Development of a New Cryptographic Construct Using Palmprint-Based Fuzzy Vault

The combination of cryptology and biometrics has emerged as promising component of information security. Despite the current popularity of palmprint biometric, there has not been any attempt to investigate its usage for the fuzzy vault. This paper therefore investigates the possible usage of palmprint in fuzzy vault to develop a user friendly and reliable crypto system. We suggest the use of both symmetric and asymmetric approach for the encryption. The ciphertext of any document is generated by symmetric cryptosystem; the symmetric key is then encrypted by asymmetric approach. Further, Reed and Solomon codes are used on the generated asymmetric key to provide some error tolerance while decryption. The experimental results from the proposed approach on the palmprint images suggest its possible usage in an automated palmprint-based key generation system.

[1]  James H. Burrows,et al.  Secure Hash Standard , 1995 .

[2]  Yair Frankel,et al.  On enabling secure applications through off-line biometric identification , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).

[3]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[4]  Michael K. Reiter,et al.  Password hardening based on keystroke dynamics , 1999, CCS '99.

[5]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[6]  Qi Li,et al.  Cryptographic key generation from voice , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[7]  Mohammed Yakoob Siyal,et al.  Novel biometric digital signatures for Internet-based applications , 2001, Inf. Manag. Comput. Secur..

[8]  Hao Feng,et al.  Private key generation from on-line handwritten signatures , 2002, Inf. Manag. Comput. Secur..

[9]  T. Charles Clancy,et al.  Secure smartcardbased fingerprint authentication , 2003, WBMA '03.

[10]  David Chek Ling Ngo,et al.  Computation of Cryptographic Keys from Face Biometrics , 2003, Communications and Multimedia Security.

[11]  Oded Goldreich,et al.  Cryptography and Computer Security , 2003 .

[12]  N. Kiyavash,et al.  Secure Smartcard-Based Fingerprint Authentication ∗ , 2003 .

[13]  David Zhang,et al.  Competitive coding scheme for palmprint verification , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..

[14]  Arun Ross,et al.  An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.

[15]  Chu-Hsing Lin,et al.  A flexible biometrics remote user authentication scheme , 2004, Comput. Stand. Interfaces.

[16]  Anil K. Jain,et al.  Fuzzy Fingerprint Vault , 2004 .

[17]  David Zhang,et al.  Competitive coding scheme for palmprint verification , 2004, ICPR 2004.

[18]  Anil K. Jain,et al.  Audio- and Video-Based Biometric Person Authentication: 5th International Conference, AVBPA 2005, Hilton Rye Town, NY, USA, July 20-22, 2005, Proceedings (Lecture Notes in Computer Science) , 2005 .

[19]  Sharath Pankanti,et al.  Fuzzy Vault for Fingerprints , 2005, AVBPA.

[20]  Henry Ng Simple Pseudorandom Number Generator with Strengthened Double Encryption (Cilia) , 2005, IACR Cryptol. ePrint Arch..

[21]  Kyung-Hyun Choi,et al.  Optical security system for the protection of personal identification information. , 2005, Applied optics.

[22]  David Zhang,et al.  Biometric Recognition Using Feature Selection and Combination , 2005, AVBPA.

[23]  Andrew Beng Jin Teoh,et al.  PalmHashing: a novel approach for cancelable biometrics , 2005, Inf. Process. Lett..

[24]  David Zhang,et al.  Personal authentication using multiple palmprint representation , 2005, Pattern Recognit..

[25]  Feng Hao,et al.  Combining Crypto with Biometrics Effectively , 2006, IEEE Transactions on Computers.

[26]  Santanu Chaudhury,et al.  Biometrics based Asymmetric Cryptosystem Design Using Modified Fuzzy Vault Scheme , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[27]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[28]  Helen C. Shen,et al.  Personal authentication using hand images , 2006, Pattern Recognit. Lett..

[29]  David Zhang,et al.  An analysis of BioHashing and its variants , 2006, Pattern Recognit..

[30]  Brian A. Carter,et al.  Advanced Encryption Standard , 2007 .

[31]  Sharath Pankanti,et al.  Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.

[32]  David Zhang,et al.  A Palmprint Cryptosystem , 2007, ICB.

[33]  Dongho Won,et al.  Security weakness in a three-party pairing-based protocol for password authenticated key exchange , 2007, Inf. Sci..

[34]  Zhengjun Liu,et al.  Double image encryption based on iterative fractional Fourier transform , 2007 .

[35]  Ajay Kumar,et al.  Incorporating Cohort Information for Reliable Palmprint Authentication , 2008, 2008 Sixth Indian Conference on Computer Vision, Graphics & Image Processing.

[36]  David Zhang,et al.  Three measures for secure palmprint identification , 2008, Pattern Recognit..

[37]  Ajay Kumar,et al.  A palmprint-based cryptosystem using double encryption , 2008, SPIE Defense + Commercial Sensing.

[38]  Ron,et al.  The RSA Algorithm , 2009 .

[39]  Ann Cavoukian,et al.  Biometric Encryption , 2011, Encyclopedia of Cryptography and Security.