Fuzzy vault for face based cryptographic key generation

被引:0
|
作者
Wang, Yongjin [1 ]
Plataniotis, K. N. [1 ]
机构
[1] Univ Toronto, Edward S Rogers Sr Dept Elect & Comp Engn, Toronto, ON M5S 3G4, Canada
来源
2007 BIOMETRICS SYMPOSIUM | 2007年
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper presents a method for changeable cryptographic key generation using face biometrics signal. A previously introduced scheme,fuzzy vault, is utilized for secure binding of randomly generated key with extracted biometrics features. The major technical difficulty is to map noisy biometrics representation to the exactly correct key. In this paper, the proposed method is based on 2-dimensional quantization of distance vectors between biometrics features and pairs of random vectors. A windowing process is applied to tolerate the variations of biometrics signals. Further, we also introduce a two-factor scheme, where the quantized distance vectors are generated with user-dependent random vectors. By integrating a second factor, both the biometrics and the key are changeable, and zero error rate can be obtained.
引用
收藏
页码:120 / 125
页数:6
相关论文
共 50 条
  • [11] Accelerometer and Fuzzy Vault-Based Secure Group Key Generation and Sharing Protocol for Smart Wearables
    Revadigar, Girish
    Javali, Chitra
    Xu, Weitao
    Vasilakos, Athanasios V.
    Hu, Wen
    Jha, Sanjay
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (10) : 2467 - 2482
  • [12] Biometric key binding: Fuzzy vault based on iris images
    Lee, Youn Joo
    Bae, Kwanghyuk
    Lee, Sung Joo
    Park, Kang Ryoung
    Kim, Jaihie
    ADVANCES IN BIOMETRICS, PROCEEDINGS, 2007, 4642 : 800 - +
  • [13] Cryptographic Key Generation from PUF Data Using Efficient Fuzzy Extractors
    Kang, Hyunho
    Hori, Yohei
    Katashita, Toshihiro
    Hagiwara, Manabu
    Iwamura, Keiichi
    2014 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2014, : 23 - 26
  • [14] FINGERPRINT-BASED KEY BINDING/RECOVERING SCHEME BASED ON FUZZY VAULT
    Feng Quan Su Fei Cai Anni(School of Telecommunication Engineering
    JournalofElectronics(China), 2008, (03) : 415 - 421
  • [15] Personal authentication and cryptographic key generation based on electroencephalographic signals
    Abdel-Ghaffar, Eman A.
    Daoudi, Mohamed
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2023, 35 (02)
  • [16] A Scheme for the Generation of Strong Cryptographic Key Pairs based on fCMetrics
    Tahir, Ruhma
    Hu, Huosheng
    Gu, Dongbing
    McDonald-Maier, Klaus
    Howells, Gareth
    2012 INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS, 2012, : 168 - 174
  • [17] Deep face fuzzy vault: Implementation and performance
    Rathgeb, Christian
    Merkle, Johannes
    Scholz, Johanna
    Tams, Benjamin
    Nesterowicz, Vanessa
    COMPUTERS & SECURITY, 2022, 113
  • [18] A PUF-Based Key Storage Scheme Using Fuzzy Vault
    Yang, Jinrong
    Chen, Shuai
    Cao, Yuan
    SENSORS, 2023, 23 (07)
  • [19] Fuzzy Vault Crypto Biometric Key Based on Fingerprint Vector Features
    AlTarawneh, M. S.
    Woo, W. L.
    Dlay, S. S.
    CSNDSP 08: PROCEEDINGS OF THE SIXTH INTERNATIONAL SYMPOSIUM ON COMMUNICATION SYSTEMS, NETWORKS AND DIGITAL SIGNAL PROCESSING, 2008, : 452 - 456
  • [20] Cryptographic key generation from voice
    Monrose, F
    Reiter, MK
    Li, Q
    Wetzel, S
    2001 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2001, : 202 - 213