THE “SECUREPHONE” - A Mobile Phone with Biometric Authentication and e-Signature Support for Dealing Secure Transactions on the Fly

R. Ricci, G. Chollet, M. V. Crispino, S. Jassim, J. Koreman, A. Morris, M. Olivar-Dimas, P. Soria-Rodríguez

Abstract

This article presents an overview of the SecurePhone project, with an account of the first results obtained. SecurePhone’s primary aim is to realise a mobile phone prototype - the “SecurePhone” - in which biometrical authentication enables users to deal secure, dependable transactions over a mobile network. The SecurePhone is based on a commercial PDA-phone, supplemented with specific software modules and a customised SIM card. It integrates in a single environment a number of advanced features: access to cryptographic keys through strong multimodal biometric authentication; appending and verification of digital signatures; real-time exchange and interactive modification of (e-signed) documents and voice recordings. SecurePhone’s “biometric recogniser” is based on original research. A fused combination of three different biometric methods - speaker, face and handwritten signature verification - is exploited, with no need for dedicated hardware components. The adoption of non-intrusive, psychologically neutral biometric techniques is expected to mitigate rejection problems that often inhibit the social use of biometrics, and speed up the spread of e-signature technology. Successful biometric authentication grants access to SecurePhone’s built-in e-signature services through a user-friendly interface. Special emphasis is accorded to the definition of a trustworthy security chain model covering all aspects of system operation.

References

  1. Allano, L., Garcia-Salicetti, S., Ly-Van, B., Morris, A.C., Koreman, J., Sellahewa, H., Jassim, S. & Dorizzi, B., 2006, “Non intrusive multi-biometrics on a mobile device: a comparison of fusion techniques”, Proc. SPIE conference on Biometric Techniques for Human Identification III, Orlando, 2006.
  2. Bella G., Bistarelli S., Martinelli F., 2003, “Biometrics to Enhance Smartcard Security (Simulating MOC using TOC)”, Proc. 11th International Workshop on Security Protocols Cambridge, England.
  3. Bredin, H., Miguel, A., Witten, I.H. & Chollet, G., 2006, “Detecting replay attacks in audiovisual identity verification”, Proc. ICASSP 2006 (in print).
  4. Collobert, R., Bengio, S. & Mariéthoz, J., 2002, “Torch: a modular machine learning software library”, Technical Report IDIAP-RR 02-46.
  5. Dolfing, J.G.A., 1998, “Handwriting recognition and verification, a Hidden Markov approach”, Ph.D. thesis, Philips Electronics N.V.
  6. Duda, O., Hart, P.E. & Stork, D.G., 2001, Pattern classification, Wiley.
  7. Garcia-Salicetti, S., Beumier, C., Chollet, G., Dorizzi, B., Leroux-Les Jardins, J., Lunter, J., Ni, Y. & PetrovskaDelacretaz, D., 2003, “BIOMET: a Multimodal Person Authentication Database Including Face, Voice, Fingerprint, Hand and Signature Modalities”, Proc. 4th Conf. on AVBPA, pp. 845-853, Guildford, UK..
  8. Koreman, J., Morris, A.C., Wu, D., Jassim, S., Sellahewa, H., Ehlers, J., Chollet, G., Aversano, G., Bredin, H. Garcia-Salicetti, S., Allano, L. Ly Van, B. & Dorizzi, B., 2006, “ multi-modal biometric authentication on the SecurePhone PDA”, Proc. MMUA, (in press).
  9. Morris, A.C., Jassim, S., Sellahewa, H., Allano, L., Ehlers, J., Wu, D., Koreman, J., Garcia-Salicetti, S., Ly-Van, B., Dorizzi, B., 2006, “Multimodal person authentication on a smartphone under realistic conditions”, Proc. SPIE conference on Mobile Multimedia/Image Processing for Military and Security Applications”, Orlando, 17-21 April, 2006.
  10. Morris, A.C., Koreman, J., Sellahewa, H., Ehlers, J, Jassim, S., Allano, L. & Garcia-Salicetti, S., 2006, “The SecurePhone PDA database, experimental protocol and automatic test procedure for multimodal user authentication”, Tech. Report, http://www.coli.unisaarland.de/SecurePhone/documents/PDA_database_a nd_test_protocol.pdf
  11. Pettersson M., Obrink Ä, 2002, “How secure is your biometric solution?”, Precise Biometrics White Paper, http://www.ibia.org
  12. Reynolds, D.A., 1995, “Speaker identification and verification using Gaussian mixture speaker models”, Speech Communication, Vol.17, pp.91-108
  13. Sellahewa, H. & Jassim, S.,“Wavelet-based Face Verification for constrained platforms”, 2005, Proc. SPIE on Biometric Technology for Human Identification II, Florida, Vol. 5779, pp 173-183.
  14. Sellahewa, H. Al-Jawad, N., Morris, A.C., Wu, D., Koreman, J. & Jassim, S., 2006, “Comparison of weighting strategies in early and late fusion approach to audio-visual person authentication”, Proc. SPIE conference on Mobile Multimedia/Image Processing for Military and Security Applications”, Orlando, 17- 21 April, 2006.
  15. Torvinen V., 2000, “Wireless PKI: fundamentals”, Radicchio white paper, http://www.radicchio.org
  16. Welch D. J., Lathrop S. D., 2003, “A Survey of 802.11a Wireless Security Threats and Security Mechanisms”, Tech. Report, ITOC-TR-2003-101, http://www.itoc.usma.edu/Documents/ITOC_TR2003-101_(G6).pdf
Download


Paper Citation


in Harvard Style

Ricci R., Chollet G., V. Crispino M., Jassim S., Koreman J., Morris A., Olivar-Dimas M. and Soria-Rodríguez P. (2006). THE “SECUREPHONE” - A Mobile Phone with Biometric Authentication and e-Signature Support for Dealing Secure Transactions on the Fly . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006) ISBN 978-972-8865-63-4, pages 9-16. DOI: 10.5220/0002103900090016


in Bibtex Style

@conference{secrypt06,
author={R. Ricci and G. Chollet and M. V. Crispino and S. Jassim and J. Koreman and A. Morris and M. Olivar-Dimas and P. Soria-Rodríguez},
title={THE “SECUREPHONE” - A Mobile Phone with Biometric Authentication and e-Signature Support for Dealing Secure Transactions on the Fly},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006)},
year={2006},
pages={9-16},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002103900090016},
isbn={978-972-8865-63-4},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006)
TI - THE “SECUREPHONE” - A Mobile Phone with Biometric Authentication and e-Signature Support for Dealing Secure Transactions on the Fly
SN - 978-972-8865-63-4
AU - Ricci R.
AU - Chollet G.
AU - V. Crispino M.
AU - Jassim S.
AU - Koreman J.
AU - Morris A.
AU - Olivar-Dimas M.
AU - Soria-Rodríguez P.
PY - 2006
SP - 9
EP - 16
DO - 10.5220/0002103900090016