A bio-cryptographic system based on offline signature images

被引:26
|
作者
Eskander, George S. [1 ]
Sabourin, Robert [1 ]
Granger, Eric [1 ]
机构
[1] Univ Quebec, Ecole Technol Super, Lab Imagerie Vis & &Intelligence Artificielle, Montreal, PQ H3C 1K3, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Biometric cryptosystems; Fuzzy vault; Offline signature verification; Boosting feature selection; Dissimilarity representation; FUZZY VAULT; VERIFICATION; AUTHENTICATION;
D O I
10.1016/j.ins.2013.09.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In bio-cryptography, biometric traits are replacing traditional passwords for secure exchange of cryptographic keys. The Fuzzy Vault (FV) scheme has been successfully employed to design bio-cryptographic systems as it can absorb a wide range of variation in biometric traits. Despite the intensity of research on FV based on physiological traits like fingerprints, iris, and face, there is no conclusive research on behavioral traits such as offline handwritten signature images, that have high inter-personal similarity and intra-personal variability. In this paper, a FV system based on the offline signature images is proposed. A two-step boosting feature selection (BFS) technique is proposed for selecting a compact and discriminant user-specific feature representation from a large number of feature extractions. The first step seeks dimensionality reduction through learning a population-based representation, that discriminates between different users in the population. The second step filters this representation to produce a compact user-based representation that discriminates the specific user from the population. This last representation is used to generate the FV locking/unlocking points. Representation variability is modeled by employing the BFS in a dissimilarity representation space, and it is considered for matching the unlocking and locking points during FV decoding. Proof of concept simulations involving 72,000 signature matchings (corresponding to both genuine and forged query signatures from the Brazilian Signature Database) have shown FV recognition accuracy of about 97% and system entropy of about 45-bits. (C) 2013 Elsevier Inc. All rights reserved.
引用
收藏
页码:170 / 191
页数:22
相关论文
共 50 条
  • [1] BIO-CRYPTOGRAPHIC PROTOCOLS WITH BIPARTITE BIOTOKENS
    Scheirer, W. J.
    Boult, T. E.
    2008 BIOMETRICS SYMPOSIUM (BSYM), 2008, : 9 - 16
  • [2] A pitfall in fingerprint bio-cryptographic key generation
    Zhang, Peng
    Hu, Jiankun
    Li, Cai
    Bennamoun, Mohammed
    Bhagavatula, Vijayakumar
    COMPUTERS & SECURITY, 2011, 30 (05) : 311 - 319
  • [3] Bio-cryptographic authentication in cloud storage sharing
    Velciu, Marius-Alexandru
    Patrascu, Alecsandru
    Patriciu, Victor-Valeriu
    2014 IEEE 9TH INTERNATIONAL SYMPOSIUM ON APPLIED COMPUTATIONAL INTELLIGENCE AND INFORMATICS (SACI), 2014, : 165 - 170
  • [4] Methods of reducing bio-cryptographic algorithms computational complexity
    Velciu, Marius-Alexandru
    Patriciu, Victor-Valeriu
    2014 IEEE 15TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND INFORMATICS (CINTI), 2014, : 153 - 158
  • [5] A Bio-cryptographic framework for securing mobile devices content
    Velciu, Marius-Alexandru
    Patriciu, Victor-Valeriu
    Bica, Ion
    2016 IEEE 11TH INTERNATIONAL SYMPOSIUM ON APPLIED COMPUTATIONAL INTELLIGENCE AND INFORMATICS (SACI), 2016, : 37 - 41
  • [6] Statistical Analysis and Security Estimation of Fingerprint Minutia Local Structure in Bio-cryptographic System
    Xi, Kai
    Hu, Jiankun
    Han, Fengling
    2011 6TH IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS (ICIEA), 2011, : 1016 - 1021
  • [7] Fingerprint-Based Asymmetric Bio-Cryptographic Key Generation Using Convolution Network
    Maiti, Diptadip
    Basak, Madhuchhanda
    Das, Debashis
    FOURTH CONGRESS ON INTELLIGENT SYSTEMS, VOL 2, CIS 2023, 2024, 869 : 29 - 49
  • [8] A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment
    Xi, Kai
    Ahmad, Tohari
    Han, Fengling
    Hu, Jiankun
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (05) : 487 - 499
  • [9] An evaluation of the Reed-Solomon error-correcting codes usage for bio-cryptographic algorithms
    Velciu, Marius-Alexandru
    Patrascu, Alecsandru
    Patriciu, Victor-Valeriu
    2015 IEEE 10TH JUBILEE INTERNATIONAL SYMPOSIUM ON APPLIED COMPUTATIONAL INTELLIGENCE AND INFORMATICS (SACI), 2015, : 37 - 41
  • [10] Offline signature verification system based on the online data
    Zimmer, Alessandro
    Ling, Lee Luan
    EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2008, 2008