Education

Research Interests

Teaching Activities

Journals


Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.


K. Karampidis, M. Rousouliotis, E. Linardos, E. Kavallieratou, A comprehensive survey of fingerprint presentation attack detection, Journal of Surveillance, Security and Safety, 2021, (to_appear), , IF =
 

Abstract
Nowadays, the number of people that utilize either digital applications or machines is increasing exponentially. Therefore, trustworthy verification schemes are required to ensure security and to authenticate the identity of an individual. Since traditional passwords have become more vulnerable to attack, the need to adopt new verification schemes is now compulsory. Biometric traits have gained significant interest in this area in recent years due to their uniqueness, ease of use and development, user convenience and security. Biometric traits cannot be borrowed, stolen or forgotten like traditional passwords or RFID cards. Fingerprints represent one of the most utilized biometric factors. In contrast to popular opinion, fingerprint recognition is not an inviolable technique. Given that biometric authentication systems are now widely employed, fingerprint presentation attack detection has become crucial. In this review, we investigate fingerprint presentation attack detection by highlighting the recent advances in this field and addressing all the disadvantages of the utilization of fingerprints as a biometric authentication factor. Both hardware- and software-based state-of-the-art methods are thoroughly presented and analyzed for identifying real fingerprints from artificial ones to help researchers to design securer biometric systems.

Conferences


Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.


K. Karampidis, E. Linardos, E. Kavallieratou, StegoPass – Utilization of Steganography to Produce a Novel Unbreakable Biometric Based Password Authentication Scheme, Computational Intelligence in Security for Information Systems Conference, (ed), (eds), (to_appear), Sep, 2021, Springer, Cham,
 

Abstract
In the digital era we live, trustworthy verification schemes are required to ensure security and to authenticate the identity of an individual. Traditional passwords were proved to be highly vulnerable to attacks and the need of adopting new verification schemes is compulsory. Biometric factors have gained a lot of interest during the last years due to their uniqueness, ease of use, user convenience, and ease of deployment. However, recent research showed that even this unique authentication factors are not inviolable techniques. Thus, it is necessary to employ new verification schemes that cannot be replicated or stolen. In this paper we propose the utilization of steganography as a tool to provide unbreakable passwords. More specifically, we obtain a biometric feature of a user and embed it as a hidden message in an image. This image is then utilized as a password, the so-called StegoPass. Reversely, when a legit user or an attacker tries to unlock a device or an application, the same biometric feature is captured and embedded with the same steganography algorithm into the picture. The hash key of the resulted stego image in both cases is produced and if there is a complete match, user is considered as authenticated. To ensure that the proposed StegoPass cannot be replicated, we have conducted experiments with state-of-the-art deep learning algorithms. Moreover, it was examined whether Generative Adversarial Networks could produce exact copies of the StegoPass to fool the suggested method and the results showed that the proposed verification scheme is extremely secure.

Books


Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.


Chapters in Books


Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.


Conferences Proceedings Editor


Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.