A crypto-biometric scheme based on iris-templates with fuzzy extractors

One of the most important uses of Biometrics is the identification and authentication of individuals using one or several of their physiognomical or behavioral features. Moreover, Biometrics offers a good option to assist Cryptography for confidentiality, encryption, and decryption of messages by using some biometric traits. In this paper, a crypto-biometric scheme, based on fuzzy extractors, by using iris templates, is proposed, i.e., we propose a new system in order to permit a user to retrieve a secret or a previously saved key by using her own biometric template. The properties and efficiency for selecting the most useful parameters to provide a high level of security in the scheme are thoroughly analyzed.

[1]  P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .

[2]  Rafail Ostrovsky,et al.  Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..

[3]  Sharath Pankanti,et al.  Biometrics: Personal Identification in Networked Society , 2013 .

[4]  Robert Sabourin,et al.  An adaptive classification system for video-based face recognition , 2012, Inf. Sci..

[5]  Xuebing Zhou Template protection and its implementation in 3D face recognition systems , 2007, SPIE Defense + Commercial Sensing.

[6]  Byoungcheon Lee,et al.  New receipt-free voting scheme using double-trapdoor commitment , 2011, Inf. Sci..

[7]  Xavier Boyen,et al.  Reusable cryptographic fuzzy extractors , 2004, CCS '04.

[8]  Pieter H. Hartel,et al.  Fuzzy extractors for continuous distributions , 2006, ASIACCS '07.

[9]  Leonid Reyzin,et al.  Fuzzy Extractors ∗ , 2007 .

[10]  Pieter H. Hartel,et al.  Secure Ad-hoc Pairing with Biometrics: SAfE , 2007 .

[11]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[12]  Elaine B. Barker,et al.  Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher , 2004 .

[13]  Arun Ross,et al.  Fingerprint matching using minutiae and texture features , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[14]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[15]  Rafail Ostrovsky,et al.  Secure Remote Authentication Using Biometric Data , 2005, EUROCRYPT.

[16]  Kang Ryoung Park,et al.  Biometric Key Binding: Fuzzy Vault Based on Iris Images , 2007, ICB.

[17]  B. Chen,et al.  Biometric Based Cryptographic Key Generation from Faces , 2007, 9th Biennial Conference of the Australian Pattern Recognition Society on Digital Image Computing Techniques and Applications (DICTA 2007).

[18]  Duncan S. Wong,et al.  Signcryption from randomness recoverable public key encryption , 2010, Inf. Sci..

[19]  Fabien Laguillaumie,et al.  Time-selective convertible undeniable signatures with short conversion receipts , 2010, Inf. Sci..

[20]  Hervé Sibert,et al.  Biometric Fuzzy Extractors Made Practical: A Proposal Based on FingerCodes , 2007, ICB.

[21]  Oscar Castillo,et al.  Type-1 and Type-2 Fuzzy Inference Systems as Integration Methods in Modular Neural Networks for Multimodal Biometry and Its Optimization with Genetic Algorithms , 2009, Soft Computing for Hybrid Intelligent Systems.

[22]  Anil K. Jain,et al.  Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.

[23]  Sharath Pankanti,et al.  Biometrics, Personal Identification in Networked Society: Personal Identification in Networked Society , 1998 .

[24]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[25]  David Zhang,et al.  Tongue shape classification by geometric features , 2010, Inf. Sci..

[26]  Hengjian Li,et al.  Generating cancelable palmprint templates via coupled nonlinear dynamic filters and multiple orientation palmcodes , 2010, Inf. Sci..

[27]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[28]  Kathy J. Horadam,et al.  Fuzzy Extractors for Minutiae-Based Fingerprint Authentication , 2007, ICB.

[29]  David K. Smith Theory of Linear and Integer Programming , 1987 .

[30]  Zhoujun Li,et al.  Provably secure identity-based authenticated key agreement protocols with malicious private key generators , 2011, Inf. Sci..

[31]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[32]  Rong Hao,et al.  Forward-secure identity-based signature: Security notions and construction , 2011, Inf. Sci..

[33]  Luis Hernández Encinas,et al.  Security Efficiency Analysis of a Biometric Fuzzy Extractor for Iris Templates , 2009, CISIS.

[34]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[35]  Anil K. Jain,et al.  Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.

[36]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[37]  Yi Mu,et al.  Certificateless threshold signature scheme from bilinear maps , 2010, Inf. Sci..

[38]  Heejo Lee,et al.  Activity-oriented access control to ubiquitous hospital information and services , 2010, Inf. Sci..

[39]  Nasir D. Memon,et al.  Secure Biometric Templates from Fingerprint-Face Features , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.

[40]  Carmen Sánchez Ávila,et al.  Two different approaches for iris recognition using Gabor filters and multiscale zero-crossing representation , 2005, Pattern Recognit..