International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 11 - Issue 11 |
Published: December 2010 |
Authors: P.Tamil Selvi, N.Radha |
![]() |
P.Tamil Selvi, N.Radha . Article:Palmprint and Iris based Authentication and Secure Key Exchange against Dictionary Attacks. International Journal of Computer Applications. 11, 11 (December 2010), 7-12. DOI=10.5120/1629-2190
@article{ 10.5120/1629-2190, author = { P.Tamil Selvi,N.Radha }, title = { Article:Palmprint and Iris based Authentication and Secure Key Exchange against Dictionary Attacks }, journal = { International Journal of Computer Applications }, year = { 2010 }, volume = { 11 }, number = { 11 }, pages = { 7-12 }, doi = { 10.5120/1629-2190 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2010 %A P.Tamil Selvi %A N.Radha %T Article:Palmprint and Iris based Authentication and Secure Key Exchange against Dictionary Attacks%T %J International Journal of Computer Applications %V 11 %N 11 %P 7-12 %R 10.5120/1629-2190 %I Foundation of Computer Science (FCS), NY, USA
The Multimodal Biometric based user authentication systems are highly secured and efficient to use and place total trust on the authentication server where biometric verification data are stored in a central database. Such systems are prone to dictionary attacks initiated at the server side. In this paper, we propose an efficient approach based on multimodal biometrics (Palmprint and Iris) based user authentication and key exchange system. In this system, texture properties are extracted from the palmprint and iris images are stored as encrypted binary template in the server’s database, to overcome the dictionary attacks mounted by the server. The image processing techniques are used to extract a biometric measurement from the palmprint and iris. During login procedure the mutual authentication is done between the server and user and a symmetric key is generated on both sides, which could be used for further secure communication between them. Thus meet-in-the middle attack that happens between the user and the server can also be overcome. This system can be directly applied to strengthen existing password or biometric based systems without requiring additional computation.