Authentication Using Fuzzy Vault Based on Iris Textures

Crypto-biometrics is an emerging architecture where cryptography and biometrics are merged to achieve high level security systems. This paper explores the realization of cryptographic construction called fuzzy vault to store digital signature based on iris pseudo textures. Iris pseudo textures such as nodes and end points does not change through out the life period of user and can be used to extract minutiae to lock and unlock the fuzzy vault. The proposed algorithm aims to create a fuzzy vault to store secret key, based on iris pseudo textures. The algorithm has two phases: The first is to extract binary key (digital signature) from iris textures, and the second to generate fuzzy vault by using Lagrange interpolating polynomial projections, further which is projected by using data units extracted from iris minutiae.

[1]  H. Heijmans Morphological image operators , 1994 .

[2]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[3]  Bruce Schneier,et al.  Protecting secret keys with personal entropy , 2000, Future Gener. Comput. Syst..

[4]  Michael K. Reiter,et al.  Password hardening based on keystroke dynamics , 1999, CCS '99.

[5]  John Daugman How iris recognition works , 2004 .

[6]  Simon Heron,et al.  Encryption: Advanced Encryption Standard (AES) , 2009 .

[7]  David C. Feldmeier,et al.  UNIX Password Security - Ten Years Later , 1989, CRYPTO.

[8]  Dexin Zhang,et al.  Local intensity variation analysis for iris recognition , 2004, Pattern Recognit..

[9]  T. Charles Clancy,et al.  Secure smartcardbased fingerprint authentication , 2003, WBMA '03.

[10]  Joceli Mayer,et al.  Image feature extraction for application of biometric identification of iris - a morphological approach , 2003, 16th Brazilian Symposium on Computer Graphics and Image Processing (SIBGRAPI 2003).

[11]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[12]  Hong Tat Ewe,et al.  An Efficient One-Dimensional Fractal Analysis for Iris Recognition , 2005, WSCG.

[13]  Richard P. Wildes,et al.  Iris recognition: an emerging biometric technology , 1997, Proc. IEEE.

[14]  Ingrid Verbauwhede,et al.  Automatic secure fingerprint verification system based on fuzzy vault scheme , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..