ArticlePDF Available

An Implementation of Electronic Passport Scheme Using Encrypted Security Along with Multiple Biometrics

Authors:
ew
Archives of Informaon Science and Technology
Open Access | Page 42 |
Vol 2 | Issue 1 | Pages 42-46
Copyright: © 2019 Tawc IS. This is an open-access arcle distributed under the terms of the
Creave Commons Aribuon License, which permits unrestricted use, distribuon, and
reproducon in any medium, provided the original author and source are credited.
SCHOLARLY PAGES
*Corresponding author: Dr. Israa Shaker Tawc, Ministry of Sci-
ence and Tecghnology, Baghdad, Iraq
Accepted: March 16, 2019
Published online: March 18, 2019
Citaon: Tawc IS (2019) An Implementaon of Electronic
Passport Scheme Using Encrypted Security Along with Mulple
Biometrics. Arch Inf Sci Tech 2(1):42-46
An Implementation of Electronic Passport Scheme Using
Encrypted Security Along with Multiple Biometrics
Israa Shaker Tawc*
Ministry of Science and Tecghnology, Baghdad, Iraq
Introduction
Secure and trusted travel documents are an essenal
part of internaonal security, as they allow states and
internaonal instuons to idenfy the movement of
undesired or dangerous persons. At a naonal level, both
governmental and non-governmental instuons depend
on travel documents in order to establish a person‘s identy
as well (e.g. when opening a bank account). A secure travel
document is, thus, a signicant means against identy fraud
[1].
Major iniaves by the government’s aim to fuse Radio
Frequency Idencaon (RFID) and biometric technologies in
a new generaon of identy cards [2].
Since August 2006 the 27 Member States of the European
Union have been required to issue e-Passports that contain
a digital facial image, and since June 2009 they have been
obliged to issue second generaon e-Passports that also
include two ngerprints. The purpose of mandang the
issuance of e-Passports has been to strengthen the link
between the passport and the carrier of the passport, as
well as to make it easier to verify the authencity of the
passport. Other European biometric iniaves include the
Visa informaon System currently being rolled out, which
is used for 3rd country naonals applying for a visa to the
Schengen area [1].
Original Research
Abstract
Within the next year, travellers from dozens of naons may be carrying a new form of a passport. Electronic passports
have known a wide and fast deployment all around the world since the Internaonal Civil Aviaon Organizaon the
world has adopted standards whereby passports can store biometric ideners. The purpose of biometric passports is to
prevent the illegal entry of traveller into a specic country and limit the use of counterfeit documents by more accurate
idencaon of an individual.
The paper used the image of the e-Passport holder as a cover image to hide the ngerprint inside it within the operaon
of e-Passport design. The paper also provides a cryptographic security analysis of the e-passport using Arnold transform
on ngerprint and add a privet key to encrypted data that are intended to provide improved security in protecng
biometric informaon of the E-passport holder.
Our paper gives aenon to the security features which are used to make the e-Passport safe and protect it from
unauthorised access
Keywords
E-Passport, Fingerprint, Biometric, Arnold transform, Discrete wavelet transform (DWT)
An e-passport is, thus, composed of the passport booklet
with its physically printed data and physical security (usually
an-forgery) measures, the electronic chip and the security
mechanisms and data that are contained within the chip.
For the purposes of this documented study, however, we
will focus on the chip and the security mechanisms and
informaon it contains.
An e-Passport is also known as a biometric passport con-
tains an electronic chip. The chip holds the same informa-
on that is printed on the passport's data page: the holder's
name, date of birth, and other biographic informaon. An
e-Passport also contains a biometric idener [3,4].
The goal of the e-Passport is to improve security by
combang fraud. It may, in some cases, help speed up border
crossings, but there is no guarantee that this will be the case
[4]. The symbol of e-Passport is illustrated in Figure 1.
Citaon: Tawc IS (2019) An Implementaon of Electronic Passport Scheme Using Encrypted Security Along with Mulple Biometrics. Arch
Inf Sci Tech 2(1):42-46
Tawc. Arch Inf Sci Tech 2019, 2(1):42-46 Open Access | Page 43 |
whitening elements. If someone uses these substances to
manipulate a passport, the chemical reagents will react and
thereby return the passport in a useless state. Some small
holographic stripes and some bers which are only visible
under UV light are embedded too.
The inks used to print passports have a restricted
distribuon and they are not available commercially. The
ingredients of these inks are secret because they contribute a
lot to the safety of the passport. They can also contain some
chemical reagents for the same reason as the pages have and
they react dierently if they are placed under UV light [9].
Proposed Schemes
The suggested process to hide the watermark image
(which is here is the ngerprint) is illustrated in Figure 3. First
The main goal of upgrading passports to an electronic
version is making it hard for criminals or anybody to
counterfeit or illegally duplicate them. A praccal way of
doing so is through the use of Cryptographic for informaon
install in the e-passport chip.
In this paper we proposed a new and simple method to
hide the same biometric of the e-Passport holder (nger
print), encrypted it then choosing one of the informaon that
store in the chip (holder image) and hide it.
At the checkpoint, the image is acquired by reading the
e-Passport chip and the encrypted compound biometric data
is extracted from the acquired image and decrypted using
the original key that was earlier stored in a secure external
storage.
The biometric data is then authencated with the
biometric data of the passport’s owner through invisible
encrypon. This biometric data can be considered as an
invisible watermark image.
We try to use some transformaon before embedded
the biometric ngerprint. The transformaon adopted here
may be discrete cosine transform (DCT) or discrete wavelet
transforms (DWT) [5,6].
Physical Aspects of e-Passport
E-passports are widely deployed in most of the developed
countries that stores the biometric informaon on a ny Ra-
dio Frequency Idencaon (RFID) chip. The stored informa-
on is used to authencate the identy of an individual via a
wireless interface to the reader [7].
Figure 2 shows a sample passport. On its boom of
the cover, we can see the standard logo for an electronic
passport. The passport is made out of a special paper which
should be secure and hard to imitate. This paper contains
coon and cellulose and there are no opcal brighteners
used. Furthermore, there is a watermark on all the pages
in the passport [8]. There are also some chemical reagents
in it to prevent manipulaon by acids, petrol derivaves or
e - Passport
symbol
Figure 1: e-Passport symbol.
Inlay with integrated
contactless chip
Inlay with
contactless chip
Antenna
Integrated Circuit
Contactless module
Passport cover
laminated
protective layer
laminated
protective layer
Data page with
data and photograph
Figure 2: The layers of an electronic passport.
-a- standerd 512x512 image
-b- logo
watermark
image
-c- after 3 level of Arnold
transform
Figure 3: Images used for suggest method: a) The 4 test images
used in suggest method; b) Logo used as a watermark; and c)
Shape of watermark aer three level of Arnold transform.
Citaon: Tawc IS (2019) An Implementaon of Electronic Passport Scheme Using Encrypted Security Along with Mulple Biometrics. Arch
Inf Sci Tech 2(1):42-46
Tawc. Arch Inf Sci Tech 2019, 2(1):42-46 Open Access | Page 44 |
Step 1 read cover image (I) (e-Passport holder image)
Step 2 read watermark image (ngerprint)
Step 3 divide the image into (8 × 8) blocks
Step 4 nd DCT for each block of cover image (I)
Step 5 do Arnold transform 5 mes for watermark image
Step 6 Compare the posion I(3,3) with I(2,4)
If I (3,3) >= I(2,4) → I(5,2) = W(N)* watermark factor
Else
I (4,3) = W(N)* watermark factor
Step 7 use IDCT transformaon for the block that has
been embedded with watermarking informaon
Step 8 Repeat step 6 and 7 unl all of the water marking
informaon have been added to all blocks.
Step 9 add secret key
Experimental Result
In this secon, we present numerical experiments that
explain the eecveness of using suggest a method of hiding
biometric informaon into original extra biometric data by
step began by using mulple level Arnold transform into the
watermark image and add privet key, then we choose the cover
image (which is here is the passport holder). We used either
DCT or DWT for the cover image, in addion, to considering
the transformation operation is a simple encrypted
method, and also we can consider it as an extra operaon
for informaon compression. Aer that, we embedded the
watermarked informaon into the transformed image to get
the watermarked image. Figure 4 illustrate the operaon of
adding watermark to cover image.
The algorithm can be described below:
i. Arnold algorithm
Step 1 save dimension of image
()NxN
Step 2 read each pixel of image
( , )xy
Step 3 alters our x value by a taking the
x
value, adding
y
to it mod
Step 4
y
value changes by taking this
x
value adding to
2 mod yN
Step 5 store
( , )xy
′′
ii. Algorithm for Embedded two images using DCT
Watermark image
(ngerprint)
Arnold transfer 5mes
Original image
(Passport holder)
Reshape image
Divide the image into 8x8
blocks
Add secret Key
DCT for each block
Algorithm of embedding
two images
IDCT
Show watermarked image
Figure 4: Main processes for embedding watermark using DCT.
Citaon: Tawc IS (2019) An Implementaon of Electronic Passport Scheme Using Encrypted Security Along with Mulple Biometrics. Arch
Inf Sci Tech 2(1):42-46
Tawc. Arch Inf Sci Tech 2019, 2(1):42-46 Open Access | Page 45 |
magnitude range of NC varies between [-1 and 1], the
unity value is given exact matching between the extracted
watermark image and the original watermark image.
At the beginning, we used some slandered test images to
evaluate the performance of our new suggest method to get
comparable results.
In our experiments we used two approaches for designing
engine of the embedded watermark into the image, the
rst one used DCT and the other one is the DWT, to make
a compression between these two transformaon type
and choose the beer method. For doing this we used four
standard color images as a cover image with dimension 512
× 512 (Table 1), and one color logo as an invisible watermark
with dimension 100 × 100, these image is shown in Figure 3
[10,11].
Also, we try to change the number of Arnold level to study
its eect on the reconstructed image. Table 2 illustrate the
results of changing Arnold level, we used DWT on Lena color
image
The interface of our applicaon program for the suggested
method is illustrated in Figure 5. We used Matlab 7.6.0 to
design and program all the step explain above. As it appears
using a dierent type of transformaon. Dierent evaluaon
is used for measuring the performance of our new method.
Such as The mean square error (MSE) which was used to
measure performance of the reconstructed image and it’s
dened as
2
1 1
1
( (, ) - (, ))
MN
ij
MSE X ij X ij
MN = =
=∑∑
also commonly employed measure to evaluate the
impercepbility of the watermarked image is the peak signal-
to-noise rao (PSNR) which can be calculated as.
2
10
10.log ( )
i
MAX
PSNR dB
MSE

=


Where is the maximum possible pixel value of the image.
Third factor used here is Normalized Correlaon
Coecient (NCC), which is used to measure the performance
of the blind or non-blind watermark extracon result for the
extracted watermark W' and the original watermark W, NCC
can be dened as:
1
22
1 1
(). ()
( , )
() . ()
n
i
nn
ii
WiW i
NC W W
Wi W i
=
= =
=
∑∑
Where (n × n) are the watermark dimensions. The
Figure 5: Interface for suggested applicaon used for hiding ngerprint into another biometric.
Table 1: Results for DWT method.
Test image 512 × 512 PSNR MSE Correlaon
coecient
Lena 48.1628 0.9643 1
Baboon 36.0360 1.8248 1
Pepper 38.6914 1.6422 1
Barbara 48.1061 1.0057 1
Table 2: Eect of number of Arnold transfer on Lena image.
No. of Arnold transfer PSNR MSE Correlaon
coecient
147.9183 1.0501 1
3 48.2889 0.9643 1
548.2671 0.9691 1
10 48.2757 0.9672 1
Citaon: Tawc IS (2019) An Implementaon of Electronic Passport Scheme Using Encrypted Security Along with Mulple Biometrics. Arch
Inf Sci Tech 2(1):42-46
Tawc. Arch Inf Sci Tech 2019, 2(1):42-46 Open Access | Page 46 |
References
1. Rondo ONZ (2011) Operaonal and technical security of
electronic passports. Frontex Agency, Warsaw.
2. Ari Juels, David Molnar, David Wagner (2011) Security and
privacy issues in e-passports. UC-Berkeley.
3. (2016) e-Passports. The Department of Homeland Security, USA.
4. Government of Canada Site. How ePassports work.
5. Xiang-Gen Xia, Charles G Boncelet, Gonzalo R Arce (2010) A
mulresoluon watermark for digital images. Image Processing,
Conference IEEE Xplore.
6. Syed Ali Khayam (2003) The discrete cosine transform (DCT):
Theory and applicaon. Michigan State University.
7. Hesam Kolahan, Tejendra Thapaliya (2011) Biometric passport:
Security and privacy aspects of machine readable travel
documents. Swiss Joint Master of Science in Computer Science.
8. Prashant Shende, Prano mude, Sanket Lichade (2015) Design
and implementaon of secure electronic passport system.
Internaonal Journal of Innovave Research in Computer and
Communicaon Engineering 3: 10885-10892.
9. Johannes Eifert, Lorenz Schwob (2012) Security and privacy of
the biometric passport. Department of Informacs, Universität
Freiburg.
10. Zhenjun Tang, Xianquan Zhang (2011) Secure image encrypon
without size limitaon using arnold transform and random
strategies. Journal of Mulmedia.
11. Divya saxena (2011) Digital watermarking algorithm based on
singular value decomposion and arnold transform. Internaonal
Journal of Electronics and Computer Science Engineering 1: 22-
27.
from the gure the rst step is read the image of the passport
holder then the second biometric which is the ngerprint is
used. To get rid of fraud and manipulaon we used a number
of Arnold transform on ngerprint image before we embed
it on the original image, and a private key is added. Aer
that, the watermarked image is store into the informaon
list for the e-Passport chip. At the check point, the operaon
of decrypon is started and the ngerprint is extracted and
checks it with original one to disnguish the fake one.
Conclusions
The specic objecves of this paper is to idenfy best
pracces related to the issuance processes and to suggest
a set of recommendaon to redress security gaps in the
issuance process.
The paper represents an aempt to acknowledge and
account for the presence of e-passport scheme using face
and fingerprint of the e-Passport holder to improved
identification for more security and fraud prevenon. The
applicaon of biometric in passports requires high accuracy
rates; secure data storage, secure transfer of data and reliable
generaon of biometric data.
The ordinary passport data is not required to be encrypted,
identy thief and terrorists can easily obtain the biometric
informaon. A possible soluon is to store a unique biometric
date aer encrypted and add a privet key to it. The key is then
used to decrypt e-Passport data.
The inclusion of biometric idencaon informaon into
machine readable passports will improve their robustness
against identy the if addional security measures are
implemented in order to compensate for the limitaons of
the biometric technologies.
Copyright: © 2019 Tawc IS. This is an open-access arcle distributed under the terms of the
Creave Commons Aribuon License, which permits unrestricted use, distribuon, and
reproducon in any medium, provided the original author and source are credited.
SCHOLARLY PAGES
ResearchGate has not been able to resolve any citations for this publication.
Conference Paper
Full-text available
Within the next year, travelers from dozens of nations may be carrying a new form of passport in response to a mandate by the United States government. The e-passport, as it is sometimes called, represents a bold initiative in the deployment of two new technologies: Radio-Frequency Identification (RFID) and biometrics. Important in their own right, e-passports are also the harbinger of a wave of next-generation ID cards: several national governments plan to deploy identity cards integrating RFID and biometrics for domestic use. We explore the privacy and security implications of this impending worldwide experiment in next-generation authentication technology. We describe privacy and security issues that apply to e-passports, then analyze these issues in the context of the International Civil Aviation Organization (ICAO) standard for e-passports.
Article
Full-text available
In this paper# weintroduce a new multiresolution water# marking method for digital images. The method is based on the discrete wavelet transform #DWT#. Pseudo#random codes are added to the large coe#cients at the high and middle frequency bands of the DWT of an image. It is shown that this method is more robust to often proposed methods to some common image distortions# such as the wavelet transform based image compression# and image halftoning. Moreover# the method is hierarchical. The computation load needed to detect the watermark depends on the noise level in an image. 1. Introduction With the rapid development of the current information technology# electronic publishing# such as the distribution of digitized images#videos# is becoming more and more popular. An important issue for electronic publishing is copyright protection. Watermarking is one of the current copyright protection methods that have recently received considerable attention. See# for example# #1#8#. Basically# wat...
Operational and technical security of electronic passports
  • Onz Rondo
Rondo ONZ (2011) Operational and technical security of electronic passports. Frontex Agency, Warsaw.
Biometric passport: Security and privacy aspects of machine readable travel documents
  • Tejendra Hesam Kolahan
  • Thapaliya
Hesam Kolahan, Tejendra Thapaliya (2011) Biometric passport: Security and privacy aspects of machine readable travel documents. Swiss Joint Master of Science in Computer Science.
Design and implementation of secure electronic passport system
  • Prashant Shende
  • Sanket Pranoti Mude
  • Lichade
Prashant Shende, Pranoti mude, Sanket Lichade (2015) Design and implementation of secure electronic passport system. International Journal of Innovative Research in Computer and Communication Engineering 3: 10885-10892.