BIOMETRICS FOR COMPUTER SECURITY AND CRYPTOGRAPHY

In the last decade of computer security, using biometrics for various types of security problems becomes more and more popular. The uniqueness of biometrics for any specific humanbeing makes the identification system more secure. Biometrics are widely used in person identification and verification. But using biometrics by means of cryptography is a new research area and there is less work in literature. In this paper we give a brief explanation of biometric cryptography approaches and algorithms which use various biometric data. We basically touch the use of keystroke dynamics, speech and 2D biometric data (such as fingerprint, palmprint, face, ...etc).

[1]  Michael K. Reiter,et al.  Cryptographic Key Generation from Voice (Extended Abstract) , 2001 .

[2]  Ibrahim Sogukpinar,et al.  Understanding users' keystroke patterns for computer access security , 2003, Comput. Secur..

[3]  Stephen M. Matyas,et al.  Generating user-based cryptographic keys and random numbers , 1999, Comput. Secur..

[4]  Michael K. Reiter,et al.  Password hardening based on keystroke dynamics , 1999, CCS '99.

[5]  A. Murat Tekalp,et al.  Joint audio-video processing for biometric speaker identification , 2003, 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03)..

[6]  Qi Li,et al.  Using voice to generate cryptographic keys , 2001, Odyssey.

[7]  Bhagavatula Vijaya Kumar,et al.  Biometric Encryption using image processing , 1998, Electronic Imaging.

[8]  Bhagavatula Vijaya Kumar,et al.  Biometric Encryption: enrollment and verification procedures , 1998, Defense + Commercial Sensing.