Skip to main content
Log in

Biometric-based cryptography for digital content protection without any key storage

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The traditional digital data security mechanisms follow either cryptography or authentication. The primary point of contention with these mechanisms remains either memorizing or securely storing the user’s credentials. The proposed work addresses this critical issue by presenting a fingerprint biometric-based mechanism to protect users’ digitized documents. In our approach, biometric features are extracted from the user’s fingerprint captured with a fingerprint biometric sensor. The extracted features are then used to generate a unique code utilizing the convolution coding principle. This unique code is further used to generate a cryptographic key for encryption and decryption of the user’s document. A sedulous investigation to our approach which includes experimentation with a variety of standard fingerprint images as the database starkly reveals a staggering 95.12 % true positive and 0 % as false negative. Further, the advantages of our approach are that it generates a unique key for each user and eliminates the storage of any biometric template or key. In addition, it is faster and accurate enough to develop any robust data storage security system.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Abn FH, Andersen R, Daugman J (2006) IEEE Trans Comput 55:1081

    Article  Google Scholar 

  2. Beng A, Teoh J, Toh K (2008) 3rd IEEE Conference on Industrial Electronics and Applications 5:2145

    Google Scholar 

  3. Chang Y, Zhung W, Chen T (2004) . In: IEEE Intl. Conf. on Multimedia and Expo, p 2203

  4. Choi H, Choi K, Kim J (2011) IEEE Trans Inf Forensics Secur 6:338

    Article  Google Scholar 

  5. Condurache A, Mertins A (2011) . In: IEEE 2011 International Conference on Digital Image Computing Techniques and Applications (DICTA), pp 487–493

  6. Dahake P, Nimbhorkar S (2015) . In: 2015 International Conference on Pervasive Computing (ICPC), pp 1–5

  7. Disk Encryption. http://windows.microsoft.com/en-in/windows-8/using-device-encryption

  8. Feng J (2008) Pattern Recogn 41(1):342

    Article  Google Scholar 

  9. FVC2004 Fingerprint Databases. http://bias.csr.unibo.it/fvc2004/Downloads

  10. Gaddam S, Lal M (2010) Intl J of Network Security 11(2):61

    Google Scholar 

  11. Gaddam S, Lal M (2010) Intl J of Network Security 11(2):9

    Google Scholar 

  12. Gottschlich C, Huckemann S (2014) IET Biom 3(4):291

    Article  Google Scholar 

  13. Haghighat M, Zonouz S, Abdel-mottaleb M (2015) Elsevier (Expert Systems With Applications) 42:7905

    Article  Google Scholar 

  14. Hao F, Anderson R, Daugman J (2006) IEEE TC 55(9):1081

    Google Scholar 

  15. Import or export certificates and private keys. http://windows.microsoft.com/en-in/windows/import-export-certificates-private-keys

  16. Jain A, Ross A, Uludag U (2005) European Signal Processing Conference 5:168

    Google Scholar 

  17. Jaganathan P, Rajinikannan M (2011) . In: 2011 International Conference on Logic, Information, Control and Computation. Springer-Verlag, Berlin Heidelberg, pp 281–288

  18. Jianjiang F, Zhou J (2011) . In: 2011 International Conference on and-Based Biometrics (ICHB), pp 1–6

  19. Johannesson R, Zigangirov K (1999) Fundamentals of Convolutional Coding, 1999th edn Wiley-IEEE Press

  20. Kanade S, Camara D, Krichen E, Petrovska-Delacretaz D, Dorizzi B (2008) . In: Proceedings of the 6th Biometrics Symposium (BSYM 2008) (Tampa, Florida USA), pp 59–64

  21. Kanade S, Petrovska-Delacretaz D, Bernadette D (2009) . In: Proceedings of the 3rd IEEE International Conference on Biometrics: Theory, applications, and systems (BTAS) (washington, DC), pp 1–7

  22. Kanade S, Petrovska-Delacretaz D, Dorizzi B (2010) . In: Proceedings of the 4th IEEE International Conference on Biometrics: Theory applications and systems (BTAS) (washington, DC), pp 1–7

  23. Kaur M, Sofat S, Saraswat D (2010) Int J Comput Appl 4:0975

    Google Scholar 

  24. Lalithamani KSN (2009) IEEE Intl Conf on Adv in Recent Techn in Comm and Computing 9:47

    Google Scholar 

  25. Li A K S (2013) IEEE Trans Inf Forensics Secur 8:350

    Article  Google Scholar 

  26. Li C, Hu J (2016) IEEE Trans Inf Forensics Secur 11(3):543

    Article  Google Scholar 

  27. Maheshwari R, Gupta A, Chandra A (2015) . In: 2nd Intl, Conf. on Computing for Sustainable Global Development (INDIACom), pp 1247–1250

  28. Microsoft Operating System. http://www.microsoft.com/en-us/windows

  29. Msiza I, Malumedzha T, Betechuoh B (2011) International Journal of Machine Learning and Computing 1(3):8

    Google Scholar 

  30. Murillo-Escobar M, Cruz-Hernandez C, Abundiz-Perez F, Lopez-gutierrez R (2015) Elsevier (Expert Systems with Applications) 42:8198

    Article  Google Scholar 

  31. Nagar A, Nandakumar K, Jain A (2012) IEEE Trans Inf Forensics Secur 7:255

    Article  Google Scholar 

  32. Nguyen T, Wanga Y, Li R (2013) Journal of Information Security and Applications (Elsevier) 18:206

    Article  Google Scholar 

  33. Nguyen T, Wang Y, Ha Y, Li R (2015) IET Biom 4(1):29

    Article  Google Scholar 

  34. (2013) NIST Special Database 4 (Fingerprint). http://www.nist.gov/srd/nistsd4.cfm

  35. Password protect documents, workbooks, and presentations. https://support.office.com/en-au/article/Password-protect-documents

  36. Patil S, Bhagat K, Bhosale S, Deshmukh M (2015) . In: 2015 IEEE Intl. Conf. on Pervasive Computing (ICPC), pp 1–4

  37. Peng L, Xin Y, Hua Q, Kai C, Eryun L, Jie T (2012) Elsevier (Expert Systems With Applications) 39:6562

    Article  Google Scholar 

  38. Ratha N, Chikkerur S, Connell J, Bolle R (2007) IEEE Trans Pattern Anal Mach Intell 29(4):561

    Article  Google Scholar 

  39. Ross A, Nandakumar K, Jain A (2006) Handbook of Multibiometrics (Springer-Verlag)

  40. Saggaf A, Lahouari G, Acharya S (2012) . In: IEEE National Workshop on Information Assurance Research, pp 1–5

  41. Short N, Abbott A, Hsiao M, Fox E (2012) IET Biom 1(1):82

    Article  Google Scholar 

  42. Sousedik C, Busch C (2014) IET Biom 3(4):219

    Article  Google Scholar 

  43. Stallings W (2008) Cryptography and Network Security: Principles and Practice (Pearson)

  44. Steganography. https://en.wikipedia.org/wiki/Steganography

  45. Stinson D (1995) Crypto theory and practice CRC press

  46. Stoianov A (2010) . In: Proceedings of the 8th Annual International Conference on Privacy Security and Trust (PST) (Ottawa, ON), pp 231–235

  47. The Encrypting File Sytem (EFS). https://technet.microsoft.com/en-us/library/cc700811.aspx

  48. Upmanyu M, Namboodiri A, Srinathan K, Jawahar C (2010) IEEE Trans Inf Forensics Secur 5:255

    Article  Google Scholar 

  49. Wicker SB, Bhargava VK (1994) Reed-Solomon Codes and their applications IEEE press marketing

  50. Yang W, Jiankun H, Song W, Stojmenovic M (2014) Pattern Recogn (Elsevier) 47(3):1309

    Article  Google Scholar 

  51. Zhang B, Zhang S, Zhang J, Jing X (2011) . In: 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology (IC-BNMT), pp 664–669

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gaurang Panchal.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Panchal, G., Samanta, D. & Barman, S. Biometric-based cryptography for digital content protection without any key storage. Multimed Tools Appl 78, 26979–27000 (2019). https://doi.org/10.1007/s11042-017-4528-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-4528-x

Keywords

Navigation