An Efficient Approach to Generating Cryptographic Keys from Face and Iris Biometrics Fused at the Feature Level

被引:0
作者
Abuguba, Saad [1 ]
Milosavljevic, Milan M. [1 ]
Macek, Nemanja [1 ]
机构
[1] Singidunum Univ, Comp Technol Dept, Fac Informat & Comp, Sch Elect & Comp Engn Appl Studies, Belgrade, Serbia
来源
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY | 2015年 / 15卷 / 06期
关键词
biometrics; cryptography; feature fusion; face; iris; key generation;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Biometrics, defined as automated recognition of individuals based on their behavioral and biological characteristics, is beginning to gain acceptance as a legitimate authentication method and a practicable option to traditional identification methods in several application areas. Biometric cryptosystems, designed to generate a cryptographic key from a biometric trait, incorporate high level of security provided by cryptography and non-repudiation provided by biometry, as well as eliminating the need for a user to remember long passwords or carry tokens. Unlike unimodal biometric systems that employ single feature, multimodal biometric cryptosystems generate keys from two or more individual modalities typically fused at feature level. Fusing feature sets related to different modalities prevents possible spoof attacks and provides the system with higher level of overall security. This paper present an efficient approach to secure cryptographic key generation from iris and face biometric traits. Features extracted from preprocessed face and iris images are fused at the feature level and the multimodal biometric template is constructed from the Gabor filter and Principal Component Analysis outputs. This template is used to generate strong 256-bit cryptographic key. Experiments were performed using iris and face images from CASIA and ORL databases and the efficiency of the proposed approach is confirmed.
引用
收藏
页码:6 / 11
页数:6
相关论文
共 29 条
[1]  
Bae K, 2003, LECT NOTES COMPUT SC, V2688, P838
[2]  
Balakumar P., 2012, INT J COMPUTER SCI I, V2, P80
[3]  
Bansal A. K., 2013, INT J COMPUTER APPL, V76, P14
[4]   Biometrics-based cryptographic key generation [J].
Chang, YJ ;
Zhang, WD ;
Chen, TS .
2004 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXP (ICME), VOLS 1-3, 2004, :2203-2206
[5]  
Chen B., 2007, DIG IM COMP TECHN AP
[6]   Designing Gabor filters for optimal texture separability [J].
Clausi, DA ;
Jernigan, TE .
PATTERN RECOGNITION, 2000, 33 (11) :1835-1849
[7]   How iris recognition works [J].
Daugman, J .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2004, 14 (01) :21-30
[8]   Face and gesture recognition: Overview [J].
Daugman, J .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1997, 19 (07) :675-676
[9]   RESEARCH ON FACE AND IRIS FEATURE RECOGNITION BASED ON 2DDCT AND KERNEL FISHER DISCRIMINANT ANALYSIS [J].
Gan, Jun-Ying ;
Gao, Jian-Hu ;
Liu, Jun-Feng .
PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON WAVELET ANALYSIS AND PATTERN RECOGNITION, VOLS 1 AND 2, 2008, :401-405
[10]   FUSION AND RECOGNITION OF FACE AND IRIS FEATURE BASED ON WAVELET FEATURE AND KFDA [J].
Gan, Jun-Ying ;
Liu, Jun-Feng .
PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON WAVELET ANALYSIS AND PATTERN RECOGNITION, 2009, :47-50