A schema for Cryptographic Keys generation using Hybrid Biometrics

نویسندگان

  • Kiran Voderhobli
  • Helen Donelan
چکیده

Biometric identifiers refer to unique physical properties or behavioral attributes of individuals. Some of the well known biometric identifiers are voice, finger prints, retina or iris, facial structure etc. In our daily interaction with others directly or indirectly, we implicitly use biometrics to know, distinguish and trust people. Biometric identifiers represent the concept of “who a person ’is” ’by ’gathering ’vital ’characteristics ’that ’don’t ’correspond to any other person. The human brain to some extent is able to ascertain disparities or variation in certain physical attributes and yet verify the authenticity of a person. But this is difficult to be implemented in electronic systems due to the intense requirements of artificial decision making and hard-coded logic. This paper examines the possibility of using a combination of biometric attributes to overcome common problems in having a single biometric scheme for authentication. It also investigates possible schemes and features to deal with variations in Biometric attributes. The material presented is related to ongoing research by the Computer Communications Research group at Leeds Metropolitan University. We use this paper as a starting step and as a plan for advanced research. It offers ideas and proposition for implementing hybrid biometrics in conjunction with cryptography. This is a work in progress and is in a very preliminary stage.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Development of Bio-crypto Key from Fingerprints Using Cancelable Templates

Identity theft can be effectively solved by the integration of biometrics and cryptography. Lately, researchers and experimenters have been greatly attracted by the improved performance (protection) of cryptographic keys produced from biometrics. However, there exists an eternal association between the biometric and the user, where in, alteration is not viable. Hence, a compromise of the biomet...

متن کامل

A Survey on Biometrics based Cryptographic Key Generation Schemes

Need for information security and privacy is increasing in recent times. Since several valuable data and files are stored in an organization server system and moreover personal information are being shared in WWW, the need for providing security and permitting only the authorized user is becoming indispensable. For this purpose, biometric authentication is used in several applications and it is...

متن کامل

Finger Print Parameter Based Cryptographic Key Generation

A method is proposed for generation of unique cryptographic key which is generated using figure prints of the user, which are stable throughout person's lifetime. The proposed approach reduces the cost associated with lost keys, addresses non-repudiation issues and provides increased security of digital content. This approach has reduced the complicated sequence of the operation to generate cry...

متن کامل

Secured Cryptographic Key Generation From Multimodal Biometrics: Feature Level Fusion of Fingerprint and Iris

Human users have a tough time remembering long cryptographic keys. Hence, researchers, for so long, have been examining ways to utilize biometric features of the user instead of a memorable password or passphrase, in an effort to generate strong and repeatable cryptographic keys. Our objective is to incorporate the volatility of the user's biometric features into the generated key, so as to mak...

متن کامل

Generating Random Sequences from Fingerprints

Biometrics are traditionally employed in user authentication and authorization mechanisms. The vast majority of research effort focuses on applications of biometrics in authentication, aiming to replace passwords as the access control mechanism for cryptographic keys in one way or another. However, the inherent variability in biometrics presents a readily available source of randomness, which, ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006