An Multi-Factor Biometric based Authentication System

  • Muzammil Ahmad
Keywords: Replay attack, identity theft, hash-code


Fingerprint authentication machines are widely used these days in various organizations to record the exact time in and time out of their employees. These machines stores the sensitive information of the individuals like fingerprint in it. There are two main problems associated with this kind of authentication process which we addressed in this paper. If somehow the stored finger print impression gets stolen, it may use as a replay attack on behalf of particular user in various biometric logins, secondly a single factor for authentication is less secure from the prospect of authenticity. We proposed Multi-factor authentication and hash storage, where the user has to be authenticated himself with three parameters as smart card, password and fingerprint. This reduces the false authentication and replay attacks. Similarly secure storage using hash function overcomes identity theft if machine compromised as the one way property of hash functions.


[1] Das, A.K.: ‘Analysis and improvement on an efficient biometricbased
remote user authentication scheme using smart cards’,
IET Inf. Sec., 2011, 5, (3), pp. 145-151.
[2] Li, C., Hwang, M.: ‘An efficient biometric-based remote
authentication scheme using smart cards’, J. Netw. Comput.
Appl., 2010, 33, (1), pp. 1-5.
[3] Wang, X., Zhang, W., Zhang, J., et al.: ‘Cryptanalysis and
improvement on two efficient remote user authentication scheme
using smart cards’, Computer Standards and Interfaces, 2007, 29,
(5), pp. 507-512.
[4] Jiang, Q., Wei, F., Fu, S., et al.: ‘Robust extended chaotic mapsbased
three-factor authentication scheme preserving biometric
template privacy’. Nonlinear Dynamics, 2016, 83, (4), pp. 2085-
[5] Shen, H., Cao, C., He, D., et al.: ‘New biometrics-based
authentication scheme for multi-server environment in critical
systems’, J. Ambient Intelligence and Humanized Computing,
2015, 6, (6), pp. 825-834.
[6] H, D., Zhang, Y., Chen, J.: ‘Robust Biometric-Based User
Authentication Scheme for Wireless Sensor Networks’, Ad Hoc
and Sensor Wireless Networks, 2015, 25, (3-4), pp. 309-321.
[7] Das, A., Goswami, A.: ‘A robust anonymous biometric-based
remote user authentication scheme using smart cards’, Journal of
King Saud University-Computer and Information Sciences, 2015,
27, (2), pp. 193-210.
[8] Dodis, Y., Reyzin, L.: ‘Fuzzy Extractors: How to Generate Strong
Keys from Biometrics and Other Noisy Data’. Siam Journal on
Computing, 2008, 38, (1), pp. 97-139.
How to Cite
Ahmad, M. (2018, April 15). An Multi-Factor Biometric based Authentication System. ASIAN JOURNAL FOR CONVERGENCE IN TECHNOLOGY (AJCT ) -UGC LISTED, 4(I). Retrieved from
Computer Science and Engineering