Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

A keyless multimodal-based user authentication scheme using generative adversarial networks

View through CrossRef
Biometrics are increasingly used for access control, fraud detection, and authentication systems. Nevertheless, attackers can deceive such systems using forged biometrics. This research proposes a novel method that makes biometric security systems more resilient to such attacks. The proposed method transforms the user’s biometric data into an irreversible code to protect the original data. This code combines data from multiple biometric modalities, making fabricating a false biometric harder. Additionally, the proposed method does not depend on any secret keys, which helps avoid cases of stolen tokens. The proposed method utilizes the generative adversarial network (GAN) to generate synthetic biometric templates from multiple modalities, which is considered a transformation function for biometric data. Three fusion levels are presented; features from multiple biometric modalities are extracted first in each fusion level. Subsequently, the features train a generative adversarial network to produce synthesized biometric templates. These synthesized templates serve as secure substitutes for the original biometrics during authentication, preventing direct exposure of raw biometric data. We evaluated our methods on the CASIA-V3-Internal and MMU1 iris datasets and the AT&T (ORL) and FERET face datasets. The results showed that our proposed methods can achieve higher accuracy, usability, and improved security compared to a single biometric modality. The proposed feature-level, GAN-based, and decision-level fusion schemes achieved 2.03%, 0.82%, and 0.0297% error rates, respectively, for CASIA and ORL datasets and 1.53%, 0.80%, and 0.0313% error rates, respectively, for MMU1 and FERET datasets. Moreover, we have demonstrated that our method resists pre-image and correlation attacks.
Title: A keyless multimodal-based user authentication scheme using generative adversarial networks
Description:
Biometrics are increasingly used for access control, fraud detection, and authentication systems.
Nevertheless, attackers can deceive such systems using forged biometrics.
This research proposes a novel method that makes biometric security systems more resilient to such attacks.
The proposed method transforms the user’s biometric data into an irreversible code to protect the original data.
This code combines data from multiple biometric modalities, making fabricating a false biometric harder.
Additionally, the proposed method does not depend on any secret keys, which helps avoid cases of stolen tokens.
The proposed method utilizes the generative adversarial network (GAN) to generate synthetic biometric templates from multiple modalities, which is considered a transformation function for biometric data.
Three fusion levels are presented; features from multiple biometric modalities are extracted first in each fusion level.
Subsequently, the features train a generative adversarial network to produce synthesized biometric templates.
These synthesized templates serve as secure substitutes for the original biometrics during authentication, preventing direct exposure of raw biometric data.
We evaluated our methods on the CASIA-V3-Internal and MMU1 iris datasets and the AT&T (ORL) and FERET face datasets.
The results showed that our proposed methods can achieve higher accuracy, usability, and improved security compared to a single biometric modality.
The proposed feature-level, GAN-based, and decision-level fusion schemes achieved 2.
03%, 0.
82%, and 0.
0297% error rates, respectively, for CASIA and ORL datasets and 1.
53%, 0.
80%, and 0.
0313% error rates, respectively, for MMU1 and FERET datasets.
Moreover, we have demonstrated that our method resists pre-image and correlation attacks.

Related Results

Multimodal Emotion Recognition and Human Computer Interaction for AI-Driven Mental Health Support (Preprint)
Multimodal Emotion Recognition and Human Computer Interaction for AI-Driven Mental Health Support (Preprint)
BACKGROUND Mental health has become one of the most urgent global health issues of the twenty-first century. The World Health Organization (WHO) reports tha...
A KCP-DCNN-Based Two-Step Verification Multimodal Biometric Authentication System featuring QR Code Fabrication
A KCP-DCNN-Based Two-Step Verification Multimodal Biometric Authentication System featuring QR Code Fabrication
Abstract Starting with for, need change Enhanced authentication performance, the concept of multi-biometrics authentication systems has emerged as a promising solution in t...
Attribute-based multiuser authentication scheme between IoT devices for 5G environment
Attribute-based multiuser authentication scheme between IoT devices for 5G environment
Background/Objectives: Due to the development of mobile communication technology, infrastructure construction from 4G to 5G service, which is currently being serviced, is actively ...
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
Vehicular Ad Hoc Network (VANET) is a wireless Mobile Ad Hoc Network that is used for communication between vehicles, vehicles and fixed access points, and vehicles and pedestrians...
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
Abstract In some situations, the transfer of authentication authority is necessary for user authentication. In traditional authentication, a trust mechanism based on a trus...
ProDef-MDS: A Proactive Defense Mechanism Protecting Malware Detection Systems from Adversarial Attacks
ProDef-MDS: A Proactive Defense Mechanism Protecting Malware Detection Systems from Adversarial Attacks
Malware threatens cybersecurity by enabling data theft, unauthorized access, and extortion. Traditional malware detection systems (MDS) struggle with the increasing volume and comp...
Role of Authentication Factors in Fin-Tech Mobile Transaction Security
Role of Authentication Factors in Fin-Tech Mobile Transaction Security
Abstract Fin-Tech is the merging of finance and technology to be considered a key term for technology-based financial operations and money transactions as far as Fin-Tech i...
EVALUATING USER AUTHENTICATION PROTOCOLS AND SECURITY ALGORITHMS FOR NETWORKS
EVALUATING USER AUTHENTICATION PROTOCOLS AND SECURITY ALGORITHMS FOR NETWORKS
This paper addresses the want for evaluating consumer authentication protocols and protection algorithms for networks. Specially, this paper specializes in the effectiveness and sa...

Back to Top