A stable cryptographic key generation from fingerprint biometrics using Gray code for secure data storage

被引:3
|
作者
Suresh, K. [1 ,2 ]
Pal, Rajarshi [2 ]
Balasundaram, S. R. [1 ]
机构
[1] Natl Inst Technol, Dept Comp Applicat, Tiruchirappalli, Tamil Nadu, India
[2] Inst Dev & Res Banking Technol, Ctr Excellence Cyber Secur, Hyderabad, Telangana, India
关键词
cryptographic key; key generation; bio-cryptosystems; fingerprint; biometrics; secure storage; reed-solomon code; Gray code; VAULT; AUTHENTICATION; SCHEME; ECG;
D O I
10.1504/IJICS.2023.128829
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptographic techniques play a major role in digital information security. In cryptography, securing/storing the cryptographic key is an arduous task. The proposed stable cryptographic key generation directly from fingerprint biometrics overcomes this security concern. It eradicates the need of storing a cryptographic key. Rather, the key can be generated from a fingerprint biometrics on a need basis. In this work, a novel Gray code-based method is introduced to generate a stable cryptographic key from fingerprint. Usage of Gray code representation significantly reduces the number of mismatch bits between the generated bit strings from the two instances of the same fingerprint. Hence, Reed-Solomon error correction code is able to successfully correct the errors which may occur due to variations in captured images of the same fingerprint. This generated bit string is used in a symmetric key setup for secure data storage.
引用
收藏
页码:366 / 398
页数:33
相关论文
共 41 条
  • [31] Secure Data Aggregation and Transmission System for Wireless Body Area Networks Using Twofish Symmetric Key Generation
    Nagasundharamoorthi, Insozhan
    Venkatesan, Prabhu
    Velusamy, Parthasarathy
    PERTANIKA JOURNAL OF SCIENCE AND TECHNOLOGY, 2024, 32 (06): : 2903 - 2929
  • [32] Using Data Visualization to Facilitate Secure Engineering Hardening Your Code through Improved Next Generation softSec Vis
    Rodgers, Jeremy
    Jaramillo, David
    Wang, Jun
    IEEE SOUTHEASTCON 2014, 2014,
  • [33] A novel hybrid cryptographic framework for secure data storage in cloud computing: Integrating AES-OTP and RSA with adaptive key management and Time-Limited access control
    Shivaramakrishna, D.
    Nagaratna, M.
    ALEXANDRIA ENGINEERING JOURNAL, 2023, 84 : 275 - 284
  • [34] Secure and Efficient Group Based Data Retrieval from Cloud Storage Using Obfuscation and Data Mining Techniques
    Suthar, Krunal
    Patel, Hiral
    2017 INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND ITS ENGINEERING APPLICATIONS (ICSOFTCOMP), 2017,
  • [35] Provably Secure Data Sharing Approach for Personal Health Records in Cloud Storage Using Session Password, Data Access Key, and Circular Interpolation
    John, Naveen
    Sam, Shatheesh
    INTERNATIONAL JOURNAL ON SEMANTIC WEB AND INFORMATION SYSTEMS, 2021, 17 (04) : 76 - 98
  • [36] EEG-based identification and cryptographic key generation system using extracted features from transformer-based models
    Zeynali, Mahsa
    Narimani, Haniyeh
    Seyedarabi, Hadi
    SIGNAL IMAGE AND VIDEO PROCESSING, 2024, 18 (12) : 9331 - 9346
  • [37] Advanced chunk-based data deduplication framework for secure data storage in cloud using hybrid heuristic assisted optimal key-based encryption
    Ruba, S.
    Kalpana, A. M.
    WIRELESS NETWORKS, 2025, : 3467 - 3489
  • [38] Secure speech-recognition data transfer in the internet of things using a power system and a tried-and-true key generation technique
    Wang, Zhe
    He, Shuangbai
    Li, Guoan
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (10): : 14669 - 14684
  • [39] Secured data storage in the cloud using logical Pk-Anonymization with Map Reduce methods and key generation in cloud computing
    Kumar, Sindhe Phani
    Anandan, R.
    Tchier, Fairouz
    Rajchakit, G.
    Park, Choonkil
    Tawfiq, Ferdous M. O.
    JOURNAL OF TAIBAH UNIVERSITY FOR SCIENCE, 2021, 15 (01): : 746 - 756
  • [40] Enhanced Clustering and Indoor Movement Path Generation from Wi-Fi Fingerprint Data Using Bounding Boxes and Grid Cells
    Shin, Hong-Gi
    Lee, Daesung
    Hwang, Chi-Gon
    Yoon, Chang-Pyo
    APPLIED SCIENCES-BASEL, 2023, 13 (19):