Social Science, 4(1), 98-115. DOI: http://doi.org/10.5281/zenodo.161137. 32. Aithal, P. S., Shailashree, V. T., & Kumar, P. M. (2016). ABCD analysis of Stage Model in Higher Education. International Journal of Management, IT and Engineering, 6(1), 11-24. DOI: http://doi.org/10.5281/zenodo.154233. 33. Aithal, P. S., Shailashree, V. T, S., & Kumar, P. M. (2016). Analysis of ABC Model of Annual Research Productivity using ABCD Framework. International Journal of Current Research and Modern Education (IJCRME), 1(1), 846-858. DOI: http://doi.org/10.5281/zenodo.62022. 34. Aithal, P. S. (2017). ABCD Analysis of Recently Announced New Research Indices. International Journal of Management, Technology, and Social Sciences (IJMTS), 1(1), 65-76. DOI: http://doi.org/10.5281/zenodo.583644. 35. Varun Shenoy, & Aithal P. S., (2016). ABCD Analysis of On-line Campus Placement Model, IRA-International Journal of Management & Social Sciences (ISSN 2455-2267). Vol. 5, No. 2, pp. 227-244. DOI: http://dx.doi.org/10.21013/jmss.v5.n2.p3. 36. Aithal, P. S., and Shailashree, V. T., and Kumar, P. M. Suresh. (2016). Analysis of NAAC Accreditation System Using ABCD Framework. International Journal of Management, IT and Engineering, 6(1) 30-44. DOI: http://doi.org/10.5281/zenodo.154272. 37. Aithal, P. S., Shailashree, V. T., & Kumar, P. M. (2016). Application of ABCD Analysis Framework on Private University System in India. International Journal of Management Sciences and Business Research, 5(4), 159-170. DOI: http://doi.org/10.5281/zenodo.161111. 38. Aithal, P. S., Shailashree, V. T. & Suresh Kumar, P.M. (2016). The Study of New National Institutional Ranking System using ABCD Framework. International Journal of Current Research and Modern Education (IJCRME), 1(1), 389 – 402. DOI : http://doi.org/10.5281/zenodo.161077 39. Aithal, Shubhrajyotsna., & Aithal, P. S. (2016). ABCD analysis of Dye-doped Polymers for Photonic Applications. IRA-International Journal of Applied Sciences, 4(3), 358-378. DOI: http://doi.org/10. 5281/zenodo.155103. 40. Architha Aithal, and Aithal, P. S., (2017). ABCD Analysis of Task Shifting – An optimum Alternative Solution to Professional Healthcare Personnel Shortage. International Journal of Health Sciences and Pharmacy (IJHSP), 1(2), 36-51. DOI: http://dx.doi.org/10.5281/zenodo.1038975. 41. Aithal, P. S., (2017). ABCD Analysis as Research Methodology in Company Case Studies. International Journal of Management, Technology, and Social Sciences (IJMTS), 2(2), 40-54. DOI: http://dx.doi.org/10.5281/zenodo.891621. 42. Aithal, P. S. (2017). Factor Analysis based on ABCD Framework on Recently Announced New Research Indices, International Journal of Management, Technology, and Social Sciences (IJMTS), 1(1), 82-94. DOI: http://dx.doi.org/10.5281/zenodo.584105. 43. Aithal, P. S., V.T. Shailashree, P. M. Suresh Kumar, (2015). A New ABCD Technique to Analyze Business Models & Concepts, International Journal of Management, IT and Engineering (IJMIE), 5(4), 409-423, DOI : http://doi.org/10.5281/zenodo.61652. 44. Aithal, P. S. & Suresh Kumar, P. M. (2016). CCE Approach through ABCD Analysis of 'Theory A' on Organizational Performance. International Journal of Current Research and Modern Education (IJCRME), 1(2), 169-185. DOI: http://dx.doi.org/10.5281/ZENODO.164704. 45. Aithal, P. S., Shailashree V. T. & Suresh Kumar P.M. (2016). Factors & Elemental Analysis of Six Thinking Hats Technique using ABCD Framework. International Journal of Advanced Trends in Engineering and Technology (IJATET), 1(1), 85-95. DOI: http://doi.org/10.5281/zenodo.240259. 46. Varun Shenoy & Aithal, P. S., (2017). Quantitative ABCD Analysis of IEDRA Model of Placement Determination. International Journal of Case Studies in Business, IT and Education (IJCSBE), 1(2), 103-113. DOI: http://dx.doi.org/10.5281/zenodo.1133691. 47. Aithal, P.S., (2015). Comparative Study on MBA Programmes in Private & Public Universities – A case study of MBA programme plan of Srinivas University. International Journal of Management Sciences and Business Research (IJMSBR), 4(12), 106-122. DOI: http://doi.org/10.5281/zenodo. 163884. 48. Aithal P. S., and Suresh Kumar P. M., (2016). Analysis of Choice Based Credit System in Higher Education. International Journal of Engineering Research and Modern Education (IJERME), 1(1), 278-284. DOI: http://doi.org/10.5281/zenodo.161046. 49. Varun Shenoy and Aithal, P. S. (2016). Changing Approaches in Campus Placements - A new futuristic Model. International Journal of Scientific Research and Modern Education (IJSRME), 1(1), 766 – 776. DOI: http://doi.org/10.5281/zenodo.160966. 50. Aithal, P. S. & Shubhrajyotsna Aithal, (2016). A New Model for Commercialization of Nanotechnology Products and Services. International Journal of Computational Research and Development, 1(1), 84-93. DOI: http://doi.org/10.5281/zenodo.163536.