Advertisement

Cryptographic Key Management Using Fuzzy Vault Based on Statistical Analysis of Iris

  • Mrunal Fatangare
  • K. N. Honwadkar
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 250)

Abstract

We can make a blend of cryptography and biometric to achieve a upcoming security tool. Using unique biometric identity of a person the keys for cryptosystem can be made secure. Within biometric cryptosystems the advantages of biometric authentication are introduced to generic cryptographic key management systems to enhance security.Iris is one of the proven and accurate means to identify person and it does not change throughout life of a person. This paper presents a biometric solution to cryptographic key management problem using iris based fuzzy vault.

Keywords

Biocryptosystem iris fuzzy vault polynomial reconstruction 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Juels, Wattenberg, M.: A fuzzy commitment scheme. In: Proc. of Sixth ACM Conf. on Computer and Communication Security, pp. 28–36 (1999)Google Scholar
  2. 2.
    Jules, Sudan, M.: A fuzzy vault scheme. In: Proc. IEEE Int. Symp. Inform. Theory, Lausanne, Switzerland, p. 408 (2002)Google Scholar
  3. 3.
    Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.K.: Biometric cryptosystems: Issues and challenges. In: Proc. IEEE (Special Issue Multimedia Security for Digital Rights Management), vol. 92(6), pp. 948–960 (June 2004)Google Scholar
  4. 4.
    Jain, A.K., Pankanti, S., Uludag, U.: Department of Computer Science and Engineering, “Fuzzy vault for fingerprint”, Michigan State University, East Lansing, MI, 48824 2. Exploratory Computer Vision Group, IBM T.J. Watson Research Center, Yorktown Heights, NY, 10598Google Scholar
  5. 5.
    Juels, A.: RSA laboratories, 174 middlesex turnpike, bedford, ma 01730, USA, Madhu Sudan Massachusetts Institute of Technology, 32 Vassar street, Cambridge, MA 02139, USA, “A Fuzzy Vault Scheme”, RSA Lab, Received November 27, 2002; Revised January 12, 2005; Accepted February 16, 2005Google Scholar
  6. 6.
    Nandakumar, K., Jain, A.K., Pankanti, S.: Fingerprint-Based Fuzzy Vault: Implementation and Performance. IEEE Transactions on Information Forensics and Security 2(4) (December 2007)Google Scholar
  7. 7.
    Nandakumar, K., Nagar, A., Jain, A.K.: Hardening Fingerprint Fuzzy Vault using Password. In: International Conference on Biometrics, pp. 927–938 (2007)Google Scholar
  8. 8.
    Jain, A.K., Nandakumar, K., Nagar, A.: Biometric Template Security. EURASIP Journal on Advances in Signal Processing, Special Issue on Biometrics (January 2008)Google Scholar
  9. 9.
    Srinivasa Reddy, E., Babu, R.: Performance of Iris Based Hard Fuzzy Vault. IJCSNS International Journal of Computer Science and Network Security 8(1) (January 2008)Google Scholar
  10. 10.
    Srinivasa Reddy, E., Babu, R.: Authentication using fuzzy vault based on iris texture. In: Second Asia international Conference on Modeling & Simulation, pp. 361–368 (2008)Google Scholar
  11. 11.
    Kyaw, K.S.S.: Iris recognition system using statistical features for Biometric identification. In: International Conference on Electronic Computer Technology, pp. 554–556 (2009)Google Scholar
  12. 12.
    Gonzalez, R.C., Woods, R.E.: Book- digital Image Processing, p. 522. Pearson EducationGoogle Scholar
  13. 13.
    Fatangare, M., Honwadkar, K.N.: A Biometric Solution to Cryptographic Key Management Problem using Iris based Fuzzy Vault. International Journal of Computer Applications (0975 – 8887) 15(5) (February 2011)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Mrunal Fatangare
    • 1
  • K. N. Honwadkar
    • 2
  1. 1.MIT Sri Savitribai Phule PolytechnicPuneIndia
  2. 2.D.Y. Patil College of EnggPune UniversityPuneIndia

Personalised recommendations