An iris-based Interval-Mapping scheme for Biometric Key generation

In order to increase security in common key management systems, the majority of so-called Biometric Cryptosystems aim at coupling cryptographic systems with biometric recognition systems. As a result these systems produce cryptographic keys, dependent on biometric information, denoted Biometric Keys. In this work a generic approach to producing cryptographic keys out of biometric data is presented, by applying so-called Interval-Mapping techniques. The proposed scheme is adapted to iris, which has not yet been examined according to this technique, as well as on-line signatures to demonstrate that this approach is generic. Performance results show that the approach pays off.

[1]  Anil K. Jain,et al.  Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.

[2]  Yair Frankel,et al.  On enabling secure applications through off-line biometric identification , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).

[3]  Hong Chang,et al.  SVC2004: First International Signature Verification Competition , 2004, ICBA.

[4]  Tieniu Tan,et al.  Biometric personal identification based on handwriting , 2000, Proceedings 15th International Conference on Pattern Recognition. ICPR-2000.

[5]  John Daugman,et al.  How iris recognition works , 2002, IEEE Transactions on Circuits and Systems for Video Technology.

[6]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[7]  Vishvjit S. Nalwa,et al.  Automatic On-line Signature Verification , 1997 .

[8]  Arun Ross,et al.  An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.

[9]  Michael K. Reiter,et al.  Password hardening based on keystroke dynamics , 1999, CCS '99.

[10]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[11]  Ralf Steinmetz,et al.  Biometric hash based on statistical features of online signatures , 2002, Object recognition supported by user interaction for service robots.

[12]  Wade Trappe,et al.  Introduction to Cryptography with Coding Theory (2nd Edition) , 2005 .

[13]  Nasir D. Memon,et al.  A secure biometric authentication scheme based on robust hashing , 2005, MM&Sec '05.

[14]  Hao Feng,et al.  Private key generation from on-line handwritten signatures , 2002, Inf. Manag. Comput. Secur..

[15]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[16]  Bhagavatula Vijaya Kumar,et al.  Biometric Encryption using image processing , 1998, Electronic Imaging.

[17]  David Chek Ling Ngo,et al.  Computation of Cryptographic Keys from Face Biometrics , 2003, Communications and Multimedia Security.

[18]  Tieniu Tan,et al.  Biometric personal identification based on iris patterns , 2000, Proceedings 15th International Conference on Pattern Recognition. ICPR-2000.