Abstract
This paper proposes a novel methodology to generate efficient and secured key by using cryptographic techniques for the shared data to be secure. Conventional techniques depend on biometric features like face, fingerprint, iris, signature, hand geometry, keystroke, voice and the like for the extraction of key information. If a Biometric Key is lost or stolen, it is lost forever and perhaps for every application where the biometric is used, because a biometric is enduringly linked with a user and cannot be changed. In this paper we propose a technique to produce secured and efficient key from fingerprint so as to surmount these problems. The exibility and dependability of cryptography is enhanced with the utilization of cancellable biometric features. There are several biometric systems in existence that deal with cryptography. We propose a new approach which uses the features of finger print and RSA-2 algorithm to generate Cryptographic Key.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
AES Encrypt information, http://www.bitzipper.com/aes-encryption.html
Ang, R., Safavi-Naini, R., McAven, L.: Cancellable key-based fingerprint templates. In: Boyd, C., González Nieto, J.M. (eds.) ACISP 2005. LNCS, vol. 3574, pp. 242–252. Springer, Heidelberg (2005)
Announcing the Advanced Encryption Standard (AES), Federal Information, Processing Standards Publication 197 (November 26, 2001)
Chang, Y.J., Wende, Z., Chen, T.: Biometrics- based cryptographic key generation. In: IEEE International Conference on Multimedia and Expo, vol. 3, pp. 2203–2206 (2004)
Chen, B., Chandran, V.: Biometric Based Cryptographic Key Generation from Faces. In: Proceedings of the 9th Biennial Conference of the Australian Pattern Recognition Society on Digital Image Computing Techniques and Applications, pp. 394–401 (2007)
Connie, T., Teoh, A., Goh, M., Ngo, D.: Palmhashing: A novel approach for cancellable biometrics. Information Processing Letters 93(1), 1–5 (2005)
Feldmeier, D., Karn, P.: UNIX password security-Ten years later. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 44–63. Springer, Heidelberg (1990)
Feng, Y.C., Yuen, P.C., Jain, A.K.: A hybrid a Approach for face template protection. In: Proceedings of SPIE Conference of Biometric Technology for Human Identification, Orlando, USA, vol. 6944, p. ca.325 (2008)
Santos, M.F., Aguilar, J.F., Garcia, J.O.: Cryptographic key generation using handwritten signature. In: Proceedings of SPIE, Orlando, Fla, USA, vol. 6202, pp. 225–231 (April 2006)
GaborFilter, http://en.wikipedia.org/wiki/Gaborfilter
Hao, F., Anderson, R., Daugman, J.: Combining crypto with biometrics effectively. IEEE Transactions on Computers 55, 1081–1088 (2006)
Jain, L.C., Halici, U., Hayashi, I., Lee, S.B., Tsutsui, S.: Intelligent Biometric Techniques in Fingerprint and Face Recognition. CRC Press, Boca Raton (1999)
Klein: Foiling the cracker: A survey of, and improvements to, password security. In: Proceedings of the 2nd USENIX Security Workshop, pp. 5–14 (August 1990)
Lam, L., Lee, S.W., Suen, C.Y.: Thinning methodologies-A comprehensive survey. IEEE Transactions on Pattern Analysis and Machine Intelligence 14(9), 879 (1992)
Menezes, A.J., Oorschot, P.C.V., Vanstone, S.A.: Handbook of Applied Cryptography, p. 180. CRC Press, Boca Raton (1997)
Morris, R., Thompson, K.: Password security: A case history. Communications of the ACM 22(11), 594–597 (1979)
Maio, D., Maltoni, D.: Direct gray-scale minutiae detection in fingerprints. IEEE Transactions on Pattern Analysis and Machine Intelligence 19(1), 27–40 (1997)
Monrose, A., Reiter, M.K., Qi, L., Wetzel, S.: Cryptographic key generation from voice. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 202–213 (2001)
Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.K.: Biometric cryptosystems: Issues and challenges. Proceedings of the IEEE 92, 948–960 (2004)
Yeo, T., Tay, W.P., Tai, Y.Y.: Image Systems Engineering Program, Stanford University, Student project, http://scien.stanford.edu/class/ee368/projects2001/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mahesh, P.K., Gudigar, A. (2011). A Novel and Efficient Technique to Generate Secured Biometric Key Using Cryptography. In: Nagamalai, D., Renault, E., Dhanuskodi, M. (eds) Advances in Parallel Distributed Computing. PDCTA 2011. Communications in Computer and Information Science, vol 203. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24037-9_35
Download citation
DOI: https://doi.org/10.1007/978-3-642-24037-9_35
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-24036-2
Online ISBN: 978-3-642-24037-9
eBook Packages: Computer ScienceComputer Science (R0)