PalmHashing: A novel approach for dual-factor authentication
Many systems require a reliable personal authentication infrastructure to recognise the identity of a claimant before granting access to him/her. Conventional secure measures include the possession of an identity card or special knowledge like password and personal identification numbers (PINs). The...
| Main Authors: | , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Springer-Verlag
2004
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/2418/ http://shdl.mmu.edu.my/2418/1/1690.pdf |
| _version_ | 1848790050603532288 |
|---|---|
| author | Tee, Connie Teoh, Andrew Beng Jin Goh, Michael Kah Ong Ngo, David Chek Ling |
| author_facet | Tee, Connie Teoh, Andrew Beng Jin Goh, Michael Kah Ong Ngo, David Chek Ling |
| author_sort | Tee, Connie |
| building | MMU Institutional Repository |
| collection | Online Access |
| description | Many systems require a reliable personal authentication infrastructure to recognise the identity of a claimant before granting access to him/her. Conventional secure measures include the possession of an identity card or special knowledge like password and personal identification numbers (PINs). These methods are insecure as they can be lost, forgotten and potentially be shared among a group of co-workers for a long time without change. The fact that biometric authentication is convenient and non-refutable makes it a popular approach for a personal identification system. Nevertheless, biometric methods suffer from some inherent limitations and security threats. A more practical approach is to combine two-factor or more authenticators to achieve a higher level of security. This paper proposes a novel dual-factor authenticator based on the iterated inner product between tokenised pseudorandom numbers and user-specific palmprint features. This process generates a set of user-specific compact code called PalmHash, which is highly tolerant of data offset. There is no deterministic way to get the users-specific code without having both PalmHash and the user palmprint feature. This offers strong protection against biometric fabrication. Furthermore, the proposed PalmHashing technique is able to produce zero equal error rate (EER) and yields clean separation of the genuine and imposter populations. Hence, the false acceptance rate (FAR) can be eliminated without suffering from the increased occurrence of the false rejection rate (FRR). |
| first_indexed | 2025-11-14T18:06:27Z |
| format | Article |
| id | mmu-2418 |
| institution | Multimedia University |
| institution_category | Local University |
| language | English |
| last_indexed | 2025-11-14T18:06:27Z |
| publishDate | 2004 |
| publisher | Springer-Verlag |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | mmu-24182022-12-08T05:30:17Z http://shdl.mmu.edu.my/2418/ PalmHashing: A novel approach for dual-factor authentication Tee, Connie Teoh, Andrew Beng Jin Goh, Michael Kah Ong Ngo, David Chek Ling QA75.5-76.95 Electronic computers. Computer science Many systems require a reliable personal authentication infrastructure to recognise the identity of a claimant before granting access to him/her. Conventional secure measures include the possession of an identity card or special knowledge like password and personal identification numbers (PINs). These methods are insecure as they can be lost, forgotten and potentially be shared among a group of co-workers for a long time without change. The fact that biometric authentication is convenient and non-refutable makes it a popular approach for a personal identification system. Nevertheless, biometric methods suffer from some inherent limitations and security threats. A more practical approach is to combine two-factor or more authenticators to achieve a higher level of security. This paper proposes a novel dual-factor authenticator based on the iterated inner product between tokenised pseudorandom numbers and user-specific palmprint features. This process generates a set of user-specific compact code called PalmHash, which is highly tolerant of data offset. There is no deterministic way to get the users-specific code without having both PalmHash and the user palmprint feature. This offers strong protection against biometric fabrication. Furthermore, the proposed PalmHashing technique is able to produce zero equal error rate (EER) and yields clean separation of the genuine and imposter populations. Hence, the false acceptance rate (FAR) can be eliminated without suffering from the increased occurrence of the false rejection rate (FRR). Springer-Verlag 2004-12 Article NonPeerReviewed application/pdf en http://shdl.mmu.edu.my/2418/1/1690.pdf Tee, Connie and Teoh, Andrew Beng Jin and Goh, Michael Kah Ong and Ngo, David Chek Ling (2004) PalmHashing: A novel approach for dual-factor authentication. Pattern Analysis & Applications, 7 (3). pp. 255-268. ISSN 1433-7541 http://dx.doi.org/10.1007/BF02683992 doi:10.1007/BF02683992 doi:10.1007/BF02683992 |
| spellingShingle | QA75.5-76.95 Electronic computers. Computer science Tee, Connie Teoh, Andrew Beng Jin Goh, Michael Kah Ong Ngo, David Chek Ling PalmHashing: A novel approach for dual-factor authentication |
| title | PalmHashing: A novel approach for dual-factor authentication |
| title_full | PalmHashing: A novel approach for dual-factor authentication |
| title_fullStr | PalmHashing: A novel approach for dual-factor authentication |
| title_full_unstemmed | PalmHashing: A novel approach for dual-factor authentication |
| title_short | PalmHashing: A novel approach for dual-factor authentication |
| title_sort | palmhashing: a novel approach for dual-factor authentication |
| topic | QA75.5-76.95 Electronic computers. Computer science |
| url | http://shdl.mmu.edu.my/2418/ http://shdl.mmu.edu.my/2418/ http://shdl.mmu.edu.my/2418/ http://shdl.mmu.edu.my/2418/1/1690.pdf |