Fingerprint Sequencing: An Authentication Mechanism that Integrates Fingerprints and a Knowledge-based Methodology to Promote Security and Usability
Received: 13 March 2024 | Revised: 31 March 2024 and 7 April 2024 | Accepted: 9 April 2024 | Online: 15 April 2024
Corresponding author: Mohammad Η. Algarni
Abstract
Biometric authentication stands at the forefront of modern security measures, offering a highly sophisticated and reliable method for identity verification. Biometrics aims to identify an individual’s identity by comparing specific characteristics against a stored template. Unlike traditional passwords or PINs, which can be forgotten, shared, or stolen, biometric authentication relies on unique biological or behavioral traits that are inherent to each individual. The current article introduces the innovative concept of multi-fingerprint sequence authentication process to verify users. In contrast to the traditional, single fingerprint methods, this multifactor technique combines the use of multiple fingerprints along with a sequence pattern for enhanced usability and security. Furthermore, this study presents a comprehensive evaluation of an innovative authentication system utilizing a multiple fingerprint sequence pattern as an alternative to biometric usernames and textual passwords, named BioPass. By leveraging an established framework, the research focuses on assessing the proposed system's usability and security aspects, as well as its potential benefits.
Keywords:
authentication, biometrics, security, usability, privacy, multi fingerprints, fingerprint sequencingDownloads
References
S. Muramoto, T. P. Forbes, A. C. van Asten, and G. Gillen, "Test Sample for the Spatially Resolved Quantification of Illicit Drugs on Fingerprints Using Imaging Mass Spectrometry," Analytical Chemistry, vol. 87, no. 10, pp. 5444–5450, May 2015.
S. Zaman et al., "Security Threats and Artificial Intelligence Based Countermeasures for Internet of Things Networks: A Comprehensive Survey," IEEE Access, vol. 9, pp. 94668–94690, Jun. 2021.
L. O’Gorman, "Comparing passwords, tokens, and biometrics for user authentication," Proceedings of the IEEE, vol. 91, no. 12, pp. 2021–2040, Sep. 2003.
B. Ammour, T. Bouden, and L. Boubchir, "Face–iris multi-modal biometric system using multi-resolution Log-Gabor filter with spectral regression kernel discriminant analysis," IET Biometrics, vol. 7, no. 5, pp. 482–489, 2018.
A. K. Jain, P. Flynn, and A. A. Ross, Eds., Handbook of Biometrics. New York, NY, USA: Springer, 2007.
S. Liu and M. Silverman, "A practical guide to biometric security technology," IT Professional, vol. 3, no. 1, pp. 27–32, Jan. 2001.
P. V. L. Suvarchala and S. S. Kumar, "Feature Set Fusion for Spoof Iris Detection," Engineering, Technology & Applied Science Research, vol. 8, no. 2, pp. 2859–2863, Apr. 2018.
L. Lai, S.-W. Ho, and H. V. Poor, "Privacy–Security Trade-Offs in Biometric Security Systems—Part II: Multiple Use Case," IEEE Transactions on Information Forensics and Security, vol. 6, no. 1, pp. 140–151, Dec. 2010.
A. K. Jain and A. Kumar, "Biometric Recognition: An Overview," in Second Generation Biometrics: The Ethical, Legal and Social Context, E. Mordini and D. Tzovaras, Eds. Dordrecht, The Netherlands: Springer Netherlands, 2012, pp. 49–79.
A. Ometov, S. Bezzateev, N. Mäkitalo, S. Andreev, T. Mikkonen, and Y. Koucheryavy, "Multi-Factor Authentication: A Survey," Cryptography, vol. 2, no. 1, Mar. 2018, Art. no. 1.
N. A. R. Negri, G. M. R. Borille, and V. A. Falcão, "Acceptance of biometric technology in airport check-in," Journal of Air Transport Management, vol. 81, Oct. 2019, Art. no. 101720.
C. Unal and V. Tecim, "The Use of Biometric Technology for Effective Personnel Management System in Organization," KnE Social Sciences, pp. 221–232, Nov. 2018.
H. Swofford, C. Champod, A. Koertner, H. Eldridge, and M. Salyards, "A method for measuring the quality of friction skin impression evidence: Method development and validation," Forensic Science International, vol. 320, Mar. 2021, Art. no. 110703.
V. M. Praseetha, S. Bayezeed, and S. Vadivel, "Secure Fingerprint Authentication Using Deep Learning and Minutiae Verification," Journal of Intelligent Systems, vol. 29, no. 1, pp. 1379–1387, Jan. 2020.
A. Jain, L. Hong, and S. Pankanti, "Biometric identification," Communications of the ACM, vol. 43, no. 2, pp. 90–98, Oct. 2000.
J. Bonneau, C. Herley, P. C. van Oorschot, and F. Stajano, "The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes," in 2012 IEEE Symposium on Security and Privacy, San Francisco, CA, USA, May 2012, pp. 553–567.
D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition, 2nd ed. London, UK: Springer, 2009.
E. Marasco and M. Albanese, "FingerPIN: An Authentication Mechanism Integrating Fingerprints and Personal Identification Numbers," in Computer Vision and Image Processing, vol. 1376, S. K. Singh, P. Roy, B. Raman, and P. Nagabhushan, Eds. Singapore: Springer Singapore, 2021, pp. 500–511.
A. Q. M. S. U. Pathan, A. Chakraborty, M. Kabir, and K. Thakur, "Fingerprint Authentication Security: An Improved 2-Step Authentication Method with Flexibility," International Journal of Scientific and Engineering Research, vol. 10, no. 1, pp. 438–442, Jan. 2019.
B. E. Sabir, M. Youssfi, O. Bouattane, and H. Allali, "Towards a New Model to Secure IoT-based Smart Home Mobile Agents using Blockchain Technology," Engineering, Technology & Applied Science Research, vol. 10, no. 2, pp. 5441–5447, Apr. 2020.
M. Algarni, "An Extra Security Measurement for Android Mobile Applications Using the Fingerprint Authentication Methodology," Journal of Information Security and Cybercrimes Research, vol. 6, no. 2, pp. 139–149, Dec. 2023.
D. Virmani, P. Girdhar, P. Jain, and P. Bamdev, "FDREnet: Face Detection and Recognition Pipeline," Engineering, Technology & Applied Science Research, vol. 9, no. 2, pp. 3933–3938, Apr. 2019.
Downloads
How to Cite
License
Copyright (c) 2024 Mohammad Algarni
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.