Login
Register
Reset Password
Publish & Distribute
Publishing Solutions
Distribution Solutions
Subjects
Architecture and Design
Arts
Business and Economics
Chemistry
Classical and Ancient Near Eastern Studies
Computer Sciences
Cultural Studies
Engineering
General Interest
Geosciences
History
Industrial Chemistry
Jewish Studies
Law
Library and Information Science, Book Studies
Life Sciences
Linguistics and Semiotics
Literary Studies
Materials Sciences
Mathematics
Medicine
Music
Pharmacy
Philosophy
Physics
Social Sciences
Sports and Recreation
Theology and Religion
Publications
Journals
Books
Proceedings
Publishers
Blog
Contact
Search
EUR
USD
GBP
English
English
Deutsch
Polski
Español
Français
Italiano
Cart
Home
Journals
International Journal on Smart Sensing and Intelligent Systems
Volume 16 (2023): Issue 1 (January 2023)
Open Access
Biometric authentication sensor with an encryption module for prevention of h/w hacking in digital custody services
Soojun Lee
Soojun Lee
,
Hyeopgoo Yeo
Hyeopgoo Yeo
and
Mingoo Kang
Mingoo Kang
| Apr 06, 2023
International Journal on Smart Sensing and Intelligent Systems
Volume 16 (2023): Issue 1 (January 2023)
About this article
Previous Article
Next Article
Abstract
Article
Figures & Tables
References
Authors
Articles in this Issue
Preview
PDF
Cite
Share
Article Category:
Article
Published Online:
Apr 06, 2023
Page range:
-
Received:
Nov 01, 2022
DOI:
https://doi.org/10.2478/ijssis-2023-0004
Keywords
Digital custody model
,
home gateway
,
FIDO
,
DID
,
biometric security
,
embedded encryption LEA
© 2023 Soojun Lee et al., published by Sciendo
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Figure 1
Biometric authentication process by FIDO: (A) Fingerprint registration process. (B) Fingerprint login process [4]. FIDO, Fast ID Online.
Figure 2
The conceptual proposed custody model of digital assets using a set-top box (home gateway). FIDO, Fast ID Online; DID, decentralized ID.
Figure 3
Design of digital asset custody service model based on home gateway: (A) simplified diagram and (B) detailed features of set-top box as a home gateway. FIDO, Fast ID Online, DID, decentralized ID.
Figure 4
The DID-based custody model: (A) custody model using home gateway, and (B) the storage of the home gateway by the DID for custody service. DID, decentralized ID.
Figure 5
Authentication process for personal digital asset custody model based on multiple DID. DID, decentralized ID.
Figure 6
Information processing of the proposed custody model configuration. CTAP, client to authenticator protocol; FIDO, Fast ID Online.
Figure 7
An example of hardware hacking prevention of biometric information in the biometric authentication process.
Figure 8
The proposed biometric sensor embedded with an encryption module to prevent hardware hacking and a system schematic to restore it.
Figure 9
LEA round function: (A) for encryption, and (B) for decryption. LEA, lightweight encryption algorithm.
Figure 10
Architecture of the LEA block cipher algorithm for IP design. LEA, lightweight encryption algorithm.
Figure 11
Round-key generation Verilog code for KeySchedule module.
Figure 12
LEA decryption C code for fingerprint image restoration. LEA, lightweight encryption algorithm.
Figure 13
Fingerprint sensor image with embedded LEA module: (A) original fingerprint image, (B) LEA encrypted image, and (C) LEA decrypted image. LEA, lightweight encryption algorithm.
Figure 14
Fingerprint information enrollment process: (A) 16 DB enrollment, (B) DB verify and lock, (C) authentication process, and (D) authentication failure with encrypted fingerprint image.
Figure 15
The proposed digital custody model with a biometric authentication device with an embedded encryption module, (A) using a set-top box as a home gateway and (B) authentication and information transfer processing.
Preview