Abstract
Biometric cryptosystem (BCS) is an emerging field which performs user authentication in a secured environment. User authentication is handled using Biometrics and security using Cryptography, thus together forms BCS. Furthermore, the use of biometrics eliminates the need to remember passwords. The features extracted from the user’s biometric are used in place of a password for user authentication. BCS unleashes the key from the secured place upon successful user authentication. This paper proposes a novel method called binary robust independent elementary features based biometric cryptosystem (BRIEFBCS) for biometric key generation. The proposed method relies on a well known cryptographic construct, Fuzzy vault scheme, for data security. The motivation behind using BRIEF scheme for biometric cryptosystem is that the obtained descriptor are compact in size, faster to implement and suitable for low memory devices. BRIEFBCS comprises of three levels, i.e., Key generation, Enrollment and Authentication. The experiments have been carried on five ear databases viz. AMI, CP, IITD-v1, IITD-v2 and USTB-v2. The proposed method’s performance is evaluated and compared to state-of-the-art methods in terms of accuracy, false reject rate, vault construction time, key recovery time and Receiver Operating Characteristics curve. The proposed method has been demonstrated to outperform numerous state-of-the-art methods in both qualitative and quantitative aspects.
Similar content being viewed by others
Data availability
The datasets are publicly available.
References
Manisha, K.N.: Cancelable biometrics: a comprehensive survey. Artif. Intell. Rev. 53, 3403–3446 (2020)
Kholmatov, A., Yanikoglu, B.: Biometric cryptosystem using online signatures. In: International Symposium on Computer and Information Sciences, pp. 981–990. Springer, Berlin (2006)
Rathgeb, C., Uhl, A.: A survey on biometric cryptosystems and cancelable biometrics. EURASIP J. Inf. Secur. 2011, 1–25 (2011)
Juels, A., Sudan, M.: A fuzzy vault scheme. Des. Codes Cryptogr. 38, 237–257 (2006)
Huixian, L., Man, W., Liaojun, P., Weidong, Z.: Key binding based on biometric shielding functions. In: Fifth International Conference on Information Assurance and Security, pp. 19–22. IEEE, New York (2009)
Rathgeb, C., Uhl, A.: An iris-based interval-mapping scheme for biometric key generation. In: Proceedings of 6th International Symposium on Image and Signal Processing and Analysis, pp. 511–516 (2009)
Krivoku’ca, V., Abdulla, W.: Intra-class variance among multiple samples of the same person’s fingerprint in a cooperative user scenario. In: International Conference on Pattern Recognition Applications and Methods, pp. 77–92 (2014)
Koetter, R., Vardy, A.: Algebraic soft-decision decoding of Reed-Solomon codes. IEEE Trans. Inf. Theory. 49, 2809–2825 (2003)
Greg, C.: ISO/IEC JTC 1/SC 37 biometrics, https://www.iso.org/committee/313770.html. Accessed 12 Feb 2022
Calonder, M., Lepetit, V., Strecha, C., Fua, P.: Brief: binary robust independent elementary features. In: European Conference on Computer Vision, pp. 778–792 (2010)
Calonder, M., Lepetit, V., Ozuysal, M., Trzcinski, T., Strecha, C., Fua, P.: BRIEF: Computing a local binary descriptor very fast. IEEE Trans. Pattern Anal. Mach. Intell. 34, 1281–1298 (2011)
Rosten, E., Porter, R., Drummond, T.: Faster and better: a machine learning approach to corner detection. IEEE Trans. Pattern Anal. Mach. Intell. 32, 105–119 (2008)
Itakura, Y., Tsujii, S.: Proposal on a multifactor biometric authentication method based on cryptosystem keys containing biometric signatures. Int. J. Inf. Secur. 4, 288–296 (2005)
Hao, F., Anderson, R., Daugman, J.: Combining crypto with biometrics effectively. IEEE Trans. Comput. 55, 1081–1088 (2006)
Wk, Y., Abj, T., Dcl, N.: Replaceable and securely hashed keys from online signatures. IEICE Electron. Express. 3, 410–416 (2006)
Wang, Y., Plataniotis, K.N.: Fuzzy vault for face based cryptographic key generation. In: Biometrics Symposium, pp. 1–6. IEEE, New York (2007)
Nagar, A., Nandakumar, K., Jain, A.K.: A hybrid biometric cryptosystem for securing fingerprint minutiae templates. Pattern Recognit. Lett. 31, 733–741 (2010)
Leng, L., Zhang, J.: Dual-key-binding cancelable palmprint cryptosystem for palmprint protection and information security. J. Netw. Comput. Appl. 34, 1979–1989 (2011)
Inthavisas, K., Lopresti, D.: Secure speech biometric templates for user authentication. IET Biometrics. 1, 46–54 (2012)
Abikoye, O.C., Ojo, U.A., Awotunde, J.B., Ogundokun, R.O.: A safe and secured iris template using steganography and cryptography. Multimed. Tools Appl. 79, 23483–23506 (2020)
Sujitha, V., Chitra, D.: Highly secure palmprint based biometric template using fuzzy vault. Concurr. Comput. Pract. Exp. 31, 1–7 (2018). https://doi.org/10.1002/cpe.4513
Sujitha, V., Chitra, D.: A novel technique for multi biometric cryptosystem using fuzzy vault. J. Med. Syst. 43, 1–9 (2019)
Moon, D., Choi, W.Y., Moon, K., Chung, Y.: Fuzzy fingerprint vault using multiple polynomials. In: IEEE 13th International Symposium on Consumer Electronics, pp. 290–293 (2009)
Zhang, W., Chen, T.: Generalized optimal thresholding for biometric key generation using face images. In: IEEE International Conference on Image Processing, pp. 781–784 (2005)
Panchal, G., Samanta, D.: A novel approach to fingerprint biometric-based cryptographic key generation and its applications to storage security. Comput. Electr. Eng. 69, 461–478 (2018). https://doi.org/10.1016/j.compeleceng.2018.01.028
Ponce-Hernandez, W., Blanco-Gonzalo, R., Liu-Jimenez, J., Sanchez-Reillo, R.: Fuzzy vault scheme based on fixed-length templates applied to dynamic signature verification. IEEE Access 8, 11152–11164 (2020). https://doi.org/10.1109/ACCESS.2020.2965165
Loukhaoukha, K., Chouinard, J.Y., Berdai, A.: A secure image encryption algorithm based on Rubik’s cube principle. J. Electr. Comput. Eng. 2012, 1–13 (2012)
Gonzalez, E., Alvarez, L., Mazorra, L.: AMI ear database, https://ctim.ulpgc.es/research_works/ami_ear_database/basic (2012). Accessed 11 Jan 2022
Mathur, A., Conway, R.: Ear Recognition System Using Principal Component Analysis. University of Limerick, Limerick (2013)
Kumar, A., Wu, C.: Automated human identification using ear imaging. Pattern Recognit. 45, 956–968 (2012)
Z M.: USTB ear database. http://www1.ustb.edu.cn/resb/en/visit/visit.htm (2002). Accessed 12 Jan 2022
Funding
No funding is availed for this research work.
Author information
Authors and Affiliations
Contributions
NK conceptualized the idea, manuscript editing and proofreading, PK performed experiments and prepared the manuscript.
Corresponding author
Ethics declarations
Conflict of interest
There authors declare no competing interests.
Ethical approval
Not applicable.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Kaur, P., Kumar, N. BRIEFBCS: binary robust independent elementary features based fuzzy vault scheme in BCS. Cluster Comput 27, 3135–3148 (2024). https://doi.org/10.1007/s10586-023-04134-3
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-023-04134-3