Affiliation:
1. Faculty of Automation, Computer Sciences, Electronics and Electrical Engineering, “Dunărea de Jos” University, Științei Street No. 2, 800210 Galați, Romania
Abstract
This paper provides preliminary research regarding the implementation and evaluation of a hybrid mechanism of authentication based on fingerprint recognition interconnected with RFID technology, using Arduino modules, that can be deployed in different scenarios, including secret classified networks. To improve security, increase efficiency, and enhance convenience in the process of authentication, we perform a comparative assessment between two homomorphic encryption algorithms, the Paillier partial homomorphic algorithm and the Brakerski–Gentry–Vaikuntanathan fully homomorphic encryption scheme, applied to biometric templates extracted from the device mentioned above, by analyzing factors such as a histogram analysis, mean squared error (MSE), peak signal-to-noise ratio (PSNR), the structural similarity index measure (SSIM), the number of pixel change rate (NPCR), the unified average changing intensity (UACI), the correlation coefficient, and average encryption time and dimension. From security and privacy perspectives, the present findings suggest that the designed mechanism represents a reliable and low-cost authentication alternative that can facilitate secure access to computer systems and networks and minimize the risk of unauthorized access.
Reference31 articles.
1. Lyastani, S.G., Backes, M., and Bugiel, S. (2023, May 10). A Systematic Study of the Consistency of Two-Factor Authentication, 17 October 2022. Available online: http://arxiv.org/abs/2210.09373.
2. Hybrid methods of authentication in network security;Crihan;Ann. “Dunarea De Jos“ Univ. Galati. Fascicle III Electrotech. Electron. Autom. Control Inform.,2023
3. A survey on homomorphic encryption schemes: Theory and implementation;Acar;ACM Comput. Surv.,2019
4. Blanton, M., and Gasti, P. (2011, January 12–14). Secure and efficient protocols for iris and fingerprint identification. Proceedings of the Computer Security–ESORICS 2011: 16th European Symposium on Research in Computer Security, Leuven, Belgium.
5. Homomorphic image encryption;Rana;Int. Res. J. Eng. Technol. (IRJET),2019
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献