Error Tolerance Techniques for Binding Cryptographic Key with Biometrics

نویسنده

  • Qinghai Gao
چکیده

Modern cryptography has one issue to be solved: key management. One proposed solution to the issue is to binding biometrics with cryptographic key. However, the nonreproducible measurements of biometrics make it difficult to bind a key with biometrics due to the exactitude requirement of cryptographic key. To bind a cryptographic key with a biometric, error tolerance technique has to be applied to process the biometric information. In this paper, we briefly survey the error tolerance techniques that have been proposed to minimize the fuzziness of biometric measurements. Since it is typical that different biometrics have to be measured with different instruments, different methods may have to be chosen for best measurement results. Advances in the topic are reported with a few representative biometrics, including keystroke, voice, signature, face, iris, and fingerprint. Since for all biometric applications the central issue to be solved is the fuzzy matching problem. We reported our preliminary testing results in this aspect.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines

Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...

متن کامل

Work Plan and Methodology

The proposed method is based on 2-dimensional quantization of distance vectors between biometrics features and pairs of random vectors in this method the concept of changeable cryptographic key generation using face biometrics signal. A previously introduced scheme, fuzzy vault, is utilized for secure binding of randomly generated key with extracted biometrics features. The major technical diff...

متن کامل

Development of a Unique Biometric-based Cryptographic Key Generation with Repeatability using Brain Signals

Network security is very important when sending confidential data through the network. Cryptography is the science of hiding information, and a combination of cryptography solutions with cognitive science starts a new branch called cognitive cryptography that guarantee the confidentiality and integrity of the data. Brain signals as a biometric indicator can convert to a binary code which can be...

متن کامل

Combining cryptography with biometrics effectively

We propose the first practical and secure way to integrate the iris biometric into cryptographic applications. A repeatable binary string, which we call a biometric key, is generated reliably from genuine iris codes. A well-known difficulty has been how to cope with the 10 to 20% of error bits within an iris code and derive an errorfree key. To solve this problem, we carefully studied the error...

متن کامل

Development of a New Cryptographic Construct Using Palmprint-Based Fuzzy Vault

The combination of cryptology and biometrics has emerged as promising component of information security. Despite the current popularity of palmprint biometric, there has not been any attempt to investigate its usage for the fuzzy vault. This paper therefore investigates the possible usage of palmprint in fuzzy vault to develop a user friendly and reliable crypto system. We suggest the use of bo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009