Robust Biometric Key Extraction Based on Iris Cryptosystem

Biometric cryptosystem can not only provide an efficient mechanism for template protection, but also facilitate cryptographic key management, thus becomes a promising direction in information security field. In this paper, we propose a robust key extraction approach which consists of concatenated coding scheme and bit masking scheme based on iris database. The concatenated coding scheme that combines Reed-Solomon code and convolutional code is proposed so that much longer keys can be extracted from the iris data, while the bit masking scheme is proposed to minimize and randomize the errors occur in the iris codes, making the error pattern more suitable for the coding scheme. The experiment results show that the system can achieve a FRR of 0.52% with the key length of 938 bits.

[1]  Raymond N. J. Veldhuis,et al.  Practical Biometric Authentication with Template Protection , 2005, AVBPA.

[2]  Feng Hao,et al.  Combining Crypto with Biometrics Effectively , 2006, IEEE Transactions on Computers.

[3]  Colin Soutar Security Considerations for the Implementation of Biometric Systems , 2004 .

[4]  Anil K. Jain,et al.  Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.

[5]  Shigeo Tsujii,et al.  Proposal on a multifactor biometric authentication method based on cryptosystem keys containing biometric signatures , 2004, International Journal of Information Security.

[6]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[7]  Yevgeniy Dodis,et al.  Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, EUROCRYPT.

[8]  Stark C. Draper,et al.  Using Distributed Source Coding to Secure Fingerprint Biometrics , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.

[9]  Yair Frankel,et al.  On enabling secure applications through off-line biometric identification , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).

[10]  T. Charles Clancy,et al.  Secure smartcardbased fingerprint authentication , 2003, WBMA '03.

[11]  Daniel J. Costello,et al.  Error Control Coding, Second Edition , 2004 .

[12]  Sharath Pankanti,et al.  Fuzzy Vault for Fingerprints , 2005, AVBPA.

[13]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[14]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..