On-Line Fingerprint Verification
IEEE Transactions on Pattern Analysis and Machine Intelligence
Enhancing security and privacy in biometrics-based authentication systems
IBM Systems Journal - End-to-end security
Security for Mobile Networks and Platforms (Artech House Universal Personal Communications)
Security for Mobile Networks and Platforms (Artech House Universal Personal Communications)
Mobile Phones Security Using Biometrics
ICCIMA '07 Proceedings of the International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007) - Volume 04
Digital Watermarking and Steganography
Digital Watermarking and Steganography
A secure digital camera based fingerprint verification system
Journal of Visual Communication and Image Representation
New Families of 2D & 3D Arrays for Sub-image Watermarking
NSS '10 Proceedings of the 2010 Fourth International Conference on Network and System Security
A study of touchless fingerprint recognition system
SSPR'06/SPR'06 Proceedings of the 2006 joint IAPR international conference on Structural, Syntactic, and Statistical Pattern Recognition
Preprocessing of a fingerprint image captured with a mobile camera
ICB'06 Proceedings of the 2006 international conference on Advances in Biometrics
A fingerprint authentication system based on mobile phone
AVBPA'05 Proceedings of the 5th international conference on Audio- and Video-Based Biometric Person Authentication
Design and implementation of mobile trusted module for trusted mobile computing
IEEE Transactions on Consumer Electronics
Hi-index | 0.00 |
Mobile commerce (m-commerce) delivers value-added services to customers and creates new market opportunities. However, establishing a secure m-commerce platform that offers high level of service can be challenging. This paper proposes a concept of m-identity targeted at control the access of involved parties in an m-commerce transaction. M-identity includes both identities of a user and his/her bound mobile device which is defined as a user's biometric feature(s) taken by his/her bound mobile camera. As an additional factor of authentication, a watermark is embedded in the captured biometric images. The embedding key of the watermark is a shared secret between mobile device and central server. Then an m-identity authentication (MA) protocol is proposed. M-identity merges mobile device identity into biometrics images. Only the genuine owner whose biometric information captured by his/her bound mobile device can pass m-identity authentication. Combined with the watermark, this makes a 2 ½ factor authentication process. Fingerprint biometrics taken with the mobile camera is used as an example to show how MA protocol works.