Online Secure Electronic Passport Scheme using Cryptographic Authentication Protocols and Biometrics Technology
Abstract
Electronic passports (e-Passports) have known a wide and fast deployment all around the world since the International Civil Aviation Organization (ICAO) the world has adopted standards whereby passports can store biometric identifiers. The purpose of biometric passports is to prevent the illegal entry of traveler into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. The e-passport, as it is sometimes called, represents a bold initiative in the deployment of two new technologies: Cryptography security and multiple biometrics (face, fingerprints, palm prints and iris). A passport contains the important personal information of holder such as photo, name, date of birth and place, nationality, date of issue, date of expiry, authority and so on. Â The goal of the adoption of the electronic passport is not only to expedite processing at border crossings, but also to increase security. Important in their own right, e-passports are also the harbinger of a wave of next-generation e-passport: several national governments plan to deploy e-passport integrating cryptography algorithm and multiple biometrics. Researchers explore the privacy and security implications of this impending worldwide experiment in multiple biometrics authentication technology. Researcher describes privacy and security issues that apply to e-passports, and then analyze these issues in the context of the International Civil Aviation Organization standard for e-passports. An overall security process that involves people, technology and procedures can overcome limitations of the Cryptography security and multiple biometric technologies.
References
Barral and A. Tria. 2009. Fake fingers in fingerprint recognition: Glycerin supersedes gelatin. In Formal to Practical Security, Springer (2009).
Bergman. 2005. Multi-biometric match-on-card alliance formed. Biometric Technology Today 13 (2005), 6.
Chang. 2004. New multi-biometric approaches for improved person identification. (2004). John Daugman. 2004. How iris recognition works. IEEE Transactions on Circuits and Systems for Video Technology 14 (2004), 21–30.
C. Hesher, A. Srivastava, and G. Erlebacher. 2003. A novel technique for face recognition using range images. In Proceedings of Seventh International Symposium on Signal Processing and Its Application.
ICAO. 2003. Machine Readable Travel Documents. Part 1 Machine Readable Passports.
ICAO, Fifth Edition. ICAO. 2004. Biometrics Deployment of Machine Readable Travel Documents. Technical Report. ICAO.
ICAO. 2006. Machine readable travel documents. Technical Report. ICAO.
A. K. Jain and R. Bolle. 1999. Biometrics-personal identification in networked society. (1999).
Home Affairs Justice. 2006. EU standard specifications for security features and biometrics in passports and travel documents. Technical Report. European Union.
S. Kc, Gaurav and Paul A. Karger. 2005. ecurity and privacy issues in machine readable travel documents (MRTDs). Technical Report. IBM Technical Report (RC 23575), IBM T. J.Watson Research Labs.
D. Klugler. 2005. Advance security mechanisms for machine readable travel documents, Technical report. Technical Report. Federal Office for Information Security (BSI), Germany. Riscure Security Lab. 2006. E-passport privacy attack. Technical Report. at the Cards Asia Singapore.
D. Monar, A. Juels, and D. Wagner. 2005. Security and privacy issues in e-passports. Technical Report. Cryptology ePrint Archive.
Downloads
Additional Files
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).