Skip to main content

Strengthening a Cryptographic System with Behavioural Biometric

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNBI,volume 7339))

Abstract

The paper proposes a cryptographic system in which the encryption key has been associated both with the existing methods of verification of identity (knowledge and physical identifiers) as well as with biometrics. This combination allows spreading information about the marker and binding his relationship with the person entitled to use it. Biometric markers were extracted from the recorded voice and ECG signals which included the response of subjects to specific audio and visual stimuli. Results obtained from the experiments demonstrate the validity of presented concepts.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Agrafioti, F., Hatzinakos, D.: ECG biometric analysis in cardiac irregularity conditions. Signal, Image and Video Processing 3(4), 329–343 (2009), http://dx.doi.org/10.1007/s11760-008-0073-4,10.1007/s11760-008-0073-4 , doi:10.1007/s11760-008-0073-4

    Article  Google Scholar 

  2. Campbell, J.: Speaker recognition: a tutorial. Proceedings of the IEEE 85(9), 1437–1462 (1997)

    Article  Google Scholar 

  3. Hrynkow-Statkiewicz, K., Mitas, A.W.: Generatory psudolosowe w technice MVL w aspekcie zastosowań biometrycznych. ”Techniki Komputerowe”, Naukowy Biuletyn Informacyjny Instytutu Maszyn Matematycznych, 49–58 (2003)

    Google Scholar 

  4. Irvine, J.M., Israel, S.A., Scruggs, W.T., Worek, W.J.: Eigenpulse: Robust human identification from cardiovascular function. Pattern Recognition 41(11), 3427–3435 (2008), http://www.sciencedirect.com/science/article/B6V14-4SDGR0P-4/2/8098d719f839e50922a3cd042dba4d31

    Article  Google Scholar 

  5. Knuth, D.E.: The Art of Computer Programming. Seminumerical Algorithms, vol. 2. Addison-Wesley (1968)

    Google Scholar 

  6. Li, M., Narayanan, S.: Robust ECG biometrics by fusing temporal and cepstral information. In: 2010 20th International Conference on Pattern Recognition, ICPR, pp. 1326–1329 (August 2010)

    Google Scholar 

  7. Mitas, A.W.: Zastosowanie funkcji rejestru liniowego do osobistej ochrony danych w przesyle informacji. ”Techniki Komputerowe”, Naukowy Biuletyn Informacyjny Instytutu Maszyn Matematycznych 35(1), 55–61 (2000)

    Google Scholar 

  8. Mitas, A.W., Bugdol, M.D.: An Idea of Human Voice Reaction Measurement System under the Aspect of Behavioral Biometric. In: Piętka, E., Kawa, J. (eds.) Information Technologies in Biomedicine. AISC, vol. 69, pp. 219–228. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  9. Mitas, A.W., Bugdol, M.D., Plucinska, M.: Biometria a podpis elektroniczny – studium stosowalności. Elektronika – Konstrukcje, Technologie, Zastosowania 49(12), 160–163 (2008)

    Google Scholar 

  10. Mitas, A.W., Bugdol, M.D., Plucinska, M.: Biometryczne wzmacnianie podpisu cyfrowego - techniczne aspekty zastosowan. Elektronika – Konstrukcje, Technologie, Zastosowania 49(12), 164–167 (2008)

    Google Scholar 

  11. Mitas, A.W., Mostowski, D., Bugdol, M.D.: Kryptografia biometryczna w aspekcie wzmacniania podpisu elektronicznego. Techniki Komputerowe, Wydanie Specjalne Monograficzne 42(1), 71–81 (2008)

    Google Scholar 

  12. Mostowski, D.: Próbki biometryczne odcisków palców w zastosowaniu do kryptografii oraz parametryzacji bezpiecznego podpisu elektronicznego. Ph.D. thesis, Politechnika Slaska, Wydzial Automatyki, Elektroniki i Informatyki (2007)

    Google Scholar 

  13. Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.K.: Biometric cryptosystems: Issues and challenges. Proceedings of the IEEE 92(6), 948–960 (2004)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mitas, A.W., Bugdol, M.D. (2012). Strengthening a Cryptographic System with Behavioural Biometric. In: Piętka, E., Kawa, J. (eds) Information Technologies in Biomedicine. Lecture Notes in Computer Science(), vol 7339. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31196-3_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-31196-3_26

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-31195-6

  • Online ISBN: 978-3-642-31196-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics