Cryptographic Key Generation From Fingerprint

05.04.2020by
  1. H Choi, K Choi, J Kim, “Fingerprint Matching Incorporating Ridge Features With Minutiae,” IEEE Transactions on Information Forensics and Security, vol. 6, pp. 338–345, 2011.Google Scholar
  2. A. K. S. Li, “Fingerprint Combination for Privacy Protection,” IEEE Transactions on Information Forensics and Security, vol. 8, pp. 350–360, 2013.Google Scholar
  3. A Nagar, K. Nandakumar, A Jain, “Multibiometric Cryptosystems Based on Feature-Level Fusion,” IEEE Transactions on Information Forensics and Security, vol. 7, pp. 255–268, 2012.Google Scholar
  4. M. Upmanyu, A. Namboodiri, K. Srinathan, C. Jawahar, “Blind Authentication: A Secure Crypto-Biometric Verification Protocol,” IEEE Transactions on Information Forensics and Security, vol. 5, pp. 255–268, 2010.Google Scholar
  5. A. Jain, K Nandakumar, “Biometric authentication: System security and user privacy,” Computer, vol. 45(11), pp. 87–92, Nov. 2012.Google Scholar
  6. D. Stinson, Crypto. Theory and Practice, 2, Ed. CRC Press, 1995.Google Scholar
  7. “NIST Special Database 4 (Fingerprint),” Dec. 2013. [Online]. Available: http://www.nist.gov/srd/nistsd4.cfm
  8. FVC2004 Fingerprint Databases. [Online]. Available: http://bias.csr.unibo.it/fvc2004/Downloads
  9. F. Hao, R. Anderson, J. Daugman, “Combining Crypto with Biometrics Effectively,” IEEE TC, vol. 55, no. 9, pp. 1081–1088, 2006.Google Scholar
  10. K. Martin, H. Lu, F. Bui, N. Konstantinos, D. Hatzinakos, “A Biometric Encryption System for the Self-Exclusion Scenario of Face Reco.” IEEE SJ., vol. 3, no. 4, pp. 440–450, Dec. 2009.Google Scholar
  11. K. Nandakumar, A. Jain, S. Pankanti, “Fingerprint-Based Fuzzy Vault: Implementation and Performance,” IEEE Transactions on Information Forensics and Security, vol. 2, no. 4, pp. 744–757, Dec. 2007.Google Scholar
  12. W. Sheng, G. Howells, M. Fairhurst, and F. Deravi, “Template-Free Biometric-Key Generation by Means of Fuzzy Genetic Clustering,” IEEE Transactions on Information Forensics and Security, vol. 3, no. 2, pp. 183–191, 2008.Google Scholar
  13. Y. Lee, K. Park, S. Lee, K. Bae, J. Kim, “A new method for generating an invariant iris private key based on the fuzzy vault sys.” IEEE Trans. on Sys. Man and Cybernetics, vol. 38, no. 5, pp. 1302–1313, Oct. 2008.Google Scholar
  14. L. Eryun, Z. Heng, L. Jimin, P. Liaojun, X. Min, C. Hongtao, L. Yanhua, L. Peng, T. Jie, “A key binding system based on n-nearest minutiae structure of fingerprint,” Pattern Recognition Letters (Elsevier), vol. 32, pp. 666–675, 2011.Google Scholar
  15. L. Peng, X. Yang, K. Cao, X. Tao, “An alignment-free fingerprint cryptosystem based on fuzzy vault scheme,” Journal of Network and Computer Appl. (Elsevier), vol. 33, pp. 207–220, 2010.Google Scholar

The fingerprint is 20 bytes instead of 16 for MD5 used in the older package format. For V4 it is required to extract the public key packet first. This is likely to be the most tricky part, as PGP uses it's own packet format. You'll have to parse the binary data within your base 64 encoded blob to find the packet. In cryptography, a key is a piece of information that determines the functional output of a cryptographic algorithm. For encryption algorithms, a key specifies the transformation of plaintext into ciphertext, and vice versa for decryption algorithms. Nero 7 key generator download. Keys also specify transformations in other cryptographic algorithms, such as digital signature schemes and message authentication codes.

Download PDF
Abstract: Human users have a tough time remembering long cryptographic keys. Hence,researchers, for so long, have been examining ways to utilize biometricfeatures of the user instead of a memorable password or passphrase, in aneffort to generate strong and repeatable cryptographic keys. Our objective isto incorporate the volatility of the user's biometric features into thegenerated key, so as to make the key unguessable to an attacker lackingsignificant knowledge of the user's biometrics. We go one step further tryingto incorporate multiple biometric modalities into cryptographic key generationso as to provide better security. In this article, we propose an efficientapproach based on multimodal biometrics (Iris and fingerprint) for generationof secure cryptographic key. The proposed approach is composed of three modulesnamely, 1) Feature extraction, 2) Multimodal biometric template generation and3) Cryptographic key generation. Initially, the features, minutiae points andtexture properties are extracted from the fingerprint and iris imagesrespectively. Subsequently, the extracted features are fused together at thefeature level to construct the multi-biometric template. Finally, a 256-bitsecure cryptographic key is generated from the multi-biometric template. Forexperimentation, we have employed the fingerprint images obtained from publiclyavailable sources and the iris images from CASIA Iris Database. Theexperimental results demonstrate the effectiveness of the proposed approach.

Stable fingerprint key generation scheme. This scheme enables the generation of secure and cancelable cryptographic key with a very small FAR. The key can be used as private key for elliptic curve. Presently biometric templates (fingerprint, face and iris) in chips are exposed to clandestine scanning which does not assure security. System by using fingerprint features as a key in a cryptosystem. In this paper, combine the features of the fingerprint and cryptography for related privacy concerns. Key generate from fingerprint is combine with the system’s cryptographic key. Index Terms—Biometrics, Fingerprint, Minutiae points, Cryptography, Key generation. Dual Fingerprints Fusion for Cryptographic Key Generation M.Marimuthu Assistant Professor Coimbatore Institute of Technology A.Kannammal Professor Coimbatore Institute of Technology ABSTRACT Secured data transfer is a critical issue through open networks due to attackers and intruders. This paper presents a new.

Cryptographic Key Management System

Submission history

From: Rdv Ijcsis [view email]
[v1]Sun, 7 Mar 2010 12:15:40 UTC (1,166 KB)
Full-text links:

Download:

Current browse context:

Key Generator

Change to browse by:

References & Citations

DBLP - CS Bibliography

Cryptographic Key Generation From Cancelable Fingerprint Templates

A. Jagadeesan
K. Duraiswamy

Cryptographic Key Generation From Fingerprint Software

Which authors of this paper are endorsers? Disable MathJax (What is MathJax?) Browse v0.3.0 released 2020-04-15
Comments are closed.