skip to main content
10.1145/1655925.1656183acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicisConference Proceedingsconference-collections
research-article

A secure cryptosystem from palm vein biometrics

Authors Info & Claims
Published:24 November 2009Publication History

ABSTRACT

This paper proposes a novel technique to generate an irrevocable cryptographic key from the biometric template. The biometric trait considered here is the palm vein. The technique proposed here utilises the minutiae features extracted from the pattern generated. The features include bifurcation points and ending points. Since other cryptographic keys are probable to theft or guess, keys generated from the biometric entity are more preferable as these biometric keys are attached with the user. Minutiae patterns generated from the palm vein are converted to cancelable templates which in turn are used for irrevocable key generation.

References

  1. S. Prabhakar, S. Pankati, A. K. Jain, "Biometric Recognition: Security and Privacy Concerns", IEEE Security and Priavcy, 2003, PP. 33--42. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Vein pattern recognition: www.fujitsu.comGoogle ScholarGoogle Scholar
  3. Chen. B and Chandran. V, "Biometric based cryptographic key generation from faces", 9th Biennial Conference of Australian Pattern Recognition Society on Digital Image Computing Techniques and Applications, pp:394 -401, 3--5 Dec, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Feng Hao, Ross Anderson, and John Daugman, "Combining Crypto with Biometrics Effectively", IEEE transactions on Computers, vol 55(9), 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. U. Uludag, S. Pankati, P. S. and A. K. Jain, "Biometric cryptosystems: Issues and Challenges", Proceedings of the IEEE 92, PP. 948--960, June 2004.Google ScholarGoogle ScholarCross RefCross Ref
  6. Abishek Nagar, Chaudhury. S, "Biometrics based Asymmetric cryptosystem Design Using Modified fuzzy Vault Scheme", 18th International Conference on Pattern Recognition, Vol 4, PP: 537--540, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. N. K. Ratha, J. H. Connell, and R. M. Bolle, "Enhancing security and privacy in biometrics-based authentication systems," IBM systems Journal, vol. 40, pp. 614--634, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Feng Hao, Ross Anderson, and John Daugman, "Combining Cryptography with Biometrics Effectively", Technical results published by University of Cambridge Computer Laboratory, 2005.Google ScholarGoogle Scholar
  9. A. Jain, R. M. Bolle, S. Pankati, "Biometrics:Personal Identification in Networked Society", Kluwer Academic Publishers, Dordrecht, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. P. MacGregor, R. Welford, "Veincheck: Imaging for security and personnel identification", Advanced imaging, Vol6(7), 1991, PP:52--56.Google ScholarGoogle Scholar
  11. P. L. Hawkes, D. O. Clayden, "Veincheck research for automatic identification of people", Presented at the Hand and Fingerprint Seminar at NPL, September 1993.Google ScholarGoogle Scholar
  12. Lingyu Wang, Graham Leedham, David Siu- Yeung cho," Minutiae Feature Analysis for Infrared Hand Pattern Biometrics", Pattern recognition Vol:41, ScienceDirect 2008, pp: 920--929. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. L. Waang, C. G. Leedham," A Thermal Vein Pattern Verification Systems", Pattern recognition and Image analysis, Lecture notes in Computer Science, Vol:3687, Springer, 2005, pp. 58--65. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. S. Im, H. Park, Y. Kim, S. Han, S. Kim, c. Kang, and C. Chung," A Biometric Identification System by Extracting Hand Vein Patterns", Journal of the Korean Physical Society, Vol: 38(3), 2001, pp. 268--272.Google ScholarGoogle Scholar
  15. Mohamed Shahin, Ahmed Badawi and Mohamed Kamel, "Biometric Authentication using Fast Correlation of Near Infrared hand Vein Patterns: International Journal of Biomedical sciences, Vol 2(3), 2007, ISSN 1306--1216.Google ScholarGoogle Scholar
  16. Eduard Sojka," A new and Efficient Algorithm for Detecting the corners in Digital images". Pattern recognition, Luc van Gool (Editor), LNCS 2449, pp.125 -132, Springer verlag, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A secure cryptosystem from palm vein biometrics

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICIS '09: Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
      November 2009
      1479 pages
      ISBN:9781605587103
      DOI:10.1145/1655925

      Copyright © 2009 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 24 November 2009

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader