An Encryption Approach Using Information Fusion Techniques Involving Prime Numbers and Face Biometrics

The work shows a novel solution to create an access key which can be used within the transactions of electronic currencies, blockchain as well as in the field of computer security to guarantee a high level of secrecy, but also, with a high level of certainty, to provide a person identity through Information Fusion (IF) techniques and biometric data encryption. Specifically, two non-connected areas have been joined, Face Biometrics and Public-key Cryptography. This choice was taken in order to get through the limits these two approaches have found singularly and to give a suitable solution in the context of electronic and digital exchanges (electro-currencies, Internet of Things). An innovative and original algorithm has been developed, which can do fusion operations between Face Biometrics and numerical data, that is an algorithm of Hybrid Information Fusion, named FIF (Face Information Fusion). We decided to use a digital face as a biometric component, and the product of two prime numbers as a numerical component, that is the module in RSA algorithm.

[1]  Lucien Wald,et al.  Some terms of reference in data fusion , 1999, IEEE Trans. Geosci. Remote. Sens..

[2]  Ren C. Luo,et al.  Multisensor fusion and integration: approaches, applications, and future research directions , 2002 .

[3]  Elmo Benedetto,et al.  An Information Fusion approach based on prime numbers coming from RSA algorithm and Fractals for secure coding , 2015 .

[4]  David Chek Ling Ngo,et al.  PalmHashing: A novel approach for dual-factor authentication , 2004, Pattern Analysis and Applications.

[5]  Alan N. Steinberg,et al.  Revisions to the JDL data fusion model , 1999, Defense, Security, and Sensing.

[6]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[7]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[8]  Norman Poh,et al.  Hybrid Biometric Person Authentication Using Face and Voice Features , 2001, AVBPA.

[9]  David Zhang,et al.  When Faces Are Combined with Palmprints: A Novel Biometric Fusion Strategy , 2004, ICBA.

[10]  Anil K. Jain,et al.  Combining multiple matchers for a high security fingerprint verification system , 1999, Pattern Recognit. Lett..

[11]  Whitfield Diffie,et al.  Multiuser cryptographic techniques , 1976, AFIPS '76.

[12]  Ching-Han Chen,et al.  Fusion of Face and Iris Features for Multimodal Biometrics , 2006, ICB.

[13]  Raymond N. J. Veldhuis,et al.  Hybrid fusion for biometrics: Combining score-level and decision-level fusion , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.

[14]  Loris Nanni,et al.  An advanced multi-modal method for human authentication featuring biometrics data and tokenised random numbers , 2006, Neurocomputing.

[15]  Neyire Deniz Sarier Multimodal biometric Identity Based Encryption , 2018, Future Gener. Comput. Syst..

[16]  James Llinas,et al.  Multisensor Data Fusion , 1990 .

[17]  Pramod K. Varshney,et al.  Multisensor Data Fusion , 1997, IEA/AIE.

[18]  Alan N. Steinberg,et al.  Rethinking the JDL Data Fusion Levels , 2005 .

[19]  Wei-Yun Yau,et al.  Fusion of Auxiliary Information for Multi-modal Biometrics Authentication , 2004, ICBA.

[20]  Tom Ziemke,et al.  An information fusion approach to controlling complexity in bioinformatics research , 2005, 2005 IEEE Computational Systems Bioinformatics Conference - Workshops (CSBW'05).

[21]  Sudeep Sarkar,et al.  Comparison and Combination of Ear and Face Images in Appearance-Based Biometrics , 2003, IEEE Trans. Pattern Anal. Mach. Intell..

[22]  Anil K. Jain,et al.  Integrating Faces and Fingerprints for Personal Identification , 1998, IEEE Trans. Pattern Anal. Mach. Intell..

[23]  Jiankun Hu,et al.  A New Biocryptosystem-Oriented Security Analysis Framework and Implementation of Multibiometric Cryptosystems Based on Decision Level Fusion , 2015, IEEE Transactions on Information Forensics and Security.

[24]  Federico Castanedo,et al.  A Review of Data Fusion Techniques , 2013, TheScientificWorldJournal.

[25]  Alexander Karlsson,et al.  Dependable and generic high-level information fusion methods and algorithms for uncertainty management , 2007 .

[26]  Dharmendra Sharma,et al.  An Agent Based Multifactor Biometric Security System , 2008, KES.

[27]  Loris Nanni,et al.  A multi-modal method based on the competitors of FVC2004 and on palm data combined with tokenised random numbers , 2008, Pattern Recognit. Lett..

[28]  James Llinas,et al.  Revisiting the JDL Data Fusion Model II , 2004 .

[29]  Erik Blasch,et al.  JDL level 5 fusion model: user refinement issues and applications in group tracking , 2002, SPIE Defense + Commercial Sensing.

[30]  Belur V. Dasarathy,et al.  Information Fusion - what, where, why, when, and how? Editorial , 2001, Inf. Fusion.

[31]  Michele Nappi,et al.  Robust face recognition after plastic surgery using region-based approaches , 2015, Pattern Recognit..

[32]  Andrew Beng Jin Teoh,et al.  Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..

[33]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[34]  Kim-Kwang Raymond Choo,et al.  Biometrics in the Cloud: Challenges and Research Opportunities , 2017, IEEE Cloud Computing.

[35]  Oleg Ushmaev,et al.  Biometric Fusion : Robust Approach , 2006 .

[36]  Arun Ross,et al.  Information fusion in biometrics , 2003, Pattern Recognit. Lett..

[37]  David Zhang,et al.  An analysis of BioHashing and its variants , 2006, Pattern Recognit..

[38]  Gerardo Iovane,et al.  Face recognition using SIFT features and a region-based ranking , 2010 .