Fuzzy vault for face based cryptographic key generation

被引:0
|
作者
Wang, Yongjin [1 ]
Plataniotis, K. N. [1 ]
机构
[1] Univ Toronto, Edward S Rogers Sr Dept Elect & Comp Engn, Toronto, ON M5S 3G4, Canada
来源
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper presents a method for changeable cryptographic key generation using face biometrics signal. A previously introduced scheme,fuzzy vault, is utilized for secure binding of randomly generated key with extracted biometrics features. The major technical difficulty is to map noisy biometrics representation to the exactly correct key. In this paper, the proposed method is based on 2-dimensional quantization of distance vectors between biometrics features and pairs of random vectors. A windowing process is applied to tolerate the variations of biometrics signals. Further, we also introduce a two-factor scheme, where the quantized distance vectors are generated with user-dependent random vectors. By integrating a second factor, both the biometrics and the key are changeable, and zero error rate can be obtained.
引用
收藏
页码:120 / 125
页数:6
相关论文
共 50 条
  • [41] A pitfall in fingerprint bio-cryptographic key generation
    Zhang, Peng
    Hu, Jiankun
    Li, Cai
    Bennamoun, Mohammed
    Bhagavatula, Vijayakumar
    COMPUTERS & SECURITY, 2011, 30 (05) : 311 - 319
  • [42] Multi-speaker voice cryptographic key generation
    Paola Garcia-Perera, L.
    Carlos Mex-Perera, J.
    Nolazco-Flores, Juan A.
    3RD ACS/IEEE INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, 2005, 2005,
  • [43] Genetic Crossover Key generation mechanism for cryptographic applications
    Bevi, Ruhan
    Malarvizhi, S.
    RESEARCH JOURNAL OF BIOTECHNOLOGY, 2016, 11 (08): : 53 - 57
  • [44] Cryptographic-speech-key generation architecture improvements
    García-Perera, LP
    Nolazco-Flores, JA
    Mex-Perera, C
    PATTERN RECOGNITION AND IMAGE ANALYSIS, PT 2, PROCEEDINGS, 2005, 3523 : 579 - 585
  • [45] Cryptographic Key Generation Using Burning Ship Fractal
    Agarwal, Shafali
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON VISION, IMAGE AND SIGNAL PROCESSING (ICVISP 2018), 2018,
  • [46] Encrypted Fuzzy Vault Based on Fingerprint
    Quan, Feng
    Fei, Su
    Anni, Cai
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 137 - 140
  • [47] Palm and hand vein-based fuzzy vault generation scheme for multibiometric cryptosystem
    Lalithamani, N.
    Sabrigiriraj, M.
    IMAGING SCIENCE JOURNAL, 2015, 63 (02): : 111 - 118
  • [48] On the Study of Impacts of Brain Conditions on EEG-based Cryptographic Key Generation Systems
    Nguyen, Dang
    Tran, Dat
    Sharma, Dharmendra
    Ma, Wanli
    KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS (KES-2018), 2018, 126 : 713 - 722
  • [49] Implementation and characterization of flash-based hardware security primitives for cryptographic key generation
    Oh, Mi-Kyung
    Lee, Sangjae
    Kang, Yousung
    Choi, Dooho
    ETRI JOURNAL, 2023, 45 (02) : 346 - 357
  • [50] Breaking (and Fixing) Channel-based Cryptographic Key Generation: A Machine Learning Approach
    Alouani, Ihsen
    2022 25TH EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2022, : 383 - 390