Identity Management in Virtual Worlds Based on Biometrics Watermarking
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33122
Identity Management in Virtual Worlds Based on Biometrics Watermarking

Authors: S. Bader, N. Essoukri Ben Amara

Abstract:

With the technological development and rise of virtual worlds, these spaces are becoming more and more attractive for cybercriminals, hidden behind avatars and fictitious identities. Since access to these spaces is not restricted or controlled, some impostors take advantage of gaining unauthorized access and practicing cyber criminality. This paper proposes an identity management approach for securing access to virtual worlds. The major purpose of the suggested solution is to install a strong security mechanism to protect virtual identities represented by avatars. Thus, only legitimate users, through their corresponding avatars, are allowed to access the platform resources. Access is controlled by integrating an authentication process based on biometrics. In the request process for registration, a user fingerprint is enrolled and then encrypted into a watermark utilizing a cancelable and non-invertible algorithm for its protection. After a user personalizes their representative character, the biometric mark is embedded into the avatar through a watermarking procedure. The authenticity of the avatar identity is verified when it requests authorization for access. We have evaluated the proposed approach on a dataset of avatars from various virtual worlds, and we have registered promising performance results in terms of authentication accuracy, acceptation and rejection rates.

Keywords: Identity management, security, biometrics authentication and authorization, avatar, virtual world.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1125953

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1659

References:


[1] M. Buzinkay, Commercial Transactions in the Virtual World: Issues and Opportunities, City University of HK Press, pp. 245-260.
[2] C. Pearce, B. R. Blackburn, C. Symborski, “Virtual worlds survey report: a trans-world study of non-game virtual worlds – demographics, attitudes, and preferences,” 2015.
[3] H. Lin, H. Wan, “Avatar creation in virtual worlds: behaviors and motivations”, Computers in Human Behavior, vol. 34, pp. 213-218, 2014.
[4] C. Mettouris, V. Maratou, D. Vuckovic, G. A. Papadopoulos, and M. Xenos, “Information security awareness through a virtual world: an end-user requirements analysis,” in Proc. 5th International Conference on Information Society and Technology – ICIST 2015, Kopaonik, 2015, pp. 273-278
[5] F. Farahmand, A. Yadav, and E. H. Spafford, “risks and uncertainties in virtual worlds: an educators’ perspective,” Journal of Computing in Higher Education, vol. 25, no. 2, pp 49-67, 2013.
[6] A. Ar-Raqib, ‎E. Mozley Roche, “Virtual worlds real terrorism,” Den Haag: Aardwolf Publications, 2010, pp. 75-85.
[7] C. Y. Lee, M. Warren, “Security issues within virtual worlds such as Second Life,” in Proc. 5th Australian Information Security Management Conference, Perth, 2007, pp. 44.
[8] A. Dudley, J. Braman, Y. Wang, G. Vincenti, and D. Tupper, “Security, legal, and ethical implications of using virtual worlds,” in Proc. 14th World Multi-Conference on Systemics, Cybernetics and Informatics, Orlando, 2010.
[9] B. Carminati, E. Ferrari, and M. Viviani, “Security and trust in online social networks,” Synthesis Lectures on Information Security, Privacy, & Trust, vol. 4, no 3, pp. 1-120, 2013.
[10] J. Kultan. P. Schmidt “Identity and threats in the virtual world,” Management Information Systems. vol. 7, No. 4, pp. 021-025, 2012.
[11] R. Cowles, C. Jackson, and V. Welch,” Identity management for virtual organizations: a survey of implementations and model,” in Proc. 9th IEEE International Conference on e-Science, 2013.
[12] G. Cruz, A. Costa, P. Martins, R. Gonçalves, and J. Barroso, “Toward educational virtual worlds: should identity federation be a concern?” Educational Technology & Society, vol. 18, no 1, pp. 27–36, 2015.
[13] Y. Liu, Y. Chai, and Y. Liu, “Study on the model and algorithm of Internet trusted identity authentication system,” in Proc. IEEE 12th International Conference on e-Business Engineering, 2015
[14] W. A. Shier, S. N. Yanushkevich, “Biometrics in human-machine interaction,” in Proc. IEEE International Conference on Information and Digital Technologies, 2015, pp. 305-313.
[15] T. A. P. Sidhi, “Enhancing the network security with gray code,” World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering, vol. 10, no 3, pp. 1-5, 2016.
[16] Y. WU, “Data hiding by vector quantization in color image,” World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering, vol. 9, no 5, pp. 1155-1162, 2015.
[17] S. Bader, N. E. Ben Amara, “A securing access approach to virtual worlds based on 3D mesh watermarking of avatar's face,” in Proc. 4th International Conference on Image Processing Theory, Tools and Applications, Paris, 2014, pp. 1-6.
[18] S. Bader, N. E. Ben Amara, “SID-avatar database: a 3D avatar dataset for virtual world research,” in Proc. First International Conference Image Processing, Applications and Systems, Hammamet, 2014, pp. 1-5.