Abstract
Combining two known technologies—biometric and cryptographic—is an urgent problem. The main line of research in this direction is the use of biometric technologies for the control of cryptographic keys. In the present work, a method for the compact representation of fingerprints is proposed, and a method for cryptographic key generation on this basis is developed. The results of the experiments are appropriate for practical application. The generated keys can be used in cryptographic systems with secret and public keys.
Similar content being viewed by others
References
Ratha, N.K., Connell, J.H., and Bolle, R.M., Enhancing Security and Privacy in Biometrics-Based Authentication Systems, IBM Systems J., 2001, vol. 40, no. 3, pp. 614–634.
Schuckers, S.A.C., Spoofing and Anti-Spoofing Measures, Inform. Sec. Techn. Rep., 2002, vol. 7, no. 4, pp. 56–62.
Alguliev, R.M., Imamverdiev, Ya.N., and Musaev, V.Ya., Methods of Vitality Detection in Biometric Systems, Vopr. Zash. Inform., 2009, no. 3 (86), pp. 16–21.
Imamverdiev, Ya.N., Kerimova, L.E., and Musaev, V.Ya., Method of Detection of Real Fingerprints on the Basis of the Radon Transform, Autom. Cont. Comput. Sci., 2009, vol. 43, no. 5, pp. 270–275.
Uludag, U., Pankanti, S., Prabhakar, S., and Jain, A., Biometric Cryptosystems: Issues and Challenges, Proc. IEEE, 2004, vol. 92, no. 6, pp. 948–960.
Rathgeb, C. and Uhl, A., A Survey on Biometric Cryptosystems and Cancelable Biometrics, EURASIP J. Inform. Sec., 2011, vol. 2011:3. http://jis.eurasipjournals.com/content/2011/1/3
Plaga, R., Biometric Keys: Suitable Cases and Achievable Information Content, Int. J. Inform. Sec., 2009, no. 8, pp. 447–454.
Maltoni, D., Maio, D., Jain, A.K., and Prabhakar, S., Handbook of Fingerprint Recognition, Berlin: Springer-Verlag, 2009, 2nd Ed.
Chang, E.-C., Shen, R., and Teo, F.W., Finding the Original Point Set Hidden among Chaff, Proc. ACM Symp. Inform., Comput. Commun. Sec., Taipei: Taiwan, 2006.
Kulikova, O.V., Biometric Cryptographic Systems and Their Applications, Bezopasnost’ Inform. Tekhnol., 2009, no. 3, pp. 53–58.
Soutar, C., Roberge, D., Stoianov, A., et al., Biometric Encryption TM Using Image Processing, Proc. SPIE, 1998, vol. 3314, pp. 178–188.
Juels, A. and Wattenberg, M., A Fuzzy Commitment Scheme, Proc. 6th ACM Conf. on Comput. Commun. Sec. (CCS’99), Ontario, 1999, pp. 28–36.
Juels, A. and Sudan, M., A Fuzzy Vault Scheme, Proc. IEEE Int. Symp. on Inform. Theory (ISIT), Lausanne, 2002, p. 408.
Nandakumar, K., Jain, A.K., and Pankanti, S.C., Fingerprint-Based Fuzzy Vault: Implementation and Performance, IEEE Trans. Inform. Forensics Sec., 2007, vol. 2, no. 4, pp. 744–757.
Franssen, T., Zhou, X., and Busch, C., Fuzzy Vault for 3D Face Recognition Systems, Proc. Int. Conf. on Intell. Inform. Hiding Multimedia Signal Processing, 2008, pp. 1069–1074.
Hao, F., Anderson, R., and Daugman, J., Combining Crypto with Biometrics Effectively, IEEE Trans. Comput., 2006, vol. 55, no. 9, pp. 1081–1088.
Nandakumar, K. and Jain, A.K., Multibiometric Template Security Using Fuzzy Vault, Proc. 2nd IEEE Int. Conf. on Biometrics: Theory, Applications and Systems (BTAS’08), 2008, pp. 1–6.
Scheirer, W.J. and Boult, T.E., Cracking Fuzzy Vaults and Biometric Encryption, Proc. Biometr. Symp., Baltimore, 2007.
Kholmatov, A. and Yanikoglu, B., Realization of Correlation Attack against Fuzzy Vault Scheme, Proc. SPIE, 2008, vol. 6819, pp. 1–7.
Dodis, Y., Ostrovsky, R., Reyzin, L., and Smith, A., Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data, Proc. Adv. Crypt.-Eurocrypt’2004. Lecture Notes in Comp. Sci., 2004, vol. 3027, pp. 523–540.
Adler, A., Vulnerabilities in Biometric Encryption Systems, Proc. Audio- and Video Based Biometric Person Authentication (AVBPA2005), Lecture Notes in Comput. Sci., 2005, vol. 3546, pp. 1100–1109.
Boyen, X., Reusable Cryptographic Fuzzy Extractors, Proc. 11th ACM Conf. Comput. Commun. Sec. (CCS’2004), 2004, pp. 82–91.
Morelos-Zaragoza, R., The Art of Error Correcting Coding. Methods, Algorithms, Application, New York: Wiley, 2006; Moscow: Tekhnosfera, 2006.
Lee, H., Teoh, A.B.J., Jung, H.G., and Kim, J., A Secure Biometric Discretization Scheme for Face Template Protection, Future Generation Comput. Syst., 2012, vol. 28, no. 1, pp. 218–231.
Jain, A.K., Prabhakar, S., Hong, L., and Pankanti, S., FingerCode: A Filterbank for Fingerprint Representation and Matching, Proc. Comput. Vision Pattern Recogn. (CVPR’99), 1999, pp. 187–193.
Tico, M., Kuosmanen, P., and Saarinen, J., Wavelet Domain Features for Fingerprint Recognition, Electron. Lett., 2001, vol. 37, no. 1, pp. 21–22.
Amornraksa, T. and Tachaphetpiboon, S., Fingerprint Recognition Using DCT Features, Electron. Lett., 2006, vol. 42, no. 9, pp. 522–523.
Nanni, L. and Lumini, A., Local Binary Patterns for a Hybrid Fingerprint Matcher, Pattern Recogn., 2008, vol. 41, no. 11, pp. 3461–3466.
Nanni, L. and Lumini, A., Descriptors for Image-Based Fingerprint Matchers, Expert Syst. Appl., 2009, vol. 36, no. 10, pp. 12414–12422.
Teoh, A.B.J., Ling, D.N.C., and Song, O.T., An Efficient Fingerprint Verification System Using Integrated Wavelet and Fourier-Mellin Invariant Transform, Image Vision Comput., 2004, vol. 22, no. 6, pp. 503–513.
Yang, J.C. and Park, D.S., Fingerprint Verification Based on Invariant Moment Features and Nonlinear BPNN, Int. J. Control, Automat., Syst., 2008, vol. 6, no. 6, pp. 800–808.
Mukundan, R. and Ramakrishnan, K.R., Moment Functions in Image Analysis. Theory and Application, Singapore: World Scientific, 1998.
Gonzalez, R.C. and Woods, R.E., Digital Image Processing, New York: Prentice Hall, 2008, 3rd ed.; Moscow: Tekhnosfera, 2005.
Soifer, V.A., Kotlyar, V.V., Khonina, S.N., and Skidanov, R.V., Identification of Fingerprints Using the Directions Fields, Proc. 4th Russian-German Workshop’ Pattern Recognition and Image Analysis’. 1996, pp. 139–143.
Pang, Y.H., Connie, T., Jin, A., and Ling, D., Palmprint Authentication with Zernike Moment Invariants, Proc. 3rd IEEE Int. Symp. on Signal Processing and Information Technology, 2003, pp. 199–202.
Lu, C.-H. and Lu, Z.-Y., Zernike Moment Invariants Based Iris Recognition, Proc. 5th Chinese Conference on Biometric Recognition (SINOBIOMETRICS 2004. Lecture Notes Comput. Sci., 2005, vol. 3338, pp. 3–48.
Pang, Y.-H., Teoh, A.B.J., and Ngo, D.C.L., Enhanced Pseudo Zernike Moments in Face Recognition, IEICE Electronics Express, 2005, vol. 2, no. 3, pp. 70–75.
Chu, W., Colbourn, C.J., and Dukes, P., Construction for Permutation Codes in Powerline Communications, Designs, Codes and Cryptography, 2004, vol. 32, nos 1–3, pp. 51–64.
Hussain, S.M. and A-Ajloni, N.M., Key Base Random Permutation (KBRP), J. Comput. Sci., 2006, vol. 2, no. 5, pp. 419–421.
Menezes, A.J., van Oorschot, P.C., and Vanstone, S.A., Handbook of Applied Cryptography, CRC Press, 1997.
Sutcu, Y., Rane, S., Yedidia, J.S., Draper, S.C., and Vetro, A., Feature Transformation of Biometric Templates for Secure Biometric Systems Based on Error Correcting Codes, Proc. Conf. on Computer Vision and Pattern Recognition Workshops (CVPRW), 2008, pp. 1–6.
Federal Information Processing Standards Publication 180-3 (FIPS PUB 180-3): Secure Hash Standard (SHS). National Institute of Standards and Technology (NIST). 2008. http://csrc.nist.gov/publications/fips/fips180-3/fips180-3-final.pdf
Chong, C.W., Raveendran, P., and Mukundan, R., Translation Invariants of Pseudo-Zernike Moments, Pattern Recognition, 2003, vol. 36, no. 8, pp. 1765–1773.
Tuyls, P., Akkermans, A.H., Kevenaar, T.A., Schrijen, G.-J., Bazen, A.M., and Veldhuis, R., Practical Biometric Authentication with Template Protection, Proc. Audio and Video Based Biometric Person Authentication (AVBPA2005), Lecture Notes in Comput. Sci., 2005, vol. 3546, pp. 436–446.
FVC2004, The 3rd International Competition for Fingerprint Verification Algorithms. http://bias.csr.unibo.it/fvc2004/
Author information
Authors and Affiliations
Corresponding author
Additional information
Original Russian Text © Ya.N. Imamverdiev, L.V. Sukhostat, 2012, published in Avtomatika i Vychislitel’naya Tekhnika, 2012, No. 2, pp. 17–30.
About this article
Cite this article
Imamverdiev, Y.N., Sukhostat, L.V. A method for cryptographic key generation from fingerprints. Aut. Conrol Comp. Sci. 46, 66–75 (2012). https://doi.org/10.3103/S0146411612020022
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S0146411612020022