scispace - formally typeset
Open Access

A schema for cryptographic keys generation using hybrid biometrics

Reads0
Chats0
TLDR
This paper examines the possibility of using a combination of biometric attributes to overcome common problems in having a single biometric scheme for authentication and also investigates possible schemes and features to deal with variations in Biometric attributes.
Abstract
Biometric identifiers refer to unique physical properties or behavioral attributes of individuals. Some of the w ell known biometric identifiers are voice, finger prints, retina or iris, facial structure etc. I n our daily interaction w ith others directly or indirectly, we implicitly use biometrics to know, distinguish and trust people. Biometric identifiers represent the concept of "who a person ' is" ' by ' gathering ' vital ' characteristics ' that ' don't ' correspond to any other person. The human brain to some extent is able to ascertain disparities or variation in certain physical attributes and yet verify the authenticity of a person. But this is difficult to be implemented in electronic systems due to the intense requirements of artificial decision making and hard-coded logic. This paper examines the possibility of using a combination of biometric attributes to overcome common problems in having a single biometric scheme for authentication. I t also investigates possible schemes and features to deal with variations in Biometric attributes. The material presented is related to ongoing research by the Computer Communications R esearch group at Leeds Metropolitan University. We use this paper as a starting step and as a plan for advanced research. It offers ideas and proposition for implementing hybrid biometrics in conjunction with cryptography. This is a work in progress and is in a very preliminary stage.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

A survey on biometric cryptosystems and cancelable biometrics

TL;DR: A comprehensive survey of biometric cryptosystems and cancelable biometrics is presented and state-of-the-art approaches are reviewed based on which an in-depth discussion and an outlook to future prospects are given.
Proceedings ArticleDOI

A Quick Algorithmfor Reduction of Attribute in Information Systems

TL;DR: This paper proposes a key management scheme using biometrics, which can generate constant and accurate keys from noisy biometric samples every time, utilizing a multivariate linear equation and its solution space to generate repeatable keys.
Journal ArticleDOI

Recent Developments on Applying Biometrics in Cryptography

TL;DR: Recent developments on applying biometrics in cryptography are surveyed, focusing on binding and generating a cryptographic key and some other developments, such as matching without removing chaff points, encrypted templates matching, symmetric hashing, and biometric random number generation are reviewed.

A Review Regarding the Biometrics Cryptography Challenging Design and Strategies

TL;DR: This paper reviews the state of the art biometrics Cryptosystems from the Point of Challenging Designs Strategies with a focus on the fuzzy vault construct, which secures both the secret key and the biometric template by binding them within a cryptographic framework.

TECHNOLOGY Recent Developments on Applying Biometrics in Cryptography

Qinghai Gao
TL;DR: Recent developments on applying biometrics in cryptography are surveyed, focusing on binding and generating a cryptographic key and some other developments, such as matching without removing chaff points, encrypted templates matching, symmetric hashing, and biometric random number generation are reviewed.
References
More filters
Book

Handbook of Applied Cryptography

TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Book ChapterDOI

Fuzzy extractors: How to generate strong keys from biometrics and other noisy data

TL;DR: This work provides formal definitions and efficient secure techniques for turning biometric information into keys usable for any cryptographic application, and reliably and securely authenticating biometric data.
Book

Biometrics: Personal Identification in Networked Society

TL;DR: This book covers the general principles and ideas of designing biometric-based systems and their underlying tradeoffs, and the exploration of some of the numerous privacy and security implications of biometrics.
Proceedings ArticleDOI

On enabling secure applications through off-line biometric identification

TL;DR: This paper studies secure off-line authenticated user identification schemes based on a biometric system that can measure a user's biometrics accurately (up to some Hamming distance) and investigates a new technology which allows a users' biometric data to facilitate cryptographic mechanisms.
Journal ArticleDOI

Private key generation from on-line handwritten signatures

TL;DR: A novel and feasible system – BioPKI cryptosystem – that dynamically generates private keys from users’ on‐line handwritten signatures is described that is secure, reliable, convenient and non‐invasive.