Have a personal or library account? Click to login
Biometric authentication sensor with an encryption module for prevention of h/w hacking in digital custody services Cover

Biometric authentication sensor with an encryption module for prevention of h/w hacking in digital custody services

By: Soojun Lee,  Hyeopgoo Yeo and  Mingoo Kang  
Open Access
|Apr 2023

Figures & Tables

Figure 1

Biometric authentication process by FIDO: (A) Fingerprint registration process. (B) Fingerprint login process [4]. FIDO, Fast ID Online.

Figure 2

The conceptual proposed custody model of digital assets using a set-top box (home gateway). FIDO, Fast ID Online; DID, decentralized ID.

Figure 3

Design of digital asset custody service model based on home gateway: (A) simplified diagram and (B) detailed features of set-top box as a home gateway. FIDO, Fast ID Online, DID, decentralized ID.

Figure 4

The DID-based custody model: (A) custody model using home gateway, and (B) the storage of the home gateway by the DID for custody service. DID, decentralized ID.

Figure 5

Authentication process for personal digital asset custody model based on multiple DID. DID, decentralized ID.

Figure 6

Information processing of the proposed custody model configuration. CTAP, client to authenticator protocol; FIDO, Fast ID Online.

Figure 7

An example of hardware hacking prevention of biometric information in the biometric authentication process.

Figure 8

The proposed biometric sensor embedded with an encryption module to prevent hardware hacking and a system schematic to restore it.

Figure 9

LEA round function: (A) for encryption, and (B) for decryption. LEA, lightweight encryption algorithm.

Figure 10

Architecture of the LEA block cipher algorithm for IP design. LEA, lightweight encryption algorithm.

Figure 11

Round-key generation Verilog code for KeySchedule module.

Figure 12

LEA decryption C code for fingerprint image restoration. LEA, lightweight encryption algorithm.

Figure 13

Fingerprint sensor image with embedded LEA module: (A) original fingerprint image, (B) LEA encrypted image, and (C) LEA decrypted image. LEA, lightweight encryption algorithm.

Figure 14

Fingerprint information enrollment process: (A) 16 DB enrollment, (B) DB verify and lock, (C) authentication process, and (D) authentication failure with encrypted fingerprint image.

Figure 15

The proposed digital custody model with a biometric authentication device with an embedded encryption module, (A) using a set-top box as a home gateway and (B) authentication and information transfer processing.
Language: English
Submitted on: Nov 1, 2022
|
Published on: Apr 6, 2023
In partnership with: Paradigm Publishing Services
Publication frequency: 1 issue per year

© 2023 Soojun Lee, Hyeopgoo Yeo, Mingoo Kang, published by Professor Subhas Chandra Mukhopadhyay
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.