publication . Conference object . 2009

Multi-biometrics based cryptographic key regeneration scheme

Kanade, Sanjay Ganesh; Petrovska-Delacrétaz, Dijana; Dorizzi, Bernadette;
Open Access English
  • Published: 28 Sep 2009
  • Publisher: IEEE Systems, Man & Cybernetics Society
Abstract
International audience; Biometrics lack revocability and privacy while cryptography cannot detect the user's identity. By obtaining cryptographic keys using biometrics, one can achieve the properties such as revocability, assurance about user's identity, and privacy. In this paper, we propose a multi-biometric based cryptographic key regeneration scheme. Since left and right irises of a person are uncorrelated, we treat them as two independent biometrics and combine in our system. We propose a novel idea for feature level fusion through weighted error correction to obtain a multi-biometric feature vector which is used to get a secure template. A shuffling key wh...
Subjects
free text keywords: Multi-biometrics, Key generation, Error correcting codes, [SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processing, Cryptography
25 references, page 1 of 2

[1] S. Kanade, D. Camara, E. Krichen, D. Petrovska-Delacre´taz, and B. Dorizzi, “Three factor scheme for biometric-based cryptographic key regeneration using iris,” in The 6th Biometrics Symposium 2008 (BSYM2008), September 2008.

[2] A. A. Ross, K. Nandakumar, and A. K. Jain, Handbook of Multibiometrics, ser. International Series on Biometrics. Springer, 2006. [OpenAIRE]

[3] K. Nandakumar and A. K. Jain, “Multibiometric template security using fuzzy vault,” in IEEE Second International Conference on Biometrics: Theory, Applications and Systems, 2008. [OpenAIRE]

[4] J. Daugman, “The importance of being random: Statistical principles of iris recognition,” Pattern Recognition, vol. 36, no. 2, pp. 279-291, February 2003.

[5] A. Cavoukian and A. Stoianov, “Biometric encryption: A positive-sum technology that achieves strong authentication, security and privacy,” Information and privacy commissioner of Ontario, White Paper, March 2007.

[6] M. Savvides, B. V. Kumar, and P. Khosla, “Cancelable biometric filters for face recognition,” in Proceedings of the 17th International Conference on Pattern Recognition (ICPR04), vol. 3, August 2004, pp. 922-925.

[7] N. K. Ratha, S. Chikkerur, J. H. Connell, and R. M. Bolle, “Generating cancelable fingerprint templates,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 29, no. 4, pp. 561-572, April 2007.

[8] A. Lumini and L. Nanni, “An improved biohashing for human authentication,” Pattern Recognition, vol. 40, no. 3, pp. 1057-1065, March 2007.

[9] T. E. Boult, W. J. Scheirer, and R. Woodworth, “Revocable fingerprint biotokens: Accuracy and security analysis,” in IEEE Conference on Computer Vision and Pattern Recognition, June 2007, pp. 1-8.

[10] S. Kanade, D. Petrovska-Delacre´taz, and B. Dorizzi, “Cancelable Iris Biometrics and Using Error Correcting Codes to Reduce Variability in Biometric Data,” in IEEE Computer Society Conference on Computer Vision and Pattern Recognition, June 2009.

[11] F. Monrose, M. Reiter, and R. Wetzel, “Password hardening based on keystroke dynamics,” in Proceedings of the Sixth ACM Conference on Computer and communication Security (CCCS), 1999, pp. 73-82.

[12] F. Monrose, M. Reiter, Q. Li, and S. Wetzel, “Cryptographic key generation from voice,” in Proceedings of the IEEE Symposium on Security and Privacy, May 2001, pp. 202-213.

[13] C. Soutar, D. Roberge, A. Stoianov, R. Gilroy, and B. V. Kumar, “Biometric encryption,” in ICSA guide to Cryptography. McGrawHill, 1999.

[14] A. Juels and M. Wattenberg, “A fuzzy commitment scheme,” in Proceedings of the Sixth ACM Conference on Computer and communication Security (CCCS), 1999, pp. 28-36.

[15] F. Hao, R. Anderson, and J. Daugman, “Combining crypto with biometrics effectively,” IEEE Transactions on Computers, vol. 55, no. 9, pp. 1081-1088, 2006.

25 references, page 1 of 2
Powered by OpenAIRE Open Research Graph
Any information missing or wrong?Report an Issue
publication . Conference object . 2009

Multi-biometrics based cryptographic key regeneration scheme

Kanade, Sanjay Ganesh; Petrovska-Delacrétaz, Dijana; Dorizzi, Bernadette;