Secure cryptosystem from palm vein biometrics in smart card

This paper proposes a novel technique to generate an irrevocable cryptographic key from the biometric template and use it as a key to authenticate the smart card. The technique proposed here utilizes the minutiae features extracted from the pattern generated. The features include bifurcation points and ending points. Since other cryptographic keys are probable to theft or guess, keys generated from the biometric entity are more preferable as these biometric keys are attached with the user. Minutiae patterns generated from the palm vein are converted to cancelable templates which in turn are used for irrevocable key generation. And also architecture has been proposed to resist the well-known attacks like replay and forgery attacks and to satisfy the mutual authentication.

[1]  B. Chen,et al.  Biometric Based Cryptographic Key Generation from Faces , 2007, 9th Biennial Conference of the Australian Pattern Recognition Society on Digital Image Computing Techniques and Applications (DICTA 2007).

[2]  Lingyu Wang,et al.  Minutiae feature analysis for infrared hand vein pattern biometrics , 2008, Pattern Recognit..

[3]  Soo-Won Kim,et al.  An biometric identification system by extracting hand vein patterns , 2001 .

[4]  A. Kannammal,et al.  A secure cryptosystem from palm vein biometrics , 2009, ICIS.

[5]  Lingyu Wang,et al.  A Thermal Hand Vein Pattern Verification System , 2005, ICAPR.

[6]  Luminita Vasiu,et al.  Biometric Recognition - Security and Privacy Concerns , 2004, ICETE.

[7]  Santanu Chaudhury,et al.  Biometrics based Asymmetric Cryptosystem Design Using Modified Fuzzy Vault Scheme , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[8]  Feng Hao,et al.  Combining Crypto with Biometrics Effectively , 2006, IEEE Transactions on Computers.

[9]  Anil K. Jain,et al.  Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.

[10]  Ahmed M. Badawi,et al.  Biometric Authentication Using Fast Correlation of Near Infrared Hand Vein Patterns , 2008 .

[11]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[12]  Ross J. Anderson,et al.  Combining cryptography with biometrics effectively , 2005 .

[13]  Eduard Sojka A New and Efficient Algorithm for Detecting the Corners in Digital Images , 2002, DAGM-Symposium.