A Novel Blockchain Scheme Combining Prime Numbers and Iris for Encrypting Coding

This paper presents a novel technique to build an access key that finds its natural fit in blockchain, smart cities environments, transactions of electronic currencies and, as proved by NIST tests, in high computer security scenarios where having a high level of secrecy is mandatory; furthermore, the key building procedure employs a biometric component to guarantee, with a reasonable level of certainty, the user identity. These characteristics are obtained by using an asymmetric cryptography algorithm (RSA) and Iris biometrics; both of them, taken singularly, exhibit some limits that can be overcome by joining the two approaches through Information Fusion (IF) techniques. In the follows, it will be presented the developed algorithm named Iris Information Fusion (IIF) that fuses a biometric component represented by the iris with a numerical component, in this case the product of two prime numbers which is the module of RSA algorithm.

[1]  Lucien Wald,et al.  Some terms of reference in data fusion , 1999, IEEE Trans. Geosci. Remote. Sens..

[2]  John Daugman,et al.  Probing the Uniqueness and Randomness of IrisCodes: Results From 200 Billion Iris Pair Comparisons , 2006, Proceedings of the IEEE.

[3]  Gabriel Taubin,et al.  Estimation of Planar Curves, Surfaces, and Nonplanar Space Curves Defined by Implicit Equations with Applications to Edge and Range Image Segmentation , 1991, IEEE Trans. Pattern Anal. Mach. Intell..

[4]  Oleg Ushmaev,et al.  Biometric Fusion : Robust Approach , 2006 .

[5]  Libor Machala,et al.  Human eye iris recognition using the mutual information , 2004 .

[6]  Alan N. Steinberg,et al.  Rethinking the JDL Data Fusion Levels , 2005 .

[7]  John Daugman,et al.  How iris recognition works , 2002, IEEE Transactions on Circuits and Systems for Video Technology.

[8]  Bernadette Dorizzi,et al.  Obtaining cryptographic keys using feature level fusion of iris and face biometrics for secure user authentication , 2010, 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition - Workshops.

[9]  Sriyankar Acharyya,et al.  Image cryptography: The genetic algorithm approach , 2011, 2011 IEEE International Conference on Computer Science and Automation Engineering.

[10]  Stefano Ricciardi,et al.  Ubiquitous iris recognition by means of mobile devices , 2015, Pattern Recognit. Lett..

[11]  Whitfield Diffie,et al.  Multiuser cryptographic techniques , 1976, AFIPS '76.

[12]  Abdulrahman Alqahtani Evaluation of the Reliability of Iris Recognition Biometric Authentication Systems , 2016, 2016 International Conference on Computational Science and Computational Intelligence (CSCI).

[13]  Michele Nappi,et al.  Mobile Iris Challenge Evaluation (MICHE)-I, biometric iris dataset and protocols , 2015, Pattern Recognit. Lett..

[14]  Erik Blasch,et al.  JDL level 5 fusion model: user refinement issues and applications in group tracking , 2002, SPIE Defense + Commercial Sensing.

[15]  James Llinas,et al.  Revisiting the JDL Data Fusion Model II , 2004 .

[16]  Gerardo Iovane,et al.  An Encryption Approach Using Information Fusion Techniques Involving Prime Numbers and Face Biometrics , 2020, IEEE Transactions on Sustainable Computing.

[17]  Pieter H. Hartel,et al.  Fuzzy extractors for continuous distributions , 2006, ASIACCS '07.

[18]  Andrea F. Abate,et al.  What are you doing while answering your smartphone? , 2018, 2018 24th International Conference on Pattern Recognition (ICPR).

[19]  Neyire Deniz Sarier Multimodal biometric Identity Based Encryption , 2018, Future Gener. Comput. Syst..

[20]  Jiankun Hu,et al.  A New Biocryptosystem-Oriented Security Analysis Framework and Implementation of Multibiometric Cryptosystems Based on Decision Level Fusion , 2015, IEEE Transactions on Information Forensics and Security.

[21]  Gil Melfe Mateus Santos,et al.  Fusing iris and periocular information for cross-sensor recognition , 2015, Pattern Recognit. Lett..

[22]  Jos B. T. M. Roerdink,et al.  The Watershed Transform: Definitions, Algorithms and Parallelization Strategies , 2000, Fundam. Informaticae.

[23]  Kim-Kwang Raymond Choo,et al.  Context Aware Ubiquitous Biometrics in Edge of Military Things , 2017, IEEE Cloud Computing.

[24]  Alan N. Steinberg,et al.  Revisions to the JDL data fusion model , 1999, Defense, Security, and Sensing.

[25]  Arun Ross,et al.  Information fusion in biometrics , 2003, Pattern Recognit. Lett..

[26]  Michal Haindl,et al.  Unsupervised detection of non-iris occlusions , 2015, Pattern Recognit. Lett..

[27]  Elaine Shi,et al.  Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts , 2016, 2016 IEEE Symposium on Security and Privacy (SP).

[28]  Rajiv Ranjan,et al.  Biometrics-as-a-Service: Cloud-Based Technology, Systems, and Applications , 2018, IEEE Cloud Comput..

[29]  Michele Nappi,et al.  IS_IS: Iris Segmentation for Identification Systems , 2010, 2010 20th International Conference on Pattern Recognition.

[30]  A. Tragha,et al.  ICIGA: Improved Cryptography Inspired by Genetic Algorithms , 2006, 2006 International Conference on Hybrid Information Technology.

[31]  Gerardo Iovane,et al.  Electronic access key based on innovative Information Fusion technique involving prime numbers and biometric data , 2011 .

[32]  Andrea F. Abate,et al.  BIRD: Watershed Based IRis Detection for mobile devices , 2015, Pattern Recognit. Lett..

[33]  Hugo Proença,et al.  Insights into the results of MICHE I - Mobile Iris CHallenge Evaluation , 2018, Pattern Recognit..

[34]  Yang Hu,et al.  Improving colour iris segmentation using a model selection technique , 2015, Pattern Recognit. Lett..

[35]  Michele Nappi,et al.  WIRE: Watershed based iris recognition , 2016, Pattern Recognit..

[36]  Luís A. Alexandre,et al.  UBIRIS: A Noisy Iris Image Database , 2005, ICIAP.

[37]  Xavier Boyen,et al.  Reusable cryptographic fuzzy extractors , 2004, CCS '04.

[38]  Kim-Kwang Raymond Choo,et al.  Cloud-Based Biometrics (Biometrics as a Service) for Smart Cities, Nations, and Beyond , 2018, IEEE Cloud Computing.

[39]  Elmo Benedetto,et al.  An Information Fusion approach based on prime numbers coming from RSA algorithm and Fractals for secure coding , 2015 .

[40]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[41]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[42]  Raymond N. J. Veldhuis,et al.  Hybrid fusion for biometrics: Combining score-level and decision-level fusion , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.