ew
Archives of Informaon Science and Technology
Open Access | Page 42 |
Vol 2 | Issue 1 | Pages 42-46
Copyright: © 2019 Tawc IS. This is an open-access arcle distributed under the terms of the
Creave Commons Aribuon License, which permits unrestricted use, distribuon, and
reproducon in any medium, provided the original author and source are credited.
SCHOLARLY PAGES
*Corresponding author: Dr. Israa Shaker Tawc, Ministry of Sci-
ence and Tecghnology, Baghdad, Iraq
Accepted: March 16, 2019
Published online: March 18, 2019
Citaon: Tawc IS (2019) An Implementaon of Electronic
Passport Scheme Using Encrypted Security Along with Mulple
Biometrics. Arch Inf Sci Tech 2(1):42-46
An Implementation of Electronic Passport Scheme Using
Encrypted Security Along with Multiple Biometrics
Israa Shaker Tawc*
Ministry of Science and Tecghnology, Baghdad, Iraq
Introduction
Secure and trusted travel documents are an essenal
part of internaonal security, as they allow states and
internaonal instuons to idenfy the movement of
undesired or dangerous persons. At a naonal level, both
governmental and non-governmental instuons depend
on travel documents in order to establish a person‘s identy
as well (e.g. when opening a bank account). A secure travel
document is, thus, a signicant means against identy fraud
[1].
Major iniaves by the government’s aim to fuse Radio
Frequency Idencaon (RFID) and biometric technologies in
a new generaon of identy cards [2].
Since August 2006 the 27 Member States of the European
Union have been required to issue e-Passports that contain
a digital facial image, and since June 2009 they have been
obliged to issue second generaon e-Passports that also
include two ngerprints. The purpose of mandang the
issuance of e-Passports has been to strengthen the link
between the passport and the carrier of the passport, as
well as to make it easier to verify the authencity of the
passport. Other European biometric iniaves include the
Visa informaon System currently being rolled out, which
is used for 3rd country naonals applying for a visa to the
Schengen area [1].
Original Research
Abstract
Within the next year, travellers from dozens of naons may be carrying a new form of a passport. Electronic passports
have known a wide and fast deployment all around the world since the Internaonal Civil Aviaon Organizaon the
world has adopted standards whereby passports can store biometric ideners. The purpose of biometric passports is to
prevent the illegal entry of traveller into a specic country and limit the use of counterfeit documents by more accurate
idencaon of an individual.
The paper used the image of the e-Passport holder as a cover image to hide the ngerprint inside it within the operaon
of e-Passport design. The paper also provides a cryptographic security analysis of the e-passport using Arnold transform
on ngerprint and add a privet key to encrypted data that are intended to provide improved security in protecng
biometric informaon of the E-passport holder.
Our paper gives aenon to the security features which are used to make the e-Passport safe and protect it from
unauthorised access
Keywords
E-Passport, Fingerprint, Biometric, Arnold transform, Discrete wavelet transform (DWT)
An e-passport is, thus, composed of the passport booklet
with its physically printed data and physical security (usually
an-forgery) measures, the electronic chip and the security
mechanisms and data that are contained within the chip.
For the purposes of this documented study, however, we
will focus on the chip and the security mechanisms and
informaon it contains.
An e-Passport is also known as a biometric passport con-
tains an electronic chip. The chip holds the same informa-
on that is printed on the passport's data page: the holder's
name, date of birth, and other biographic informaon. An
e-Passport also contains a biometric idener [3,4].
The goal of the e-Passport is to improve security by
combang fraud. It may, in some cases, help speed up border
crossings, but there is no guarantee that this will be the case
[4]. The symbol of e-Passport is illustrated in Figure 1.
Citaon: Tawc IS (2019) An Implementaon of Electronic Passport Scheme Using Encrypted Security Along with Mulple Biometrics. Arch
Inf Sci Tech 2(1):42-46
Tawc. Arch Inf Sci Tech 2019, 2(1):42-46 Open Access | Page 43 |
whitening elements. If someone uses these substances to
manipulate a passport, the chemical reagents will react and
thereby return the passport in a useless state. Some small
holographic stripes and some bers which are only visible
under UV light are embedded too.
The inks used to print passports have a restricted
distribuon and they are not available commercially. The
ingredients of these inks are secret because they contribute a
lot to the safety of the passport. They can also contain some
chemical reagents for the same reason as the pages have and
they react dierently if they are placed under UV light [9].
Proposed Schemes
The suggested process to hide the watermark image
(which is here is the ngerprint) is illustrated in Figure 3. First
The main goal of upgrading passports to an electronic
version is making it hard for criminals or anybody to
counterfeit or illegally duplicate them. A praccal way of
doing so is through the use of Cryptographic for informaon
install in the e-passport chip.
In this paper we proposed a new and simple method to
hide the same biometric of the e-Passport holder (nger
print), encrypted it then choosing one of the informaon that
store in the chip (holder image) and hide it.
At the checkpoint, the image is acquired by reading the
e-Passport chip and the encrypted compound biometric data
is extracted from the acquired image and decrypted using
the original key that was earlier stored in a secure external
storage.
The biometric data is then authencated with the
biometric data of the passport’s owner through invisible
encrypon. This biometric data can be considered as an
invisible watermark image.
We try to use some transformaon before embedded
the biometric ngerprint. The transformaon adopted here
may be discrete cosine transform (DCT) or discrete wavelet
transforms (DWT) [5,6].
Physical Aspects of e-Passport
E-passports are widely deployed in most of the developed
countries that stores the biometric informaon on a ny Ra-
dio Frequency Idencaon (RFID) chip. The stored informa-
on is used to authencate the identy of an individual via a
wireless interface to the reader [7].
Figure 2 shows a sample passport. On its boom of
the cover, we can see the standard logo for an electronic
passport. The passport is made out of a special paper which
should be secure and hard to imitate. This paper contains
coon and cellulose and there are no opcal brighteners
used. Furthermore, there is a watermark on all the pages
in the passport [8]. There are also some chemical reagents
in it to prevent manipulaon by acids, petrol derivaves or
e - Passport
symbol
Figure 1: e-Passport symbol.
Inlay with integrated
contactless chip
Inlay with
contactless chip
Antenna
Integrated Circuit
Contactless module
Passport cover
laminated
protective layer
laminated
protective layer
Data page with
data and photograph
Figure 2: The layers of an electronic passport.
-a- standerd 512x512 image
-b- logo
watermark
image
-c- after 3 level of Arnold
transform
Figure 3: Images used for suggest method: a) The 4 test images
used in suggest method; b) Logo used as a watermark; and c)
Shape of watermark aer three level of Arnold transform.
Citaon: Tawc IS (2019) An Implementaon of Electronic Passport Scheme Using Encrypted Security Along with Mulple Biometrics. Arch
Inf Sci Tech 2(1):42-46
Tawc. Arch Inf Sci Tech 2019, 2(1):42-46 Open Access | Page 44 |
Step 1 read cover image (I) (e-Passport holder image)
Step 2 read watermark image (ngerprint)
Step 3 divide the image into (8 × 8) blocks
Step 4 nd DCT for each block of cover image (I)
Step 5 do Arnold transform 5 mes for watermark image
Step 6 Compare the posion I(3,3) with I(2,4)
If I (3,3) >= I(2,4) → I(5,2) = W(N)* watermark factor
Else
I (4,3) = W(N)* watermark factor
Step 7 use IDCT transformaon for the block that has
been embedded with watermarking informaon
Step 8 Repeat step 6 and 7 unl all of the water marking
informaon have been added to all blocks.
Step 9 add secret key
Experimental Result
In this secon, we present numerical experiments that
explain the eecveness of using suggest a method of hiding
biometric informaon into original extra biometric data by
step began by using mulple level Arnold transform into the
watermark image and add privet key, then we choose the cover
image (which is here is the passport holder). We used either
DCT or DWT for the cover image, in addion, to considering
the transformation operation is a simple encrypted
method, and also we can consider it as an extra operaon
for informaon compression. Aer that, we embedded the
watermarked informaon into the transformed image to get
the watermarked image. Figure 4 illustrate the operaon of
adding watermark to cover image.
The algorithm can be described below:
i. Arnold algorithm
Step 1 save dimension of image
()NxN
Step 2 read each pixel of image
( , )xy
Step 3 alters our x value by a taking the
x
value, adding
y
to it mod
N
Step 4
y
value changes by taking this
x
value adding to
2 mod yN
Step 5 store
( , )xy
′′
ii. Algorithm for Embedded two images using DCT
Watermark image
(fingerprint)
Arnold transfer 5mes
Original image
(Passport holder)
Reshape image
Divide the image into 8x8
blocks
Add secret Key
DCT for each block
Algorithm of embedding
two images
IDCT
Show watermarked image
Figure 4: Main processes for embedding watermark using DCT.
Citaon: Tawc IS (2019) An Implementaon of Electronic Passport Scheme Using Encrypted Security Along with Mulple Biometrics. Arch
Inf Sci Tech 2(1):42-46
Tawc. Arch Inf Sci Tech 2019, 2(1):42-46 Open Access | Page 45 |
magnitude range of NC varies between [-1 and 1], the
unity value is given exact matching between the extracted
watermark image and the original watermark image.
At the beginning, we used some slandered test images to
evaluate the performance of our new suggest method to get
comparable results.
In our experiments we used two approaches for designing
engine of the embedded watermark into the image, the
rst one used DCT and the other one is the DWT, to make
a compression between these two transformaon type
and choose the beer method. For doing this we used four
standard color images as a cover image with dimension 512
× 512 (Table 1), and one color logo as an invisible watermark
with dimension 100 × 100, these image is shown in Figure 3
[10,11].
Also, we try to change the number of Arnold level to study
its eect on the reconstructed image. Table 2 illustrate the
results of changing Arnold level, we used DWT on Lena color
image
The interface of our applicaon program for the suggested
method is illustrated in Figure 5. We used Matlab 7.6.0 to
design and program all the step explain above. As it appears
using a dierent type of transformaon. Dierent evaluaon
is used for measuring the performance of our new method.
Such as The mean square error (MSE) which was used to
measure performance of the reconstructed image and it’s
dened as
2
1 1
1
( (, ) - (, ))
MN
ij
MSE X ij X ij
MN = =
′
=∑∑
also commonly employed measure to evaluate the
impercepbility of the watermarked image is the peak signal-
to-noise rao (PSNR) which can be calculated as.
2
10
10.log ( )
i
MAX
PSNR dB
MSE
=
Where is the maximum possible pixel value of the image.
Third factor used here is Normalized Correlaon
Coecient (NCC), which is used to measure the performance
of the blind or non-blind watermark extracon result for the
extracted watermark W' and the original watermark W, NCC
can be dened as:
1
22
1 1
(). ()
( , )
() . ()
n
i
nn
ii
WiW i
NC W W
Wi W i
=
= =
′
′=′
∑
∑∑
Where (n × n) are the watermark dimensions. The
Figure 5: Interface for suggested applicaon used for hiding ngerprint into another biometric.
Table 1: Results for DWT method.
Test image 512 × 512 PSNR MSE Correlaon
coecient
Lena 48.1628 0.9643 1
Baboon 36.0360 1.8248 1
Pepper 38.6914 1.6422 1
Barbara 48.1061 1.0057 1
Table 2: Eect of number of Arnold transfer on Lena image.
No. of Arnold transfer PSNR MSE Correlaon
coecient
147.9183 1.0501 1
3 48.2889 0.9643 1
548.2671 0.9691 1
10 48.2757 0.9672 1
Citaon: Tawc IS (2019) An Implementaon of Electronic Passport Scheme Using Encrypted Security Along with Mulple Biometrics. Arch
Inf Sci Tech 2(1):42-46
Tawc. Arch Inf Sci Tech 2019, 2(1):42-46 Open Access | Page 46 |
References
1. Rondo ONZ (2011) Operaonal and technical security of
electronic passports. Frontex Agency, Warsaw.
2. Ari Juels, David Molnar, David Wagner (2011) Security and
privacy issues in e-passports. UC-Berkeley.
3. (2016) e-Passports. The Department of Homeland Security, USA.
4. Government of Canada Site. How ePassports work.
5. Xiang-Gen Xia, Charles G Boncelet, Gonzalo R Arce (2010) A
mulresoluon watermark for digital images. Image Processing,
Conference IEEE Xplore.
6. Syed Ali Khayam (2003) The discrete cosine transform (DCT):
Theory and applicaon. Michigan State University.
7. Hesam Kolahan, Tejendra Thapaliya (2011) Biometric passport:
Security and privacy aspects of machine readable travel
documents. Swiss Joint Master of Science in Computer Science.
8. Prashant Shende, Prano mude, Sanket Lichade (2015) Design
and implementaon of secure electronic passport system.
Internaonal Journal of Innovave Research in Computer and
Communicaon Engineering 3: 10885-10892.
9. Johannes Eifert, Lorenz Schwob (2012) Security and privacy of
the biometric passport. Department of Informacs, Universität
Freiburg.
10. Zhenjun Tang, Xianquan Zhang (2011) Secure image encrypon
without size limitaon using arnold transform and random
strategies. Journal of Mulmedia.
11. Divya saxena (2011) Digital watermarking algorithm based on
singular value decomposion and arnold transform. Internaonal
Journal of Electronics and Computer Science Engineering 1: 22-
27.
from the gure the rst step is read the image of the passport
holder then the second biometric which is the ngerprint is
used. To get rid of fraud and manipulaon we used a number
of Arnold transform on ngerprint image before we embed
it on the original image, and a private key is added. Aer
that, the watermarked image is store into the informaon
list for the e-Passport chip. At the check point, the operaon
of decrypon is started and the ngerprint is extracted and
checks it with original one to disnguish the fake one.
Conclusions
The specic objecves of this paper is to idenfy best
pracces related to the issuance processes and to suggest
a set of recommendaon to redress security gaps in the
issuance process.
The paper represents an aempt to acknowledge and
account for the presence of e-passport scheme using face
and fingerprint of the e-Passport holder to improved
identification for more security and fraud prevenon. The
applicaon of biometric in passports requires high accuracy
rates; secure data storage, secure transfer of data and reliable
generaon of biometric data.
The ordinary passport data is not required to be encrypted,
identy thief and terrorists can easily obtain the biometric
informaon. A possible soluon is to store a unique biometric
date aer encrypted and add a privet key to it. The key is then
used to decrypt e-Passport data.
The inclusion of biometric idencaon informaon into
machine readable passports will improve their robustness
against identy the if addional security measures are
implemented in order to compensate for the limitaons of
the biometric technologies.
Copyright: © 2019 Tawc IS. This is an open-access arcle distributed under the terms of the
Creave Commons Aribuon License, which permits unrestricted use, distribuon, and
reproducon in any medium, provided the original author and source are credited.
SCHOLARLY PAGES