A Novel Key Generation Cryptosystem Based on Face Features

被引:0
作者
Wu, Lifang [1 ]
Liu, Xingsheng [1 ]
Yuan, Songlong [1 ]
Xiao, Peng [1 ]
机构
[1] Beijing Univ Technol, Sch Elect Informat & Control Engn, Beijing 100124, Peoples R China
来源
2010 IEEE 10TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS (ICSP2010), VOLS I-III | 2010年
关键词
Biometric encryption; key-generation; bio-key; error-correct-code;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
with the development of Internet, Information security is becoming more and more important. Traditional cryptographic methods require the user to remember keys, it is not convenient. Biometrics based cryptographic key generation techniques generate cryptographic keys from biometrics directly. In this paper, we propose a biometric cryptosystem based on face biometrics. At encryption stage, a 128-dimensional principal component analysis (PCA) feature vector is firstly extracted from the face image. And a 128 bit binary vector is obtained by thresholding: Then we select the distinguishable bits to form bio-key and the optimal bit order number is saved in a look-up table. Furthermore, an error-correct-code (ECC) is generated using Reed-Solomon algorithm. The message is encrypted using symmetric DES with bio-key. In decryption phase, a 128-dimensional PCA features vector extracted from the query face image. Then a bin-key is generated using the look-up table generated at encryption stage. The final key is obtained using both bio-key and Error correct code (ECC). Finally, the symmetric DES decryption algorithm implemented to obtain message using final key. The proposed scheme is tested using ORL face database, the experimental results shows that our algorithm is effective.
引用
收藏
页码:1675 / 1678
页数:4
相关论文
共 21 条
[1]  
[Anonymous], 2007, P 2 ACM S INF COMP C, DOI DOI 10.1145/1229285.1229325
[2]  
Arakala A, 2007, LECT NOTES COMPUT SC, V4642, P760
[3]  
Cavoukian A., 2007, Biometric encryption: a positive-sum technol- ogy that achieves strong authentication, security and privacy
[4]  
Chang EC, 2007, LECT NOTES COMPUT SC, V4642, P750
[5]   Biometrics-based cryptographic key generation [J].
Chang, YJ ;
Zhang, WD ;
Chen, TS .
2004 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXP (ICME), VOLS 1-3, 2004, :2203-2206
[6]  
Chen B., 2007, DEC 2007 P 9 BIENN C
[7]  
Dodis Y, 2004, LECT NOTES COMPUT SC, V3027, P523
[8]  
Dodis Y., 2006, 235 CRYPT EPRRINT AR
[9]   Biometric template security [J].
Jain, Anil K. ;
Nandakumar, Karthik ;
Nagar, Abhishek .
EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2008,
[10]  
Li Q., 2006, P 8 WORKSHOP MULTIME, P56