Fingerprint-Based Asymmetric Bio-Cryptographic Key Generation Using Convolution Network

被引:0
作者
Maiti, Diptadip [1 ]
Basak, Madhuchhanda [1 ]
Das, Debashis [1 ]
机构
[1] Techno India Univ, Comp Sci & Engn Dept, Kolkata, West Bengal, India
来源
FOURTH CONGRESS ON INTELLIGENT SYSTEMS, VOL 2, CIS 2023 | 2024年 / 869卷
关键词
Cryptographic key; Bio-metric security; Fingerprint; Asymmetric cryptography; Convolution;
D O I
10.1007/978-981-99-9040-5_3
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The asymmetric cryptography techniques use in the field of data security suffer from the challenge of maintaining the private key as secret. As a result, creating cryptographic keys utilizing an individual user's bio-metric traits is a viable option. Convolutional operations are an excellent method for extracting information from bio-metric images. In the proposed work, a asymmetric bio-key generation process is formulated using convolution network for feature extraction with polynomial solver and prime factorization. A large number of asymmetric bio-key can be generated from the proposed method. Three publicly available data set called FVC2000, FVC2002 and FVC2004 are used for the experiment. Relevant security analysis is performed to evaluate the proposed algorithm.
引用
收藏
页码:29 / 49
页数:21
相关论文
共 26 条
[1]  
Barman S, 2014, 2014 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND APPLICATIONS (ICHPCA)
[2]  
Barman Subhas, 2015, 2015 3 INT C COMPUTE
[3]  
Dey S, 2020, A fingerprint based crypto-biometric system for secure communication
[4]  
Dutta S, 2008, LECT NOTES COMPUT SC, V5259, P38, DOI 10.1007/978-3-540-88458-3_4
[5]  
Forouzan B. A., 2015, CRYPTOGRAPHY NETWORK, V12
[6]   Recent advances in convolutional neural networks [J].
Gu, Jiuxiang ;
Wang, Zhenhua ;
Kuen, Jason ;
Ma, Lianyang ;
Shahroudy, Amir ;
Shuai, Bing ;
Liu, Ting ;
Wang, Xingxing ;
Wang, Gang ;
Cai, Jianfei ;
Chen, Tsuhan .
PATTERN RECOGNITION, 2018, 77 :354-377
[7]  
Hao F., 2005, Combining cryptography with biometrics effectively
[8]   Biometric identification [J].
Jain, A ;
Hong, L ;
Pankanti, S .
COMMUNICATIONS OF THE ACM, 2000, 43 (02) :90-98
[9]  
Knuth D. E., 1976, Theoretical Computer Science, V3, P321, DOI 10.1016/0304-3975(76)90050-5
[10]  
Kuribayashi M, 2020, ASIAPAC SIGN INFO PR, P1340