Remote user authentication for Internet of Things (IoT) devices is critical to IoT security, as it helps prevent unauthorized access to IoT networks. Biometrics is an appealing authentication technique due to its advantages over traditional password-based authentication. However, the protection of biometric data itself is also important, as original biometric data cannot be replaced or reissued if compromised. In this paper, we propose a cancelable iris- and steganography-based user authentication system to provide user authentication and secure the original iris data. Most of the existing cancelable iris biometric systems need a user-specific key to guide feature transformation, e.g., permutation or random projection, which is also known as key-dependent transformation. One issue associated with key-dependent transformations is that if the user-specific key is compromised, some useful information can be leaked and exploited by adversaries to restore the original iris feature data. To mitigate this risk, the proposed scheme enhances system security by integrating an effective information-hiding technique-steganography. By concealing the user-specific key, the threat of key exposure-related attacks, e.g., attacks via record multiplicity, can be defused, thus heightening the overall system security and complementing the protection offered by cancelable biometric techniques.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC6651016PMC
http://dx.doi.org/10.3390/s19132985DOI Listing

Publication Analysis

Top Keywords

user authentication
16
user-specific key
12
cancelable iris-
8
iris- steganography-based
8
steganography-based user
8
authentication system
8
internet things
8
biometric data
8
original iris
8
system security
8

Similar Publications

Demand for user authentication in virtual reality (VR) applications is increasing such as in-app payments, password manager, and access to private data. Traditionally, hand controllers have been widely used for the user authentication in VR environment, with which the users can typewrite a password or draw a pre-registered pattern; however, the conventional approaches are generally inconvenient and time-consuming. In this study, we proposed a new user authentication method based on eye-writing patterns identified using electrooculogram (EOG) recorded from four locations around the eyes in contact with the face-pad of a VR headset.

View Article and Find Full Text PDF

This study presents a blockchain-based traceability system designed specifically for the olive oil supply chain, addressing key challenges in transparency, quality assurance, and fraud prevention. The system integrates Internet of Things (IoT) technology with a decentralized blockchain framework to provide real-time monitoring of critical quality metrics. A practical web application, linked to the Ethereum blockchain, enables stakeholders to track each stage of the supply chain via tamper-proof records.

View Article and Find Full Text PDF

The 5G-AKA protocol, a foundational component for 5G network authentication, has been found vulnerable to various security threats, including linkability attacks that compromise user privacy. To address these vulnerabilities, we previously proposed the 5G-AKA-Forward Secrecy (5G-AKA-FS) protocol, which introduces an ephemeral key pair within the home network (HN) to support forward secrecy and prevent linkability attacks. However, a re-evaluation uncovered minor errors in the initial BAN-logic verification and highlighted the need for more rigorous security validation using formal methods.

View Article and Find Full Text PDF

With recent significant advancements in artificial intelligence, the necessity for more reliable recognition systems has rapidly increased to safeguard individual assets. The use of brain signals for authentication has gained substantial interest within the scientific community over the past decade. Most previous efforts have focused on identifying distinctive information within electroencephalogram (EEG) recordings.

View Article and Find Full Text PDF

In response to the widespread issue of fake comments on e-commerce platforms, this study aims to analyze and propose a blockchain-based solution to incentivize authentic user feedback and reduce the prevalence of fraudulent reviews. Specifically, this paper constructs a tripartite evolutionary game model between sellers, buyers, and e-commerce platforms to study the real comment mechanism of blockchain. The strategy evolution under different incentive factors is simulated using replication dynamic equation analysis and Matlab software simulation.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!