Personalised cryptographic key generation based on FaceHashing

被引:80
作者
Teoh, ABJ
Ngo, DCL
Goh, A
机构
[1] Multimedia Univ, Fac Informat Sci & Technol, Melaka 75450, Malaysia
[2] Corentix Labs, Puchong 47100, Malaysia
基金
美国国家科学基金会;
关键词
biometric based key cryptography; face recognition; wavelet Fourier-Mellin transform; Tokenised pseudo random number; Shamir's secret-sharing scheme;
D O I
10.1016/j.cose.2004.06.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Among the various computer security techniques practice today, cryptography has been identified as one of the most important solutions in the integrated digital security system. Cryptographic techniques such as encryption can provide very Long passwords that are not required to be remembered but are in turn protected by simple password, hence defecting their purpose. In this,paper, we proposed a novel two-stage technique to generate personalized cryptographic keys from the face biometric, which offers the inextricably link to its owner. At the first stage, integral transform of biometric input is to discretise to produce a set of bit representation with a set of tokenised pseudo random number, coined as FaceHash. In the second stage, FaceHash is then securely reduced to a single cryptographic key via Shamir secret-sharing. Tokenised FaceHashing is rigorously protective of the face data, with security comparable to cryptographic hashing of token and knowledge key-factor. The key is constructed to resist cryptanalysis even against an adversary who captures the user device or the feature descriptor. (C) 2004 Elsevier Ltd. All rights reserved.
引用
收藏
页码:606 / 614
页数:9
相关论文
共 15 条
[1]  
Andrew T. B. J., 2003, ACM SIGMM 2003 ULT B, P82
[2]  
[Anonymous], 1997, A Wavelet Tour of Signal Processing
[3]  
Bodo A, 1994, German Patent, Patent No. [DE4243908A1, 4243908, 4243908 A1]
[4]  
DAUGMAN J, 2002, 482 CAMBR U COMP LAB
[5]   On enabling secure applications through off-line biometric identification [J].
Davida, GI ;
Frankel, Y ;
Matt, BJ .
1998 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1998, :148-157
[6]  
Goh A, 2003, LECT NOTES COMPUT SC, V2828, P1
[7]  
HARMON LD, 1973, SCI AM, P229
[8]  
Monrose F, 1999, 6TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P73, DOI 10.1145/319709.319720
[9]   Cryptographic key generation from voice [J].
Monrose, F ;
Reiter, MK ;
Li, Q ;
Wetzel, S .
2001 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2001, :202-213
[10]   Flexible images: Matching and recognition using learned deformations [J].
Nastar, C ;
Moghaddam, B ;
Pentland, A .
COMPUTER VISION AND IMAGE UNDERSTANDING, 1997, 65 (02) :179-191