THE “SECUREPHONE” - A Mobile Phone with Biometric Authentication and e-Signature Support for Dealing Secure Transactions on the Fly
R. Ricci, G. Chollet, M. V. Crispino, S. Jassim, J. Koreman, A. Morris, M. Olivar-Dimas, P. Soria-Rodríguez
2006
Abstract
This article presents an overview of the SecurePhone project, with an account of the first results obtained. SecurePhone’s primary aim is to realise a mobile phone prototype - the “SecurePhone” - in which biometrical authentication enables users to deal secure, dependable transactions over a mobile network. The SecurePhone is based on a commercial PDA-phone, supplemented with specific software modules and a customised SIM card. It integrates in a single environment a number of advanced features: access to cryptographic keys through strong multimodal biometric authentication; appending and verification of digital signatures; real-time exchange and interactive modification of (e-signed) documents and voice recordings. SecurePhone’s “biometric recogniser” is based on original research. A fused combination of three different biometric methods - speaker, face and handwritten signature verification - is exploited, with no need for dedicated hardware components. The adoption of non-intrusive, psychologically neutral biometric techniques is expected to mitigate rejection problems that often inhibit the social use of biometrics, and speed up the spread of e-signature technology. Successful biometric authentication grants access to SecurePhone’s built-in e-signature services through a user-friendly interface. Special emphasis is accorded to the definition of a trustworthy security chain model covering all aspects of system operation.
References
- Allano, L., Garcia-Salicetti, S., Ly-Van, B., Morris, A.C., Koreman, J., Sellahewa, H., Jassim, S. & Dorizzi, B., 2006, “Non intrusive multi-biometrics on a mobile device: a comparison of fusion techniques”, Proc. SPIE conference on Biometric Techniques for Human Identification III, Orlando, 2006.
- Bella G., Bistarelli S., Martinelli F., 2003, “Biometrics to Enhance Smartcard Security (Simulating MOC using TOC)”, Proc. 11th International Workshop on Security Protocols Cambridge, England.
- Bredin, H., Miguel, A., Witten, I.H. & Chollet, G., 2006, “Detecting replay attacks in audiovisual identity verification”, Proc. ICASSP 2006 (in print).
- Collobert, R., Bengio, S. & Mariéthoz, J., 2002, “Torch: a modular machine learning software library”, Technical Report IDIAP-RR 02-46.
- Dolfing, J.G.A., 1998, “Handwriting recognition and verification, a Hidden Markov approach”, Ph.D. thesis, Philips Electronics N.V.
- Duda, O., Hart, P.E. & Stork, D.G., 2001, Pattern classification, Wiley.
- Garcia-Salicetti, S., Beumier, C., Chollet, G., Dorizzi, B., Leroux-Les Jardins, J., Lunter, J., Ni, Y. & PetrovskaDelacretaz, D., 2003, “BIOMET: a Multimodal Person Authentication Database Including Face, Voice, Fingerprint, Hand and Signature Modalities”, Proc. 4th Conf. on AVBPA, pp. 845-853, Guildford, UK..
- Koreman, J., Morris, A.C., Wu, D., Jassim, S., Sellahewa, H., Ehlers, J., Chollet, G., Aversano, G., Bredin, H. Garcia-Salicetti, S., Allano, L. Ly Van, B. & Dorizzi, B., 2006, “ multi-modal biometric authentication on the SecurePhone PDA”, Proc. MMUA, (in press).
- Morris, A.C., Jassim, S., Sellahewa, H., Allano, L., Ehlers, J., Wu, D., Koreman, J., Garcia-Salicetti, S., Ly-Van, B., Dorizzi, B., 2006, “Multimodal person authentication on a smartphone under realistic conditions”, Proc. SPIE conference on Mobile Multimedia/Image Processing for Military and Security Applications”, Orlando, 17-21 April, 2006.
- Morris, A.C., Koreman, J., Sellahewa, H., Ehlers, J, Jassim, S., Allano, L. & Garcia-Salicetti, S., 2006, “The SecurePhone PDA database, experimental protocol and automatic test procedure for multimodal user authentication”, Tech. Report, http://www.coli.unisaarland.de/SecurePhone/documents/PDA_database_a nd_test_protocol.pdf
- Pettersson M., Obrink Ä, 2002, “How secure is your biometric solution?”, Precise Biometrics White Paper, http://www.ibia.org
- Reynolds, D.A., 1995, “Speaker identification and verification using Gaussian mixture speaker models”, Speech Communication, Vol.17, pp.91-108
- Sellahewa, H. & Jassim, S.,“Wavelet-based Face Verification for constrained platforms”, 2005, Proc. SPIE on Biometric Technology for Human Identification II, Florida, Vol. 5779, pp 173-183.
- Sellahewa, H. Al-Jawad, N., Morris, A.C., Wu, D., Koreman, J. & Jassim, S., 2006, “Comparison of weighting strategies in early and late fusion approach to audio-visual person authentication”, Proc. SPIE conference on Mobile Multimedia/Image Processing for Military and Security Applications”, Orlando, 17- 21 April, 2006.
- Torvinen V., 2000, “Wireless PKI: fundamentals”, Radicchio white paper, http://www.radicchio.org
- Welch D. J., Lathrop S. D., 2003, “A Survey of 802.11a Wireless Security Threats and Security Mechanisms”, Tech. Report, ITOC-TR-2003-101, http://www.itoc.usma.edu/Documents/ITOC_TR2003-101_(G6).pdf
Paper Citation
in Harvard Style
Ricci R., Chollet G., V. Crispino M., Jassim S., Koreman J., Morris A., Olivar-Dimas M. and Soria-Rodríguez P. (2006). THE “SECUREPHONE” - A Mobile Phone with Biometric Authentication and e-Signature Support for Dealing Secure Transactions on the Fly . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006) ISBN 978-972-8865-63-4, pages 9-16. DOI: 10.5220/0002103900090016
in Bibtex Style
@conference{secrypt06,
author={R. Ricci and G. Chollet and M. V. Crispino and S. Jassim and J. Koreman and A. Morris and M. Olivar-Dimas and P. Soria-Rodríguez},
title={THE “SECUREPHONE” - A Mobile Phone with Biometric Authentication and e-Signature Support for Dealing Secure Transactions on the Fly},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006)},
year={2006},
pages={9-16},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002103900090016},
isbn={978-972-8865-63-4},
}
in EndNote Style
TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006)
TI - THE “SECUREPHONE” - A Mobile Phone with Biometric Authentication and e-Signature Support for Dealing Secure Transactions on the Fly
SN - 978-972-8865-63-4
AU - Ricci R.
AU - Chollet G.
AU - V. Crispino M.
AU - Jassim S.
AU - Koreman J.
AU - Morris A.
AU - Olivar-Dimas M.
AU - Soria-Rodríguez P.
PY - 2006
SP - 9
EP - 16
DO - 10.5220/0002103900090016