Deep learning-based biometric cryptographic key generation with post-quantum security

被引:3
作者
Kuznetsov, Oleksandr [1 ,2 ,3 ]
Zakharov, Dmytro [4 ]
Frontoni, Emanuele [1 ,5 ]
机构
[1] Univ Macerata, Dept Polit Sci Commun & Int Relat, Via Crescimbeni,30-32, I-62100 Macerata, MC, Italy
[2] Comenius Univ, Dept Informat Syst, Fac Management, Odbojarov 10, Bratislava 25, Slovakia
[3] Kharkov Natl Univ, Dept Informat & Commun Syst Secur, 4 Svobody Sq, UA-61022 Kharkiv, Ukraine
[4] Kharkov Natl Univ, Dept Appl Math, 4 Svobody Sq, UA-61022 Kharkiv, Ukraine
[5] Marche Polytech Univ, Dept Informat Engn, Via Brecce Bianche 12, I-60131 Ancona, AN, Italy
关键词
Cryptographic keys; Deep learning models; Convolutional neural networks; Fuzzy extractor; Biometric face images; Code-based cryptosystems; FUZZY VAULT; SCHEME;
D O I
10.1007/s11042-023-17714-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In contemporary digital security systems, the generation and management of cryptographic keys, such as passwords and pin codes, often rely on stochastic random processes and intricate mathematical transformations. While these keys ensure robust security, their storage and distribution necessitate sophisticated and costly mechanisms. This study explores an alternative approach that leverages biometric data for generating cryptographic keys, thereby eliminating the need for complex storage and distribution processes. The paper investigates biometric key generation technologies based on deep learning models, specifically utilizing convolutional neural networks to extract biometric features from human facial images. Subsequently, code-based cryptographic extractors are employed to process the primary extracted features. The performance of various deep learning models and the extractor is evaluated by considering Type 1 and Type 2 errors. The optimized algorithm parameters yield an error rate of less than 10%, rendering the generated keys suitable for biometric authentication. Additionally, this study demonstrates that the application of code-based cryptographic extractors provides a post-quantum level of security, further enhancing the practicality and effectiveness of biometric key generation technologies in modern information security systems. This research contributes to the ongoing efforts towards secure, efficient, and user-friendly authentication and encryption methods, harnessing the power of biometric data and deep learning techniques.
引用
收藏
页码:56909 / 56938
页数:30
相关论文
共 50 条
  • [21] Post-quantum secure authenticated key agreement protocol for wireless sensor networks
    Singh, Mrityunjay
    Mishra, Dheerendra
    TELECOMMUNICATION SYSTEMS, 2023, 84 (1) : 101 - 113
  • [22] Analysis of Biometric-Based Cryptographic Key Exchange Protocols-BAKE and BRAKE
    Gorski, Maksymilian
    Wodo, Wojciech
    CRYPTOGRAPHY, 2024, 8 (02)
  • [23] A Novel Machine Learning-Based Approach for Security Analysis of Authentication and Key Agreement Protocols
    Zahednejad, Behnam
    Ke, Lishan
    Li, Jing
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [24] Secure Social Internet of Things Based on Post-Quantum Blockchain
    Yi, Haibo
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2022, 9 (03): : 950 - 957
  • [25] Performance Evaluation of Post-quantum Public-Key Cryptography in Smart Mobile Devices
    Chikouche, Noureddine
    Ghadbane, Abderrahmen
    CHALLENGES AND OPPORTUNITIES IN THE DIGITAL ERA, 2018, 11195 : 67 - 80
  • [26] Deep Learning-Based Next-Generation Waveform for Multiuser VLC Systems
    Asif, Hafiz M.
    Affan, Affan
    Tarhuni, Naser
    Raahemifar, Kaamran
    SENSORS, 2022, 22 (07)
  • [27] From Pre-Quantum to Post-Quantum IoT Security: A Survey on Quantum-Resistant Cryptosystems for the Internet of Things
    Fernandez-Carames, Tiago M.
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (07): : 6457 - 6480
  • [28] Cyber security in smart cities: A review of deep learning-based applications and case studies
    Chen, Dongliang
    Wawrzynski, Pawel
    Lv, Zhihan
    SUSTAINABLE CITIES AND SOCIETY, 2021, 66
  • [29] A Biometric Key Generation Method Based on Semisupervised Data Clustering
    Sheng, Weiguo
    Chen, Shengyong
    Xiao, Gang
    Mao, Jiafa
    Zheng, Yujun
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2015, 45 (09): : 1205 - 1217
  • [30] Machine learning-based frequency security early warning considering uncertainty of renewable generation
    Li, Huarui
    Li, Changgang
    Liu, Yutian
    INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2022, 134