PalmHashing: A novel approach for dual-factor authentication

Many systems require a reliable personal authentication infrastructure to recognise the identity of a claimant before granting access to him/her. Conventional secure measures include the possession of an identity card or special knowledge like password and personal identification numbers (PINs). The...

Full description

Bibliographic Details
Main Authors: Tee, Connie, Teoh, Andrew Beng Jin, Goh, Michael Kah Ong, Ngo, David Chek Ling
Format: Article
Language:English
Published: Springer-Verlag 2004
Subjects:
Online Access:http://shdl.mmu.edu.my/2418/
http://shdl.mmu.edu.my/2418/1/1690.pdf
_version_ 1848790050603532288
author Tee, Connie
Teoh, Andrew Beng Jin
Goh, Michael Kah Ong
Ngo, David Chek Ling
author_facet Tee, Connie
Teoh, Andrew Beng Jin
Goh, Michael Kah Ong
Ngo, David Chek Ling
author_sort Tee, Connie
building MMU Institutional Repository
collection Online Access
description Many systems require a reliable personal authentication infrastructure to recognise the identity of a claimant before granting access to him/her. Conventional secure measures include the possession of an identity card or special knowledge like password and personal identification numbers (PINs). These methods are insecure as they can be lost, forgotten and potentially be shared among a group of co-workers for a long time without change. The fact that biometric authentication is convenient and non-refutable makes it a popular approach for a personal identification system. Nevertheless, biometric methods suffer from some inherent limitations and security threats. A more practical approach is to combine two-factor or more authenticators to achieve a higher level of security. This paper proposes a novel dual-factor authenticator based on the iterated inner product between tokenised pseudorandom numbers and user-specific palmprint features. This process generates a set of user-specific compact code called PalmHash, which is highly tolerant of data offset. There is no deterministic way to get the users-specific code without having both PalmHash and the user palmprint feature. This offers strong protection against biometric fabrication. Furthermore, the proposed PalmHashing technique is able to produce zero equal error rate (EER) and yields clean separation of the genuine and imposter populations. Hence, the false acceptance rate (FAR) can be eliminated without suffering from the increased occurrence of the false rejection rate (FRR).
first_indexed 2025-11-14T18:06:27Z
format Article
id mmu-2418
institution Multimedia University
institution_category Local University
language English
last_indexed 2025-11-14T18:06:27Z
publishDate 2004
publisher Springer-Verlag
recordtype eprints
repository_type Digital Repository
spelling mmu-24182022-12-08T05:30:17Z http://shdl.mmu.edu.my/2418/ PalmHashing: A novel approach for dual-factor authentication Tee, Connie Teoh, Andrew Beng Jin Goh, Michael Kah Ong Ngo, David Chek Ling QA75.5-76.95 Electronic computers. Computer science Many systems require a reliable personal authentication infrastructure to recognise the identity of a claimant before granting access to him/her. Conventional secure measures include the possession of an identity card or special knowledge like password and personal identification numbers (PINs). These methods are insecure as they can be lost, forgotten and potentially be shared among a group of co-workers for a long time without change. The fact that biometric authentication is convenient and non-refutable makes it a popular approach for a personal identification system. Nevertheless, biometric methods suffer from some inherent limitations and security threats. A more practical approach is to combine two-factor or more authenticators to achieve a higher level of security. This paper proposes a novel dual-factor authenticator based on the iterated inner product between tokenised pseudorandom numbers and user-specific palmprint features. This process generates a set of user-specific compact code called PalmHash, which is highly tolerant of data offset. There is no deterministic way to get the users-specific code without having both PalmHash and the user palmprint feature. This offers strong protection against biometric fabrication. Furthermore, the proposed PalmHashing technique is able to produce zero equal error rate (EER) and yields clean separation of the genuine and imposter populations. Hence, the false acceptance rate (FAR) can be eliminated without suffering from the increased occurrence of the false rejection rate (FRR). Springer-Verlag 2004-12 Article NonPeerReviewed application/pdf en http://shdl.mmu.edu.my/2418/1/1690.pdf Tee, Connie and Teoh, Andrew Beng Jin and Goh, Michael Kah Ong and Ngo, David Chek Ling (2004) PalmHashing: A novel approach for dual-factor authentication. Pattern Analysis & Applications, 7 (3). pp. 255-268. ISSN 1433-7541 http://dx.doi.org/10.1007/BF02683992 doi:10.1007/BF02683992 doi:10.1007/BF02683992
spellingShingle QA75.5-76.95 Electronic computers. Computer science
Tee, Connie
Teoh, Andrew Beng Jin
Goh, Michael Kah Ong
Ngo, David Chek Ling
PalmHashing: A novel approach for dual-factor authentication
title PalmHashing: A novel approach for dual-factor authentication
title_full PalmHashing: A novel approach for dual-factor authentication
title_fullStr PalmHashing: A novel approach for dual-factor authentication
title_full_unstemmed PalmHashing: A novel approach for dual-factor authentication
title_short PalmHashing: A novel approach for dual-factor authentication
title_sort palmhashing: a novel approach for dual-factor authentication
topic QA75.5-76.95 Electronic computers. Computer science
url http://shdl.mmu.edu.my/2418/
http://shdl.mmu.edu.my/2418/
http://shdl.mmu.edu.my/2418/
http://shdl.mmu.edu.my/2418/1/1690.pdf