Systems and Means of Informatics
2018, Volume 28, Issue 1, pp 156-176
USING THE FUZZY VAULT TO CORRECT INACCURACIES IN AUTHENTICATION DATA
- D. E. Gordienko
- Yu. V. Kosolapov
- A. S. Mishko
Abstract
In a number of authentication methods, there are inaccuracies due to the impossibility or complexity of reproducing the authentication data exactly coinciding with the data specified by the user during initial registration in the information system. Such methods include, in particular, biometric methods as well as some methods based on graphic passwords. The paper explores the possibility of using the fuzzy vault scheme to correct such inaccuracies and provide high resistance to the selection of authentication data in a keyboard authentication system and in a graphical password authentication system.
[+] References (18)
- Lal, N. A., S. Prasad, and M. Farik. 2016. A review of authentication methods. Int. J. Sci. Technology Res. 5(11):246-249.
- Syed Idrus, S.Z., E. Cherrier, C. Rosenberger, and J.-J. Schwartzmann. 2013. A review of authentication methods. Aust. J. Basic Appl. Sci. 7(5):95-107.
- Ur-Rehman, O., and N. Zivic. 2013. Fuzzy authentication algorithm with applications to error localization and correction of images. WSEAS Trans. Syst. 12(7):371-383.
- Olson, G. M., and J. S. Olson. 2003. Human-computer interaction: Psychological aspects of the human use of computing. Annu. Rev. Psychol. 54:491-516.
- Angeli, A.D., L. Coventry, G. Johnsona, and K. Renaud. 2006. Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems. Int. J. Hum.-Comput. St. 63:128-152. doi: 10.1016/j.ijhcs.2005.04.020.
- Gao, H. 2010. A new graphical password scheme resistant to shoulder-surfing. Con-ference (International) on Cyberworlds. Singapore: IEEE. 94-199. doi: 10.1109/ CW.2010.34.
- Rittenhouse, R. G., J. A. Chaudry, and M. Lee. 2013. Security in graphical authenti-cation. Int. J. Security Appl. 7(3):347-356.
- Juels, A., and M. Sudan. 2006. A fuzzy vault scheme. Design. Code. Cryptogr. 38(2):237-257. doi: 10.1007/s10623-005-6343-z.
- Boyarinov, I.M., A. A. Davydov, E. M. Mamedli, and Yu.B. Smerkis. 1983. Is- pol'zovanie pomekhoustoychivogo kodirovania dlya zashchity informatsii ot oshibok operatora [Use of noise-tolerant encoding for protection of data from operator error]. Automat. Rem. Contr. 2:5-49.
- Hoang, T., and D. Choi. 2014. Secure and privacy enhanced gait authentication on smart phone. Sci. World J. Vol. 2014. Article ID 438254. 8 p. doi: 10.1155/2014/438254. Available at: https://www.hindawi.com/journals/tswj/2014/ 438254/ Accessed May 11, 2017).
- Juels, A., and M. Wattenberg. 1999. Fuzzy commitment scheme. 6th ACM Conference on Computer and Communications Security Proceedings. 28-36. doi: 10.1145/319709.319714.
- Uludag, U., S. Pankanti, and A. K. Jain. 2005. Fuzzy vault for fingerprints. Audio- and video-based biometric person authentication. Eds. T. Kanade, A. K. Jain, and N. K. Ratha. Lecture notes in computer science ser. Springer. 3546:310-319. doi: 10.1007/11527923-32.
- Bryukhomitsky, Yu. A. 2009. Statisticheskie metody raspoznavaniya klaviaturnogo pocherka [Statistical methods of keystroke dynamics ecognition]. Izvestiya Yuzhnogo federal'nogo universiteta [Bull. SFedU] 11 (100): 13-147.
- Khitsenko, V.E., and D. S. Krutohvostov. 2014. Increasing the reliability of au-thentication keyboard handwriting. 12th Conference (International) on Actual Prob-lems of Electronics Instrument Engineering Proceedings. 262-265. doi: 10.1109/ APEIE.2014.7040894.
- Akhmetov, B.S., A.I. Ivanov, T. S. Kartbaev, A.U. Malygin, and K. Mukapil. 2013. Biometric dynamic personality authentication in open information space. Int. J. Computer Technology Appl. 4(5):846-855.
- Basic Key Logger. Available at: https://sites.google.com/site/basiclabbook/ keyloggerbasiclabbook/ Accessed May 17, 2017).
- Statzilla. Statistika onlayn [Statistics online]. Available at: https://online.statzilla.ru Accessed May 13, 2017).
- Grassi, P. A., M.E. Garcia, and J.L. Fenton. 2017. Digital identity guidelines. NIST Special Publication 800-63-3. Available at: https://pages.nist.gov/800-63-3/ sp800-63-3.html Accessed May 11, 2017).
[+] About this article
Title
USING THE FUZZY VAULT TO CORRECT INACCURACIES IN AUTHENTICATION DATA
Journal
Systems and Means of Informatics
Volume 28, Issue 1, pp 156-176
Cover Date
2018-03-30
DOI
10.14357/08696527180112
Print ISSN
0869-6527
Publisher
Institute of Informatics Problems, Russian Academy of Sciences
Additional Links
Key words
fuzzy vault; authentication; keyboard handwriting; graphic password
Authors
D. E. Gordienko , Yu. V. Kosolapov , and A. S. Mishko
Author Affiliations
Institute of Mathematics, Mechanics, and Computer Science named after I.I. Vorovich, Southern Federal University, 105/42 Bol'shaya Sadovaya Str., Rostov-on-Don 344006, Russian Federation
|