Nothing Special   »   [go: up one dir, main page]

skip to main content
article

Approach to cryptographic key generation from fingerprint biometrics

Published: 01 September 2015 Publication History

Abstract

In crypto-biometric system CBS, biometric is combined with cryptography. In CBS, either accessing a cryptographic key is controlled with biometric or the key is generated from biometric features. This work is related to the latter approach in CBS. In such a system, protecting the privacy of the biometric data is an important concern. Further, there is a need to generate different cryptographic keys from the same biometric template of a user. Cancellable transformation of biometric data prior to the key generation is known as a solution. In this paper, we propose an approach to generate cryptographic key from cancellable fingerprint templates C t< small>< sub> of sender and receiver to ensure the privacy fingerprints at same time, it produces revocable key for application symmetric cryptography. the between-person variability c t< small>< sub>s guarantees the randomness which ensures that impostor users are not able to generate a genuine c t< small>< sub> to break the cryptographic key.< p>t<> t<> t<>

References

[1]
Cappelli, R., Erol, A., Maio, D. and Maltoni, D. (2000) 'Synthetic fingerprint image generation', Proceedings of International Conference on Pattern Recognition , Vol. 3, pp.475-478.
[2]
Chang, Y.J., Zhang, W. and Chen, T. (2004) 'Biometrics-based cryptographic key generation', ICME'04: Proceedings of IEEE International Conference on Multimedia and Expo , Vol. 3.
[3]
Chen, B. and Chandran, V. (2007) 'Biometric based cryptographic key generation from faces', Proceedings of 9th Biennial Conference of the Australian Pattern Recognition Society on Digital Image Computing Techniques and Applications , pp.394-401.
[4]
Daugman, J. (2003) 'The importance of being random: statistical principles of iris recognition', Pattern Recognition , Vol. 36, No. 2, pp.279-291.
[5]
Dutta, S., Chakraborty, S. and Mahanti, N.C. (2011) 'Fingerprint based cryptography technique for improved network security', Journal of Computer Science and Engineering , Vol. 5, No. 2, pp.11-18.
[6]
Dutta, S., Kar, A., Chatterji, B.N. and Mahanti, N.C. (2008) 'Network security using biometric and cryptography', Lecture Notes in Computer Science , Springer, ISBN-978-3-540-88457-6, pp.38-44.
[7]
Feng, H. and Wah, C.C. (2002) 'Private key generation from on-line handwritten signatures', Information Management &amp; Computer Security , Vol. 10, No. 4, pp.159-164.
[8]
Fingerprint Verification Competition (FVC) (2000) [online] http://bias.csr.unibo.it/fvc2000 (accessed 09/05/2012).
[9]
Fingerprint Verification Competition (FVC) (2002) [online] http://bias.csr.unibo.it/fvc2002 (accessed 09/05/2012).
[10]
Fingerprint Verification Competition (FVC) (2004) [online] http://bias.csr.unibo.it/fvc2004/ (accessed 09/05/2012).
[11]
Gaddam, S.V.K. and Lal, M. (2010) 'Efficient cancellable biometric key generation scheme for cryptography', International Journal of Network Security , Vol. 11, No. 2, pp.57-65.
[12]
Hao, F., Anderson, R. and Daugman, J. (2006) 'Combining crypto with biometrics effectively', IEEE Transactions on Computers , Vol. 55, No. 9, pp.1081-1088.
[13]
Jagadeesan, A. and Duraiswamy, K. (2010) 'Secured Cryptographic key generation from multimodal biometrics: feature level fusion of fingerprint and iris', International Journal of Computer Science and Information Security , Vol. 7, No. 2, pp.28-37.
[14]
Jain, A. and Uludag, U. (2002a) 'Hiding fingerprint minutiae in images', Proceedings of Third Workshop on Automatic Identification Advanced Technologies (AutoID) , pp.97-102.
[15]
Jain, A. and Uludag, U. (2002b) 'Hiding a face in a fingerprint image', Proceedings of 16th International Conference on Pattern Recognition , Vol. 3, pp.756-759.
[16]
Jain, A. and Uludag, U. (2003) 'Hiding biometric data', IEEE Transactions on Pattern Analysis and Machine Intelligence , Vol. 25, No. 11, pp.1494-1498.
[17]
Juels, A. and Wattenberg, M. (1999) 'A fuzzy commitment scheme', in Tsudik, G. (Ed.): Proc. 6th ACM Conf. Computer and Communications Security , pp.28-36.
[18]
Kanade, S., Camara, D., Krichen, E., Petrovska-Delacrétaz, D. and Dorizzi, B. (2008) 'Three factor scheme for biometric-based cryptographic key regeneration using iris', BSYM 2008: Proceedings of the 6th Biometrics Symposium , pp.59-64.
[19]
Kanade, S., Petrovska-Delacrétaz, D. and Dorizzi, B. (2009) 'Multi-biometrics based cryptographic key regeneration scheme', BTAS'09: Proceedings of the 3rd IEEE International Conference on Biometrics: Theory, Applications and Systems , pp.1-7.
[20]
Kanade, S., Petrovska-Delacrétaz, D. and Dorizzi, B. (2010) 'Generating and sharing biometrics based session keys for secure cryptographic applications', BTAS 2010: Proceedings of the 4th IEEE International Conference on Biometrics: Theory, Applications and Systems , pp.1-7.
[21]
Klein, D.V. (1990) 'Foiling the cracker: a survey of, and improvements to, password security', Proceedings of the 2nd USENIX Security Workshop , pp.5-14.
[22]
Kutter, M., Jordan, F. and Bossen, F. (1997) 'Digital signature of color images using amplitude modulation', Proc. SPIE , Vol. 3022, pp.518-526.
[23]
Lalithamani, N. and Soman, K.P. (2009) 'An effective scheme for generating irrevocable cryptographic key from cancellable fingerprint templates', International Journal of Computer Science and Network Security , Vol. 9, No. 3, pp.183-193.
[24]
Maltoni, D., Maio, D., Jain, A.K. and Prabhakar, S. (2003) Handbook of Fingerprint Recognition , Springer-Verlag, New York.
[25]
Merkow, M.S. and Breithaupt, J. (2006) Information Security: Principles and Practices , Pearson Prentice Hall, Upper Saddle River, NJ.
[26]
Mitnick, K., Simon, W. and Wozniak, S. (2002) The Art of Deception: Controlling the Human Element of Security , Wiley, New York.
[27]
Monrose, F., Reiter, M.K., Li, Q. and Wetzel, S. (2001) 'Cryptographic key generation from voice', Proceedings of IEEE Symposium on Security and Privacy , pp.202-213.
[28]
Nandakumar, K., Jain, A. and Pankanti, S. (2007) 'Fingerprint-based fuzzy vault: implementation and performance', IEEE Transactions on Information Forensics and Security , Vol. 2, No. 4, pp.744-757.
[29]
Neeta, D., Snehal, K. and Jacobs, D. (2006) 'Implementation of LSB steganography and its evaluation for various bits', ICDIM 2006: Proceedings of 1st International Conference on Digital Information Management , pp.173-178.
[30]
Pankanti, S. and Yeung, M.M. (1999) 'Verification watermarks on fingerprint recognition and retrieval', Proc. SPIE , Vol. 3657, pp.66-78.
[31]
Ratha, N.K., Chikkerur, S., Connell, J.H. and Bolle, R.M. (2007) 'Generating cancellable fingerprint templates', IEEE Transactions on Pattern Analysis and Machine Intelligence , Vol. 29, No. 4, pp.561-572.
[32]
Ratha, N.K., Connell, J.H. and Bolle, R.M. (2000) 'Secure data hiding in wavelet compressed fingerprint images', Proc. ACM Multimedia , pp.127-130.
[33]
Rathgeb, C. and Uhl, A. (2011) 'Context-based biometric key generation for iris', IET Computer Vision , Vol. 5, No. 6, pp.389-397.
[34]
Stallings, W. (2010) Cryptography and Network Security: Principles and Practice , 5th ed., Prentice Hall, Upper Saddle River, NY.
[35]
Uludag, U., Pankanti, S. and Jain, A.K. (2005) 'Fuzzy vault for fingerprints', Proc. Audio- and Video-Based Biometric Person Authentication , pp.310-319, Rye Town, NY,
[36]
Uludag, U., Pankanti, S., Prabhakar, S. and Jain, A.K. (2004) 'Biometric cryptosystems: issues and challenges', Proceedings of the IEEE , Vol. 92, No. 6, pp.948-960.
[37]
US National Institute of Standards and Technology (NIST) (2001) Advance Encryption Standard (AES) , p.197, Federal Information Processing Standards Publication.
[38]
Watson, C., Garris, M., Tabassi, E., Wilson, C., McCabe, M., Janet, S. and Ko, K. (2007) User's Guide to NIST Biometric Image Software (NBIS) , National Institute of Standards and Technology.

Cited By

View all
  • (2024)Toward design a secure protocol for updating remotely stored credentials of a crypto‐biometric framework for multi‐server environmentSecurity and Privacy10.1002/spy2.3397:1Online publication date: 9-Jan-2024
  • (2017)A novel secure key-exchange protocol using biometrics of the sender and receiverComputers and Electrical Engineering10.1016/j.compeleceng.2016.11.01764:C(65-82)Online publication date: 1-Nov-2017

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image International Journal of Biometrics
International Journal of Biometrics  Volume 7, Issue 3
September 2015
117 pages
ISSN:1755-8301
EISSN:1755-831X
Issue’s Table of Contents

Publisher

Inderscience Publishers

Geneva 15, Switzerland

Publication History

Published: 01 September 2015

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 22 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Toward design a secure protocol for updating remotely stored credentials of a crypto‐biometric framework for multi‐server environmentSecurity and Privacy10.1002/spy2.3397:1Online publication date: 9-Jan-2024
  • (2017)A novel secure key-exchange protocol using biometrics of the sender and receiverComputers and Electrical Engineering10.1016/j.compeleceng.2016.11.01764:C(65-82)Online publication date: 1-Nov-2017

View Options

View options

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media