A stable cryptographic key generation from fingerprint biometrics using Gray code for secure data storage

被引:3
|
作者
Suresh, K. [1 ,2 ]
Pal, Rajarshi [2 ]
Balasundaram, S. R. [1 ]
机构
[1] Natl Inst Technol, Dept Comp Applicat, Tiruchirappalli, Tamil Nadu, India
[2] Inst Dev & Res Banking Technol, Ctr Excellence Cyber Secur, Hyderabad, Telangana, India
关键词
cryptographic key; key generation; bio-cryptosystems; fingerprint; biometrics; secure storage; reed-solomon code; Gray code; VAULT; AUTHENTICATION; SCHEME; ECG;
D O I
10.1504/IJICS.2023.128829
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptographic techniques play a major role in digital information security. In cryptography, securing/storing the cryptographic key is an arduous task. The proposed stable cryptographic key generation directly from fingerprint biometrics overcomes this security concern. It eradicates the need of storing a cryptographic key. Rather, the key can be generated from a fingerprint biometrics on a need basis. In this work, a novel Gray code-based method is introduced to generate a stable cryptographic key from fingerprint. Usage of Gray code representation significantly reduces the number of mismatch bits between the generated bit strings from the two instances of the same fingerprint. Hence, Reed-Solomon error correction code is able to successfully correct the errors which may occur due to variations in captured images of the same fingerprint. This generated bit string is used in a symmetric key setup for secure data storage.
引用
收藏
页码:366 / 398
页数:33
相关论文
共 41 条
  • [21] A Trust Management Framework for Secure Cloud Data Storage Using Cryptographic Role-Based Access Control
    Zhou, Lan
    Varadharajan, Vijay
    Hitchens, Michael
    E-BUSINESS AND TELECOMMUNICATIONS, ICETE 2013, 2014, 456 : 226 - 251
  • [22] Securing Patient Data in Wireless Body Area Sensor Network Using Biometrics Based Key Generation
    Geetha, K.
    Chitra, S.
    Madhusudhanan, B.
    Gao, X. Z.
    CURRENT MEDICAL IMAGING, 2017, 13 (03) : 231 - 236
  • [23] Secure data hiding scheme using shape generation algorithm: a key based approach
    Gyan Singh Yadav
    Aparajita Ojha
    Multimedia Tools and Applications, 2018, 77 : 16319 - 16345
  • [24] Secure data hiding scheme using shape generation algorithm: a key based approach
    Yadav, Gyan Singh
    Ojha, Aparajita
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (13) : 16319 - 16345
  • [25] A Reliable and Secure Data Transmission in CEAACK MANETs using Distinct Dynamic Key with Classified Digital Signature Cryptographic Algorithm
    Sathiamoorthy, J.
    Ramakrishnan, B.
    Usha, M.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATIONS TECHNOLOGIES (ICCCT 15), 2015, : 144 - 151
  • [26] A Novel Key Generation Algorithm from Twitter Data Stream for Secure Communication in IoT
    Majumder, Pratham
    Sinha, Koushik
    2017 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS), 2017,
  • [27] Secure Key Generation from Speech signal Using Enhanced MFCC Algorithm
    Prabakaran, D.
    Ramachandran, Shyamala
    2021 IEEE INTERNATIONAL CONFERENCE ON MOBILE NETWORKS AND WIRELESS COMMUNICATIONS (ICMNWC), 2021,
  • [28] Hardware Obfuscation of AES IP Core Using PUFs and PRNG: A Secure Cryptographic Key Generation Solution for Internet-of-Things Applications
    Chhabra S.
    Lata K.
    SN Computer Science, 3 (4)
  • [29] Secure and Scalable Key Value Storage for Managing Big Data in Smart Cities using Intel SGX
    Feher, Marcell
    Lucani, Daniel E.
    Fonseca, Keiko
    Rosa, Marcelo
    Despotov, Bogdan
    2018 IEEE INTERNATIONAL CONFERENCE ON SMART CLOUD (SMARTCLOUD), 2018, : 70 - 76
  • [30] Flexible group key management and secure data transmission in mobile device communications using elliptic curve Diffie-Hellman cryptographic system
    Lin, Hua-Yi
    Hsieh, Meng-Yen
    Li, Kuan-Ching
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2016, 12 (01) : 47 - 52