A Novel Key Generation Scheme for Biometric Cryptosystems Using Fingerprint Minutiae

被引:0
|
作者
Andalib, Ahmed Shayer [1 ]
Abdulla-Al-Shami, Md. [1 ]
机构
[1] Bangladesh Univ Engn & Technol, Dept Comp Sci & Engn, Dhaka 1000, Bangladesh
来源
2013 INTERNATIONAL CONFERENCE ON INFORMATICS, ELECTRONICS & VISION (ICIEV) | 2013年
关键词
Cancelable Biometrics; Biometric Template Security; Cryptographic Key; Short Time Fourier Transform (STFT); Gabor Filter; Directed Acyclic Graph (DAG); Longest Path;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, a novel method of generating cancelable cryptographic key using local features from fingerprint minutiae points has been proposed. Local features from input fingerprint image are determined and minutiae points are extracted using Gabor filter. Then a template matrix is generated from extracted minutiae points. Two directed acyclic graphs (DAG) are generated from the template matrix taking minutiae coordinates as edges. Binary values are assigned to each edge based on local features of the minutiae points-orientation, frequency and phase. Then for each DAG, the proposed algorithm selects each node as source and determines the longest reachable path, traverses the path and generates a binary string. Thus, two binary strings are generated from the two DAGs. Finally the proposed algorithm performs a simple rotation and combination operation on the two strings and generates four cryptographic keys. We have performed experiments on existing benchmark fingerprint databases and based on security analysis of our method we conclude that our proposed method is a simple and efficient method that generates four cancelable cryptographic keys and the proposed process has very strong irreversible property.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Biometric cryptosystems: A new biometric key binding and its implementation for fingerprint minutiae-based representation
    Jin, Zhe
    Teoh, Andrew Beng Jin
    Gor, Bok-Min
    Tay, Yong-Haur
    PATTERN RECOGNITION, 2016, 56 : 50 - 62
  • [2] Directional Area Based Minutiae Selection and Cryptographic Key Generation Using Biometric Fingerprint
    Panchal, Gaurang
    Samanta, Debasis
    PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INFORMATICS, ICCII 2016, 2017, 507 : 491 - 499
  • [3] Secure biometric key generation scheme for cryptography using combined biometric features of fingerprint and iris
    Balakumar, P.
    Venkatesan, R.
    International Journal of Computer Science Issues, 2011, 8 (5 5-2): : 349 - 356
  • [4] An improved image enhancement scheme for fingerprint minutiae extraction in biometric identification
    Simon-Zorita, D
    Ortega-Garcia, J
    Cruz-Llanas, S
    Sanchez-Bote, JL
    Glez-Rodriguez, J
    AUDIO- AND VIDEO-BASED BIOMETRIC PERSON AUTHENTICATION, PROCEEDINGS, 2001, 2091 : 217 - 222
  • [5] Improved and Innovative Key Generation Algorithms for Biometric Cryptosystems
    Ranjan, R.
    Singh, Sanjay Kumar
    PROCEEDINGS OF THE 2013 3RD IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2013, : 943 - 946
  • [6] Enhanced RSA Key Generation Modelling Using Fingerprint Biometric
    Bansal, Neha
    Mahto, Dindayal
    Yadav, Dilip Kumar
    HELIX, 2018, 8 (05): : 3922 - 3926
  • [7] Biometric Fingerprint Authentication with Minutiae using Ridge Feature Extraction
    Lomte, Archana C.
    2015 INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING (ICPC), 2015,
  • [8] Survey of Biometric Based Key Generation to Enhance Security of Cryptosystems
    Sadkhan, Sattar B.
    AL-Shukur, Baheeja K.
    Mattar, Ali K.
    2016 AL-SADIQ INTERNATIONAL CONFERENCE ON MULTIDISCIPLINARY IN IT AND COMMUNICATION TECHNIQUES SCIENCE AND APPLICATIONS (AIC-MITCSA), 2016,
  • [9] An Effective Scheme for Biometric Cryptosystems
    Zhou, Yu
    Han, Jin
    Zhao, Bo
    Zheng, Jun
    2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 241 - 244
  • [10] Multibiometrics Approach on Biometric Passport Pictures by Using Fingerprint Minutiae Points
    Aygun, Sercan
    Akcay, Muammer
    2016 4TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), 2016, : 89 - 94