Advertisement

K-Medoids-Based Random Biometric Pattern for Cryptographic Key Generation

  • H. A. Garcia-Baleon
  • V. Alarcon-Aquino
  • O. Starostenko
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5856)

Abstract

In this paper we report an approach for cryptographic key generation based on keystroke dynamics and the k-medoids algorithm. The stages that comprise the approach are training-enrollment and user verification. The proposed approach is able to verify the identity of individuals off-line avoiding the use of a centralized database. The performance of the proposed approach is assessed using 20 samples of keystroke dynamics from 20 different users. Simulation results show a false acceptance rate (FAR) of 5.26% and a false rejection rate (FRR) of 10%. The cryptographic key released by the proposed approach may be used in several encryption algorithms.

Keywords

keystroke dynamics biometrics cryptography k-medoids 

References

  1. 1.
    Clancy, T.C., Kiyavash, N., Lin, D.J.: Secure smart card-based fingerprint authentication. In: Proceedings of the 2003 ACM SIGMM Workshop of Biometrics Methods and Application (2003)Google Scholar
  2. 2.
    Goh, A., Ngo, D.C.L.: Computation of cryptographic keys from face biometrics. In: Lioy, A., Mazzocchi, D. (eds.) CMS 2003. LNCS, vol. 2828, pp. 1–13. Springer, Heidelberg (2003)Google Scholar
  3. 3.
    Hao, F., Anderson, R., Daugman, J.: Combining Cryptography with Biometrics Effectively, Computer Laboratory, University of Cambridge, Technical Report Number 640 (2005)Google Scholar
  4. 4.
    Hao, F., Chan, C.W.: Private key generation from on-line handwritten signatures. Information Management & Computer Society 10(4) (2002)Google Scholar
  5. 5.
    Zhang, Q., Couloigner, I.: A New and Efficient K-Medoid Algorithm for Spatial Clustering. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3482, pp. 181–189. Springer, Heidelberg (2005)Google Scholar
  6. 6.
    Barioni, M.C.N., Razente, H., Traina, A.J.M., Traina Jr., C.: Accelerating k-medoid-based algorithms through metric access methods. Journal of Systems and Software 81(3), 343–355 (2008)CrossRefGoogle Scholar
  7. 7.
    Kardi, T.: Minkowski Distance of order λ (2009), http://people.revoledu.com/kardi/tutorial/Similarity/MinkowskiDistance.html
  8. 8.
    Garcia-Baleon, H.A., Alarcon-Aquino, V.: Cryptographic Key Generation from Biometric Data Using Wavelets. In: Proceedings of the IEEE Electronics, Robotics and Automotive Mechanics Conference, CERMA 2009 (September 2009)Google Scholar
  9. 9.
    Garcia-Baleon, H.A., Alarcon-Aquino, V., Ramirez-Cruz, J.F.: Bimodal Biometric System for Cryptographic Key Generation Using Wavelet Transforms. In: Proceedings of the IEEE Mexican International Conference on Computer Science, ENC 2009 (September 2009)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • H. A. Garcia-Baleon
    • 1
  • V. Alarcon-Aquino
    • 1
  • O. Starostenko
    • 1
  1. 1.Deparment of Computing, Electronics, and MecatronicsUniversidad de las Americas PueblaCholula, PueblaMexico

Personalised recommendations