Skip to main content
Log in

A method for cryptographic key generation from fingerprints

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

Combining two known technologies—biometric and cryptographic—is an urgent problem. The main line of research in this direction is the use of biometric technologies for the control of cryptographic keys. In the present work, a method for the compact representation of fingerprints is proposed, and a method for cryptographic key generation on this basis is developed. The results of the experiments are appropriate for practical application. The generated keys can be used in cryptographic systems with secret and public keys.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Ratha, N.K., Connell, J.H., and Bolle, R.M., Enhancing Security and Privacy in Biometrics-Based Authentication Systems, IBM Systems J., 2001, vol. 40, no. 3, pp. 614–634.

    Article  Google Scholar 

  2. Schuckers, S.A.C., Spoofing and Anti-Spoofing Measures, Inform. Sec. Techn. Rep., 2002, vol. 7, no. 4, pp. 56–62.

    Article  Google Scholar 

  3. Alguliev, R.M., Imamverdiev, Ya.N., and Musaev, V.Ya., Methods of Vitality Detection in Biometric Systems, Vopr. Zash. Inform., 2009, no. 3 (86), pp. 16–21.

  4. Imamverdiev, Ya.N., Kerimova, L.E., and Musaev, V.Ya., Method of Detection of Real Fingerprints on the Basis of the Radon Transform, Autom. Cont. Comput. Sci., 2009, vol. 43, no. 5, pp. 270–275.

    Article  Google Scholar 

  5. Uludag, U., Pankanti, S., Prabhakar, S., and Jain, A., Biometric Cryptosystems: Issues and Challenges, Proc. IEEE, 2004, vol. 92, no. 6, pp. 948–960.

    Article  Google Scholar 

  6. Rathgeb, C. and Uhl, A., A Survey on Biometric Cryptosystems and Cancelable Biometrics, EURASIP J. Inform. Sec., 2011, vol. 2011:3. http://jis.eurasipjournals.com/content/2011/1/3

  7. Plaga, R., Biometric Keys: Suitable Cases and Achievable Information Content, Int. J. Inform. Sec., 2009, no. 8, pp. 447–454.

  8. Maltoni, D., Maio, D., Jain, A.K., and Prabhakar, S., Handbook of Fingerprint Recognition, Berlin: Springer-Verlag, 2009, 2nd Ed.

    Book  Google Scholar 

  9. Chang, E.-C., Shen, R., and Teo, F.W., Finding the Original Point Set Hidden among Chaff, Proc. ACM Symp. Inform., Comput. Commun. Sec., Taipei: Taiwan, 2006.

    Google Scholar 

  10. Kulikova, O.V., Biometric Cryptographic Systems and Their Applications, Bezopasnost’ Inform. Tekhnol., 2009, no. 3, pp. 53–58.

  11. Soutar, C., Roberge, D., Stoianov, A., et al., Biometric Encryption TM Using Image Processing, Proc. SPIE, 1998, vol. 3314, pp. 178–188.

    Article  Google Scholar 

  12. Juels, A. and Wattenberg, M., A Fuzzy Commitment Scheme, Proc. 6th ACM Conf. on Comput. Commun. Sec. (CCS’99), Ontario, 1999, pp. 28–36.

  13. Juels, A. and Sudan, M., A Fuzzy Vault Scheme, Proc. IEEE Int. Symp. on Inform. Theory (ISIT), Lausanne, 2002, p. 408.

  14. Nandakumar, K., Jain, A.K., and Pankanti, S.C., Fingerprint-Based Fuzzy Vault: Implementation and Performance, IEEE Trans. Inform. Forensics Sec., 2007, vol. 2, no. 4, pp. 744–757.

    Article  Google Scholar 

  15. Franssen, T., Zhou, X., and Busch, C., Fuzzy Vault for 3D Face Recognition Systems, Proc. Int. Conf. on Intell. Inform. Hiding Multimedia Signal Processing, 2008, pp. 1069–1074.

  16. Hao, F., Anderson, R., and Daugman, J., Combining Crypto with Biometrics Effectively, IEEE Trans. Comput., 2006, vol. 55, no. 9, pp. 1081–1088.

    Article  Google Scholar 

  17. Nandakumar, K. and Jain, A.K., Multibiometric Template Security Using Fuzzy Vault, Proc. 2nd IEEE Int. Conf. on Biometrics: Theory, Applications and Systems (BTAS’08), 2008, pp. 1–6.

  18. Scheirer, W.J. and Boult, T.E., Cracking Fuzzy Vaults and Biometric Encryption, Proc. Biometr. Symp., Baltimore, 2007.

  19. Kholmatov, A. and Yanikoglu, B., Realization of Correlation Attack against Fuzzy Vault Scheme, Proc. SPIE, 2008, vol. 6819, pp. 1–7.

    Google Scholar 

  20. Dodis, Y., Ostrovsky, R., Reyzin, L., and Smith, A., Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data, Proc. Adv. Crypt.-Eurocrypt’2004. Lecture Notes in Comp. Sci., 2004, vol. 3027, pp. 523–540.

    Article  Google Scholar 

  21. Adler, A., Vulnerabilities in Biometric Encryption Systems, Proc. Audio- and Video Based Biometric Person Authentication (AVBPA2005), Lecture Notes in Comput. Sci., 2005, vol. 3546, pp. 1100–1109.

    Article  Google Scholar 

  22. Boyen, X., Reusable Cryptographic Fuzzy Extractors, Proc. 11th ACM Conf. Comput. Commun. Sec. (CCS’2004), 2004, pp. 82–91.

  23. Morelos-Zaragoza, R., The Art of Error Correcting Coding. Methods, Algorithms, Application, New York: Wiley, 2006; Moscow: Tekhnosfera, 2006.

    Book  Google Scholar 

  24. Lee, H., Teoh, A.B.J., Jung, H.G., and Kim, J., A Secure Biometric Discretization Scheme for Face Template Protection, Future Generation Comput. Syst., 2012, vol. 28, no. 1, pp. 218–231.

    Article  Google Scholar 

  25. Jain, A.K., Prabhakar, S., Hong, L., and Pankanti, S., FingerCode: A Filterbank for Fingerprint Representation and Matching, Proc. Comput. Vision Pattern Recogn. (CVPR’99), 1999, pp. 187–193.

  26. Tico, M., Kuosmanen, P., and Saarinen, J., Wavelet Domain Features for Fingerprint Recognition, Electron. Lett., 2001, vol. 37, no. 1, pp. 21–22.

    Article  Google Scholar 

  27. Amornraksa, T. and Tachaphetpiboon, S., Fingerprint Recognition Using DCT Features, Electron. Lett., 2006, vol. 42, no. 9, pp. 522–523.

    Article  Google Scholar 

  28. Nanni, L. and Lumini, A., Local Binary Patterns for a Hybrid Fingerprint Matcher, Pattern Recogn., 2008, vol. 41, no. 11, pp. 3461–3466.

    Article  MATH  Google Scholar 

  29. Nanni, L. and Lumini, A., Descriptors for Image-Based Fingerprint Matchers, Expert Syst. Appl., 2009, vol. 36, no. 10, pp. 12414–12422.

    Article  Google Scholar 

  30. Teoh, A.B.J., Ling, D.N.C., and Song, O.T., An Efficient Fingerprint Verification System Using Integrated Wavelet and Fourier-Mellin Invariant Transform, Image Vision Comput., 2004, vol. 22, no. 6, pp. 503–513.

    Article  Google Scholar 

  31. Yang, J.C. and Park, D.S., Fingerprint Verification Based on Invariant Moment Features and Nonlinear BPNN, Int. J. Control, Automat., Syst., 2008, vol. 6, no. 6, pp. 800–808.

    Google Scholar 

  32. Mukundan, R. and Ramakrishnan, K.R., Moment Functions in Image Analysis. Theory and Application, Singapore: World Scientific, 1998.

    Book  Google Scholar 

  33. Gonzalez, R.C. and Woods, R.E., Digital Image Processing, New York: Prentice Hall, 2008, 3rd ed.; Moscow: Tekhnosfera, 2005.

    Google Scholar 

  34. Soifer, V.A., Kotlyar, V.V., Khonina, S.N., and Skidanov, R.V., Identification of Fingerprints Using the Directions Fields, Proc. 4th Russian-German Workshop’ Pattern Recognition and Image Analysis’. 1996, pp. 139–143.

  35. Pang, Y.H., Connie, T., Jin, A., and Ling, D., Palmprint Authentication with Zernike Moment Invariants, Proc. 3rd IEEE Int. Symp. on Signal Processing and Information Technology, 2003, pp. 199–202.

  36. Lu, C.-H. and Lu, Z.-Y., Zernike Moment Invariants Based Iris Recognition, Proc. 5th Chinese Conference on Biometric Recognition (SINOBIOMETRICS 2004. Lecture Notes Comput. Sci., 2005, vol. 3338, pp. 3–48.

    Google Scholar 

  37. Pang, Y.-H., Teoh, A.B.J., and Ngo, D.C.L., Enhanced Pseudo Zernike Moments in Face Recognition, IEICE Electronics Express, 2005, vol. 2, no. 3, pp. 70–75.

    Article  Google Scholar 

  38. Chu, W., Colbourn, C.J., and Dukes, P., Construction for Permutation Codes in Powerline Communications, Designs, Codes and Cryptography, 2004, vol. 32, nos 1–3, pp. 51–64.

    Article  MATH  MathSciNet  Google Scholar 

  39. Hussain, S.M. and A-Ajloni, N.M., Key Base Random Permutation (KBRP), J. Comput. Sci., 2006, vol. 2, no. 5, pp. 419–421.

    Article  Google Scholar 

  40. Menezes, A.J., van Oorschot, P.C., and Vanstone, S.A., Handbook of Applied Cryptography, CRC Press, 1997.

  41. Sutcu, Y., Rane, S., Yedidia, J.S., Draper, S.C., and Vetro, A., Feature Transformation of Biometric Templates for Secure Biometric Systems Based on Error Correcting Codes, Proc. Conf. on Computer Vision and Pattern Recognition Workshops (CVPRW), 2008, pp. 1–6.

  42. Federal Information Processing Standards Publication 180-3 (FIPS PUB 180-3): Secure Hash Standard (SHS). National Institute of Standards and Technology (NIST). 2008. http://csrc.nist.gov/publications/fips/fips180-3/fips180-3-final.pdf

  43. Chong, C.W., Raveendran, P., and Mukundan, R., Translation Invariants of Pseudo-Zernike Moments, Pattern Recognition, 2003, vol. 36, no. 8, pp. 1765–1773.

    Article  MATH  Google Scholar 

  44. Tuyls, P., Akkermans, A.H., Kevenaar, T.A., Schrijen, G.-J., Bazen, A.M., and Veldhuis, R., Practical Biometric Authentication with Template Protection, Proc. Audio and Video Based Biometric Person Authentication (AVBPA2005), Lecture Notes in Comput. Sci., 2005, vol. 3546, pp. 436–446.

    Article  Google Scholar 

  45. FVC2004, The 3rd International Competition for Fingerprint Verification Algorithms. http://bias.csr.unibo.it/fvc2004/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ya. N. Imamverdiev.

Additional information

Original Russian Text © Ya.N. Imamverdiev, L.V. Sukhostat, 2012, published in Avtomatika i Vychislitel’naya Tekhnika, 2012, No. 2, pp. 17–30.

About this article

Cite this article

Imamverdiev, Y.N., Sukhostat, L.V. A method for cryptographic key generation from fingerprints. Aut. Conrol Comp. Sci. 46, 66–75 (2012). https://doi.org/10.3103/S0146411612020022

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411612020022

Keywords

Navigation