Privacy-Preserving Population-Enhanced Biometric Key Generation from Free-Text Keystroke Dynamics

被引:0
作者
Sedenka, Jaroslav [1 ,3 ]
Balagani, Kiran S. [1 ]
Phoha, Vir [2 ]
Gasti, Paolo [1 ]
机构
[1] New York Inst Technol, Old Westbury, NY 11568 USA
[2] Louisiana Tech Univ, Ruston, LA 71270 USA
[3] Masaryk Univ, Fac Sci, Brno, Czech Republic
来源
2014 IEEE/IAPR INTERNATIONAL JOINT CONFERENCE ON BIOMETRICS (IJCB 2014) | 2014年
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Biometric key generation techniques are used to reliably generate cryptographic material from biometric signals. Existing constructions require users to perform a particular activity (e.g., type or say a password, or provide a handwritten signature), and are therefore not suitable for generating keys continuously. In this paper we present a new technique for biometric key generation from free-text keystroke dynamics. This is the first technique suitable for continuous key generation. Our approach is based on a scaled parity code for key generation (and subsequent key reconstruction), and can be augmented with the use of population data to improve security and reduce key reconstruction error. In particular, we rely on linear discriminant analysis (LDA) to obtain a better representation of discriminable biometric signals. To update the LDA matrix without disclosing user's biometric information, we design a provably secure privacy-preserving protocol (PP-LDA) based on homomorphic encryption. Our biometric key generation with PP-LDA was evaluated on a dataset of 486 users. We report equal error rate around 5% when using LDA, and below 7% without LDA.
引用
收藏
页数:8
相关论文
共 23 条
  • [1] [Anonymous], 2008, Proceedings of the 17th Conference on USENIX Security Symposium
  • [2] [Anonymous], 2008, IACR CRYPTOLOGY EPRI
  • [3] Chen B., 2007, DIGITAL IMAGE COMPUT
  • [4] Clancy T.C., P 2003 ACM SIGMM WOR, P45
  • [5] Damgard Ivan, 2008, International Journal of Applied Cryptography, V1, P22, DOI 10.1504/IJACT.2008.017048
  • [6] enka J. Sed., 2014, PRIVACY PRESERVING P
  • [7] The use of multiple measurements in taxonomic problems
    Fisher, RA
    [J]. ANNALS OF EUGENICS, 1936, 7 : 179 - 188
  • [8] Cryptographic key generation using handwritten signature
    Freire-Santos, M.
    Fierrez-Aguilar, J.
    Ortega-Garcia, J.
    [J]. BIOMETRIC TECHNOLOGY FOR HUMAN IDENTIFICATION III, 2006, 6202
  • [9] Han SG, 2008, LECT NOTES ARTIF INT, V5012, P136
  • [10] Private key generation from on-line handwritten signatures
    Feng, Hao
    Wah, Chan Choong
    [J]. Information Management and Computer Security, 2002, 10 (04): : 159 - 164