A stable cryptographic key generation from fingerprint biometrics using Gray code for secure data storage

被引:3
|
作者
Suresh, K. [1 ,2 ]
Pal, Rajarshi [2 ]
Balasundaram, S. R. [1 ]
机构
[1] Natl Inst Technol, Dept Comp Applicat, Tiruchirappalli, Tamil Nadu, India
[2] Inst Dev & Res Banking Technol, Ctr Excellence Cyber Secur, Hyderabad, Telangana, India
关键词
cryptographic key; key generation; bio-cryptosystems; fingerprint; biometrics; secure storage; reed-solomon code; Gray code; VAULT; AUTHENTICATION; SCHEME; ECG;
D O I
10.1504/IJICS.2023.128829
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptographic techniques play a major role in digital information security. In cryptography, securing/storing the cryptographic key is an arduous task. The proposed stable cryptographic key generation directly from fingerprint biometrics overcomes this security concern. It eradicates the need of storing a cryptographic key. Rather, the key can be generated from a fingerprint biometrics on a need basis. In this work, a novel Gray code-based method is introduced to generate a stable cryptographic key from fingerprint. Usage of Gray code representation significantly reduces the number of mismatch bits between the generated bit strings from the two instances of the same fingerprint. Hence, Reed-Solomon error correction code is able to successfully correct the errors which may occur due to variations in captured images of the same fingerprint. This generated bit string is used in a symmetric key setup for secure data storage.
引用
收藏
页码:366 / 398
页数:33
相关论文
共 41 条
  • [1] Approach to cryptographic key generation from fingerprint biometrics
    Barman, Subhas
    Samanta, Debasis
    Chattopadhyay, Samiran
    INTERNATIONAL JOURNAL OF BIOMETRICS, 2015, 7 (03) : 226 - 248
  • [2] An Efficient Approach For Non-Invertible Cryptographic Key Generation From Cancelable Fingerprint Biometrics
    Lalithamani, N.
    Soman, K. P.
    2009 INTERNATIONAL CONFERENCE ON ADVANCES IN RECENT TECHNOLOGIES IN COMMUNICATION AND COMPUTING (ARTCOM 2009), 2009, : 47 - +
  • [3] Fractal-Based Approach to Secure Key Generation from Fingerprint and Iris Biometrics
    Dash, Priyabrata
    Sarma, Monalisa
    Samanta, Debasis
    COMPUTER VISION AND IMAGE PROCESSING, CVIP 2023, PT I, 2024, 2009 : 99 - 111
  • [4] Cryptographic Key Generation Scheme from Cancellable Biometrics
    Sarkar, Arpita
    Singh, Binod Kr
    Bhaumik, Ujjayanta
    PROGRESS IN COMPUTING, ANALYTICS AND NETWORKING, ICCAN 2017, 2018, 710 : 265 - 272
  • [5] RSA Key Generation From Cancelable Fingerprint Biometrics
    Sarkar, Arpita
    Singh, Binod Kr
    Bhaumik, Ujjayanta
    2017 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, CONTROL AND AUTOMATION (ICCUBEA), 2017,
  • [6] Two-factor-based RSA key generation from fingerprint biometrics and password for secure communication
    Suresh, K.
    Pal, Rajarshi
    Balasundaram, S. R.
    COMPLEX & INTELLIGENT SYSTEMS, 2022, 8 (04) : 3247 - 3261
  • [7] Two-factor-based RSA key generation from fingerprint biometrics and password for secure communication
    K. Suresh
    Rajarshi Pal
    S. R. Balasundaram
    Complex & Intelligent Systems, 2022, 8 : 3247 - 3261
  • [8] Cryptographic Key Generation from Biometric Data Using Wavelets
    Garcia-Baleon, H. A.
    Alarcon-Aquino, V.
    CERMA: 2009 ELECTRONICS ROBOTICS AND AUTOMOTIVE MECHANICS CONFERENCE, 2009, : 15 - 20
  • [9] Secure Data Storage in Cloud using Cryptographic Algorithms
    Kodumru, Nagasai Lohitha
    Supriya, M.
    2018 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2018,
  • [10] Cryptographic key generation from biometric data using lattice mapping
    Zheng, Gang
    Li, Wanqing
    Zhan, Ce
    18TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, VOL 4, PROCEEDINGS, 2006, : 513 - +