THE “SECUREPHONE” - A Mobile Phone with Biometric Authentication and e-Signature Support for Dealing Secure Transactions on the Fly
R. Ricci, G. Chollet, M. V. Crispino, S. Jassim, J. Koreman, A. Morris, M. Olivar-Dimas, P. Soria-Rodríguez
2006
Abstract
This article presents an overview of the SecurePhone project, with an account of the first results obtained. SecurePhone’s primary aim is to realise a mobile phone prototype - the “SecurePhone” - in which biometrical authentication enables users to deal secure, dependable transactions over a mobile network. The SecurePhone is based on a commercial PDA-phone, supplemented with specific software modules and a customised SIM card. It integrates in a single environment a number of advanced features: access to cryptographic keys through strong multimodal biometric authentication; appending and verification of digital signatures; real-time exchange and interactive modification of (e-signed) documents and voice recordings. SecurePhone’s “biometric recogniser” is based on original research. A fused combination of three different biometric methods - speaker, face and handwritten signature verification - is exploited, with no need for dedicated hardware components. The adoption of non-intrusive, psychologically neutral biometric techniques is expected to mitigate rejection problems that often inhibit the social use of biometrics, and speed up the spread of e-signature technology. Successful biometric authentication grants access to SecurePhone’s built-in e-signature services through a user-friendly interface. Special emphasis is accorded to the definition of a trustworthy security chain model covering all aspects of system operation.
References
- Allano, L., Garcia-Salicetti, S., Ly-Van, B., Morris, A.C., Koreman, J., Sellahewa, H., Jassim, S. & Dorizzi, B., 2006, “Non intrusive multi-biometrics on a mobile device: a comparison of fusion techniques”, Proc. SPIE conference on Biometric Techniques for Human Identification III, Orlando, 2006.
 - Bella G., Bistarelli S., Martinelli F., 2003, “Biometrics to Enhance Smartcard Security (Simulating MOC using TOC)”, Proc. 11th International Workshop on Security Protocols Cambridge, England.
 - Bredin, H., Miguel, A., Witten, I.H. & Chollet, G., 2006, “Detecting replay attacks in audiovisual identity verification”, Proc. ICASSP 2006 (in print).
 - Collobert, R., Bengio, S. & Mariéthoz, J., 2002, “Torch: a modular machine learning software library”, Technical Report IDIAP-RR 02-46.
 - Dolfing, J.G.A., 1998, “Handwriting recognition and verification, a Hidden Markov approach”, Ph.D. thesis, Philips Electronics N.V.
 - Duda, O., Hart, P.E. & Stork, D.G., 2001, Pattern classification, Wiley.
 - Garcia-Salicetti, S., Beumier, C., Chollet, G., Dorizzi, B., Leroux-Les Jardins, J., Lunter, J., Ni, Y. & PetrovskaDelacretaz, D., 2003, “BIOMET: a Multimodal Person Authentication Database Including Face, Voice, Fingerprint, Hand and Signature Modalities”, Proc. 4th Conf. on AVBPA, pp. 845-853, Guildford, UK..
 - Koreman, J., Morris, A.C., Wu, D., Jassim, S., Sellahewa, H., Ehlers, J., Chollet, G., Aversano, G., Bredin, H. Garcia-Salicetti, S., Allano, L. Ly Van, B. & Dorizzi, B., 2006, “ multi-modal biometric authentication on the SecurePhone PDA”, Proc. MMUA, (in press).
 - Morris, A.C., Jassim, S., Sellahewa, H., Allano, L., Ehlers, J., Wu, D., Koreman, J., Garcia-Salicetti, S., Ly-Van, B., Dorizzi, B., 2006, “Multimodal person authentication on a smartphone under realistic conditions”, Proc. SPIE conference on Mobile Multimedia/Image Processing for Military and Security Applications”, Orlando, 17-21 April, 2006.
 - Morris, A.C., Koreman, J., Sellahewa, H., Ehlers, J, Jassim, S., Allano, L. & Garcia-Salicetti, S., 2006, “The SecurePhone PDA database, experimental protocol and automatic test procedure for multimodal user authentication”, Tech. Report, http://www.coli.unisaarland.de/SecurePhone/documents/PDA_database_a nd_test_protocol.pdf
 - Pettersson M., Obrink Ä, 2002, “How secure is your biometric solution?”, Precise Biometrics White Paper, http://www.ibia.org
 - Reynolds, D.A., 1995, “Speaker identification and verification using Gaussian mixture speaker models”, Speech Communication, Vol.17, pp.91-108
 - Sellahewa, H. & Jassim, S.,“Wavelet-based Face Verification for constrained platforms”, 2005, Proc. SPIE on Biometric Technology for Human Identification II, Florida, Vol. 5779, pp 173-183.
 - Sellahewa, H. Al-Jawad, N., Morris, A.C., Wu, D., Koreman, J. & Jassim, S., 2006, “Comparison of weighting strategies in early and late fusion approach to audio-visual person authentication”, Proc. SPIE conference on Mobile Multimedia/Image Processing for Military and Security Applications”, Orlando, 17- 21 April, 2006.
 - Torvinen V., 2000, “Wireless PKI: fundamentals”, Radicchio white paper, http://www.radicchio.org
 - Welch D. J., Lathrop S. D., 2003, “A Survey of 802.11a Wireless Security Threats and Security Mechanisms”, Tech. Report, ITOC-TR-2003-101, http://www.itoc.usma.edu/Documents/ITOC_TR2003-101_(G6).pdf
 
Paper Citation
in Harvard Style
Ricci R., Chollet G., V. Crispino M., Jassim S., Koreman J., Morris A., Olivar-Dimas M. and Soria-Rodríguez P. (2006). THE “SECUREPHONE” - A Mobile Phone with Biometric Authentication and e-Signature Support for Dealing Secure Transactions on the Fly . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006) ISBN 978-972-8865-63-4, pages 9-16. DOI: 10.5220/0002103900090016
in Bibtex Style
@conference{secrypt06,
author={R. Ricci and G. Chollet and M. V. Crispino and S. Jassim and J. Koreman and A. Morris and M. Olivar-Dimas and P. Soria-Rodríguez},
title={THE “SECUREPHONE” - A Mobile Phone with Biometric Authentication and e-Signature Support for Dealing Secure Transactions on the Fly},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006)},
year={2006},
pages={9-16},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002103900090016},
isbn={978-972-8865-63-4},
}
in EndNote Style
TY  - CONF 
JO  - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006)
TI  - THE “SECUREPHONE” - A Mobile Phone with Biometric Authentication and e-Signature Support for Dealing Secure Transactions on the Fly
SN  - 978-972-8865-63-4
AU  - Ricci R. 
AU  - Chollet G. 
AU  - V. Crispino M. 
AU  - Jassim S. 
AU  - Koreman J. 
AU  - Morris A. 
AU  - Olivar-Dimas M. 
AU  - Soria-Rodríguez P. 
PY  - 2006
SP  - 9
EP  - 16
DO  - 10.5220/0002103900090016