A secure cryptosystem from palm vein biometrics

This paper proposes a novel technique to generate an irrevocable cryptographic key from the biometric template. The biometric trait considered here is the palm vein. The technique proposed here utilises the minutiae features extracted from the pattern generated. The features include bifurcation points and ending points. Since other cryptographic keys are probable to theft or guess, keys generated from the biometric entity are more preferable as these biometric keys are attached with the user. Minutiae patterns generated from the palm vein are converted to cancelable templates which in turn are used for irrevocable key generation.

[1]  Eduard Sojka A New and Efficient Algorithm for Detecting the Corners in Digital Images , 2002, DAGM-Symposium.

[2]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[3]  Ross J. Anderson,et al.  Combining cryptography with biometrics effectively , 2005 .

[4]  Luminita Vasiu,et al.  Biometric Recognition - Security and Privacy Concerns , 2004, ICETE.

[5]  Feng Hao,et al.  Combining Crypto with Biometrics Effectively , 2006, IEEE Transactions on Computers.

[6]  Anil K. Jain,et al.  Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.

[7]  Lingyu Wang,et al.  Minutiae feature analysis for infrared hand vein pattern biometrics , 2008, Pattern Recognit..

[8]  Ahmed M. Badawi,et al.  Biometric Authentication Using Fast Correlation of Near Infrared Hand Vein Patterns , 2008 .

[9]  Santanu Chaudhury,et al.  Biometrics based Asymmetric Cryptosystem Design Using Modified Fuzzy Vault Scheme , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[10]  Sharath Pankanti,et al.  Biometrics, Personal Identification in Networked Society: Personal Identification in Networked Society , 1998 .

[11]  Lingyu Wang,et al.  A Thermal Hand Vein Pattern Verification System , 2005, ICAPR.

[12]  Soo-Won Kim,et al.  An biometric identification system by extracting hand vein patterns , 2001 .

[13]  B. Chen,et al.  Biometric Based Cryptographic Key Generation from Faces , 2007, 9th Biennial Conference of the Australian Pattern Recognition Society on Digital Image Computing Techniques and Applications (DICTA 2007).