Error Tolerance Techniques for Binding Cryptographic Key with Biometrics
نویسنده
چکیده
Modern cryptography has one issue to be solved: key management. One proposed solution to the issue is to binding biometrics with cryptographic key. However, the nonreproducible measurements of biometrics make it difficult to bind a key with biometrics due to the exactitude requirement of cryptographic key. To bind a cryptographic key with a biometric, error tolerance technique has to be applied to process the biometric information. In this paper, we briefly survey the error tolerance techniques that have been proposed to minimize the fuzziness of biometric measurements. Since it is typical that different biometrics have to be measured with different instruments, different methods may have to be chosen for best measurement results. Advances in the topic are reported with a few representative biometrics, including keystroke, voice, signature, face, iris, and fingerprint. Since for all biometric applications the central issue to be solved is the fuzzy matching problem. We reported our preliminary testing results in this aspect.
منابع مشابه
Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...
متن کاملWork Plan and Methodology
The proposed method is based on 2-dimensional quantization of distance vectors between biometrics features and pairs of random vectors in this method the concept of changeable cryptographic key generation using face biometrics signal. A previously introduced scheme, fuzzy vault, is utilized for secure binding of randomly generated key with extracted biometrics features. The major technical diff...
متن کاملDevelopment of a Unique Biometric-based Cryptographic Key Generation with Repeatability using Brain Signals
Network security is very important when sending confidential data through the network. Cryptography is the science of hiding information, and a combination of cryptography solutions with cognitive science starts a new branch called cognitive cryptography that guarantee the confidentiality and integrity of the data. Brain signals as a biometric indicator can convert to a binary code which can be...
متن کاملCombining cryptography with biometrics effectively
We propose the first practical and secure way to integrate the iris biometric into cryptographic applications. A repeatable binary string, which we call a biometric key, is generated reliably from genuine iris codes. A well-known difficulty has been how to cope with the 10 to 20% of error bits within an iris code and derive an errorfree key. To solve this problem, we carefully studied the error...
متن کاملDevelopment of a New Cryptographic Construct Using Palmprint-Based Fuzzy Vault
The combination of cryptology and biometrics has emerged as promising component of information security. Despite the current popularity of palmprint biometric, there has not been any attempt to investigate its usage for the fuzzy vault. This paper therefore investigates the possible usage of palmprint in fuzzy vault to develop a user friendly and reliable crypto system. We suggest the use of bo...
متن کامل