The Community for Technology Leaders
RSS Icon
Issue No.08 - August (2008 vol.20)
pp: 1091-1096
For homeland and national security, the deployment of multi-modal biometrics is desirable with e-passports, but is hindered by privacy infringement and high cost implementation. We propose an authentication methodology which combines multi-modal biometrics and cryptographic mechanisms for border control applications. Specifically, we accommodate face and fingerprint without a mandatory requirement of (tamper-resistant) smart-card-level devices. We could imprint a (publicly readable) bar codes on the passport with regard to easier world-wide deployment. Additionally, we present a solution based on certification and key management method to control the validity of passports within the current PKI technology paradigm.
Security and Privacy Protection, Authentication, Verification
Taekyoung Kwon, Hyeonjoon Moon, "Biometric Authentication for Border Control Applications", IEEE Transactions on Knowledge & Data Engineering, vol.20, no. 8, pp. 1091-1096, August 2008, doi:10.1109/TKDE.2007.190716
[1] K. Etemad and R. Chellappa, “Discriminant Analysis for Recognition of Human Face Images,” J. Optical Soc. of America A, pp. 1724-1733, 1997.
[2] D. Maio, D. Maltoni, R. Cappelli, J. Wayman, and A. Jain, “FVC2002: Second Fingerprint Verification Competition,” Proc. 16th Int'l Conf. Pattern Recognition (ICPR '02), vol. 3, pp. 811-814, , 2002.
[3] ICAO, Machine Readable Travel Documents Home Page, /, Mar. 2007.
[4] ICAO, PKI for Machine Readable Travel Documents Offering ICC Read-Only Access, version 1.1, ICAO MRTD, 2004.
[5] ICAO, Biometrics Deployment of Machine Readable Travel Documents, version2.0, ICAO MRTD, 2004.
[6] ICAO, Development of a Logical Data Structure—LDS for Optional Capacity Expansion Technologies, version 1.7, ICAO MRTD, 2004.
[7] ICAO, Issues of the ICAO Public Key Directory (PKD), ICAO MRTD, Apr. 2006.
[8] B. Jacobs, Biometry in Passports, passportindex.html, Nov. 2006.
[9] A. Juels, D. Molnar, and D. Wagner, “Security and Privacy Issues in E-passports,” Proc. First Int'l Conf. Security and Privacy for Emerging Areas in Comm. Networks (SECURECOMM '05), Sept. 2005.
[10] T. Kwon and H. Moon, “Multi-Modal Biometrics with PKI Technologies for Border Control Applications,” Proc. IEEE Int'l Conf. Intelligence and Security Informatics (ISI '05), pp. 99-114, 2005.
[11] H. Moon, “Performance Evaluation Methodology for Face Recognition Algorithms,” PhD dissertation, Dept. of Computer Science and Eng., State Univ. of New York, Buffalo, 1999.
[12] P. Phillips, H. Moon, S. Rizvi, and P. Rauss, “The FERET Evaluation Methodology for Face-Recognition Algorithms,” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 22, pp. 1090-1104, 2000.
[13] R. Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” Comm. ACM, vol. 21, pp. 120-126, 1978.
[14] C. Soutar, D. Roberge, A. Stoianov, R. Golroy, and B. Vijaya Kumar, “Biometric Encryption,” ICSA Guide to Cryptography. McGraw-Hill, 1999.
[15] M. Turk and A. Pentland, “Eigenfaces for Recognition,” J.Cognitive Neuroscience, vol. 3, no. 1, pp. 71-86, 1991.
[16] US DoS, USVISIT, http://fpc.state.gov20738.htm, May 2003.
33 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool