Methods of reducing bio-cryptographic algorithms computational complexity

被引:0
|
作者
Velciu, Marius-Alexandru [1 ,2 ]
Patriciu, Victor-Valeriu [1 ]
机构
[1] Mil Tech Acad, Dept Comp Sci, Bucharest, Romania
[2] Adv Technol Inst, Bucharest, Romania
关键词
bio-cryptographic algorithms; biometric encryption; Fuzzy Vault scheme; Reed-Solomon error correcting codes; Lagrange Interpolation; shared biocryptograms; FUZZY VAULT;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Traditional biometric systems have always been regarded with skepticism, due to the uniqueness and universality features of human biometrics once stolen or compromised, they cannot be safely replaced. For this reason, common efforts of Cryptography and biometric systems researchers gave birth to Bio-cryptography, a domain which proposes to overcome the main security issues associated with biometrics usage, by generating or securing existing cryptographic keys, using biometric data. The main advantages brought by Bio-cryptography are represented by eliminating the need for storing biometric templates and the flexibility of resulted bio-cryptograms. On the other hand, one major drawback concerning bio-cryptographic algorithms is their high consumption of computational resources, caused by the various mathematical processing and large amounts of data used. This paper proposes two methods of reducing bio-cryptographic algorithms computational complexity: the usage of error-correcting codes in the secret key recovery stage and the shared biocryptograms approach for the entire biometric encryption process.
引用
收藏
页码:153 / 158
页数:6
相关论文
共 50 条
  • [1] BIO-CRYPTOGRAPHIC PROTOCOLS WITH BIPARTITE BIOTOKENS
    Scheirer, W. J.
    Boult, T. E.
    2008 BIOMETRICS SYMPOSIUM (BSYM), 2008, : 9 - 16
  • [2] A pitfall in fingerprint bio-cryptographic key generation
    Zhang, Peng
    Hu, Jiankun
    Li, Cai
    Bennamoun, Mohammed
    Bhagavatula, Vijayakumar
    COMPUTERS & SECURITY, 2011, 30 (05) : 311 - 319
  • [3] Bio-cryptographic authentication in cloud storage sharing
    Velciu, Marius-Alexandru
    Patrascu, Alecsandru
    Patriciu, Victor-Valeriu
    2014 IEEE 9TH INTERNATIONAL SYMPOSIUM ON APPLIED COMPUTATIONAL INTELLIGENCE AND INFORMATICS (SACI), 2014, : 165 - 170
  • [4] An evaluation of the Reed-Solomon error-correcting codes usage for bio-cryptographic algorithms
    Velciu, Marius-Alexandru
    Patrascu, Alecsandru
    Patriciu, Victor-Valeriu
    2015 IEEE 10TH JUBILEE INTERNATIONAL SYMPOSIUM ON APPLIED COMPUTATIONAL INTELLIGENCE AND INFORMATICS (SACI), 2015, : 37 - 41
  • [5] A Bio-cryptographic framework for securing mobile devices content
    Velciu, Marius-Alexandru
    Patriciu, Victor-Valeriu
    Bica, Ion
    2016 IEEE 11TH INTERNATIONAL SYMPOSIUM ON APPLIED COMPUTATIONAL INTELLIGENCE AND INFORMATICS (SACI), 2016, : 37 - 41
  • [6] A bio-cryptographic system based on offline signature images
    Eskander, George S.
    Sabourin, Robert
    Granger, Eric
    INFORMATION SCIENCES, 2014, 259 : 170 - 191
  • [7] METHODS OF REDUCING THE COMPUTATIONAL COMPLEXITY OF FUZZY INFERENCE ALGORITHMS FOR IMPLEMENTATION ON A MICROCONTROLLER WITH LIMITED COMPUTATIONAL RESOURCES
    Zhartybayeva, M. G.
    Tatur, M. M.
    Shaverdo, M. M.
    Iskakov, K. T.
    EURASIAN JOURNAL OF MATHEMATICAL AND COMPUTER APPLICATIONS, 2019, 7 (01): : 65 - 78
  • [8] Reducing Computational Complexity of Gating Procedures Using Sorting Algorithms
    Viet Duc Nguyen
    Claussen, Tim
    2013 16TH INTERNATIONAL CONFERENCE ON INFORMATION FUSION (FUSION), 2013, : 1707 - 1713
  • [9] Fingerprint-Based Asymmetric Bio-Cryptographic Key Generation Using Convolution Network
    Maiti, Diptadip
    Basak, Madhuchhanda
    Das, Debashis
    FOURTH CONGRESS ON INTELLIGENT SYSTEMS, VOL 2, CIS 2023, 2024, 869 : 29 - 49
  • [10] Statistical Analysis and Security Estimation of Fingerprint Minutia Local Structure in Bio-cryptographic System
    Xi, Kai
    Hu, Jiankun
    Han, Fengling
    2011 6TH IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS (ICIEA), 2011, : 1016 - 1021