access icon free Fuzzy commitment scheme for generation of cryptographic keys based on iris biometrics

This work presents a method based on information-theoretic analysis of iris biometric that aims to extract homogeneous regions of high entropy. Successful extraction of these regions facilitates the development of effective systems for generation of cryptographic keys of lengths up to 400 bits per iris. At the same time, this approach allows for the application of simpler error correction codes with equal false accept rate levels, which reduces the overall complexity of this class of systems.

Inspec keywords: error correction codes; fuzzy set theory; public key cryptography; iris recognition; entropy; private key cryptography

Other keywords: cryptographic key generation; equal false accept rate levels; fuzzy commitment scheme; homogeneous regions; iris biometrics; error correction codes; information-theoretic analysis

Subjects: Cryptography; Combinatorial mathematics; Data security; Codes; Combinatorial mathematics; Image recognition; Computer vision and image processing techniques

References

    1. 1)
      • 11. Rathgeb, C., Uhl, A.: ‘Two-factor authentication or how to potentially counterfeit experimental results in biometric systems’. Proc. of the Int. Conf. on Image Analysis and Recognition, 2010, pp. 296305.
    2. 2)
      • 22. Adamovic, S., Milosavljevic, M.: ‘Information analysis of iris biometrics for the needs of cryptology key extraction’, Serb. J. Electr. Eng., 2013, 10, (1), pp. 112.
    3. 3)
      • 2. Davida, G.I., Frankel, Y., Matt., B.J., et al: ‘On the relation of error correction and cryptography to an offline biometric based identification scheme’. In Proceedings of WCC99, Workshop on Coding and Cryptography, 1999.
    4. 4)
      • 6. Hao, F., Chan, C.W.: ‘Private key generation from on-line handwritten signatures’, Inf. Manag. Comput. Sec., 2002, 10, (2), pp. 159164.
    5. 5)
      • 1. Soutar, C., Roberge, D., Stoianov, A., et al: ‘Biometric encryption’, in Nichols, R.K. (ed.): ‘ICSA guide to cryptography’ (McGraw-Hill Publishers, New York, 1999).
    6. 6)
      • 10. Clancy, T.C., Kiyavash, N., Lin, D.J.: ‘Secure smart card-based fingerprint authentication’. Proc. ACM SIGMM Workshop Biometrics Methods and Application (WBMA), 2003.
    7. 7)
      • 29. Zhou, X., Kuijper, A., Veldhuis, R., et al: ‘Quantifying privacy and security of biometric fuzzy commitment’. Biometrics (IJCB), 2011 Int. Joint Conf. on, Washington, DC, 2011, pp. 18.
    8. 8)
      • 7. Tuyls, P., Akkermans, A.H.M., Kevenaar, T.A.M., et al: ‘Practical biometric authentication with template protection’. Proc. of the 5th Int. Conf. on Audio- and Video-Based Biometric Person Authentication, AVBPA'05, 2005, pp. 436446.
    9. 9)
      • 13. Bringer, J., Chabanne, H., Cohen, G., Kindarji, B., Zemor, G., et al: ‘Theoretical and practical boundaries of binary secure sketches’, IEEE Trans. Inf. Forensics Sec., 20083, (4), pp. 673683.
    10. 10)
      • 18. Shannon, C.E.: ‘A mathematical theory of communication’, Bell Syst. Techn. J., 1948, 27, pp. 379423, 623–656.
    11. 11)
      • 3. Hao, F., Anderson, R., Daugman, J.: ‘Combining crypto with biometrics effectively’, IEEE Trans. Comput., 2006, 55, (9), pp. 10811088.
    12. 12)
      • 20. Daugman, J.: ‘How iris recognition works’, IEEE Trans. Circuits Syst. Video Technol., 2004, 14, pp. 2130.
    13. 13)
      • 19. Shannon, C.E.: ‘Communication theory of secrecy systems’, Bell Syst. Tech. J., 1949, 28, pp. 656715.
    14. 14)
      • 4. Kanade, S., Camara, D., Krichen, E., Petrovska-Delacretaz, D., Dorizzi, B., et al: ‘Three factor scheme for biometric-based cryptographic key regeneration using iris,’ in The 6th Biometrics Symposium 2008 (BSYM2008), September 2008.
    15. 15)
      • 15. Rathgeb, C., Uhl, A.: ‘Statistical attack against fuzzy commitment scheme’, IET Biometrics, 2012, pp. 94104.
    16. 16)
      • 17. Álvarez Mariño, R., Hernández Álvarez, F., Hernández Encinas, L.: ‘A crypto-biometric scheme based on iris-templates with fuzzy extractors’, Inf. Sci., 2012, 195, pp. 91102.
    17. 17)
      • 26. Juels, A., Wattenberg, M.: ‘A fuzzy commitment scheme’. Proc. of the 6th ACM Conf. on Computer and Communications Security, 1999.
    18. 18)
      • 5. Garcia-Baleon, H.A., Alarcon-Aquino, V., Starostenko, O., et al: ‘Bimodal biometric system for cryptographic key generation using wavelet’. IEEE Mexican Int. Conf. on Computer Science, 2009, pp. 186196.
    19. 19)
      • 9. Monrose, F., Reiter, M.K., Li, Q., et al: ‘Cryptographic key generation from voice’. Proc. of the 2001 IEEE Symp. on Security and Privacy, May 2001.
    20. 20)
      • 23. Adamovic, S., Savic, A.G., Milosavljevic, M., et al: ‘Texture analysis of iris biometrics based on adaptive size neighborhood entropy and linear discriminant analysis’. Int. Scientific Conf. – Sinteza, Serbia, April 2014, pp. 658660.
    21. 21)
      • 14. Kelkboom, E.J.C., Breebaart, J., Kevenaar, T.A.M., et al: ‘Preventing the decodability attack based cross-matching in a fuzzy commitment scheme’, IEEE Trans. Inf. Forensics Sec., 2011, pp. 107121.
    22. 22)
      • 12. Daugman, J.: ‘The importance of being random’, Stat. Princ. Iris Recognit., Pattern Recognit., 2003, 36, (2), pp. 279291.
    23. 23)
      • 16. Maiorana, E., Campisi, P., Neri, A.: ‘IRIS template protection using a digital modulation paradigm’. 2014 IEEE Int. Conf. on Acoustics, Speech and Signal Processing (ICASSP), Florence, 2014, pp. 37593763.
    24. 24)
      • 8. van der Veen, M., Kevenaar, T., Schrijen, G.-J., et al: ‘Face biometrics with renewable templates’. Proc. SPIE 6072, Security, Steganography, and Watermarking of Multimedia Contents VIII, 60720J, February 2006.
    25. 25)
      • 25. Daugman, J.: ‘Uncertainty relation for resolution in space, spatial frequency, and orientation optimized by two-dimensional visual cortical filters’, J. Opt. Soc. Am. A, 1985, 2, (7), pp. 11601169.
    26. 26)
      • 24. Masek, L.: ‘Recognition of human iris patterns for biometric identification iris recognition’, http://www.csse.uwa.edu.au/~pk/studentprojects/libor/, accessed 15 October 2012.
    27. 27)
      • 21. Gonzalez, R.C., Woods, R.E., Eddins, S.L.: ‘Digital image processing using MATLAB’ (Prentice-Hall, New Jersey, 2003).
    28. 28)
      • 28. Goh, A., Ngo, D.C.L.: ‘Computation of cryptographic keys from face biometrics. communications and multimedia security’. ‘Advanced techniques for network and data protection’ (Springer Berlin Heidelberg, 2003), pp. 113.
    29. 29)
      • 27. Biometrics Ideal Test, http://biometrics.idealtest.org, accessed 15 October 2013.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-bmt.2016.0061
Loading

Related content

content/journals/10.1049/iet-bmt.2016.0061
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading