Systems and Means of Informatics
2015, Volume 25, Issue 2, pp 85-95
NOVEL METHOD FOR ROBUST KEY GENERATION FROM ONLINE BIOMETRIC SIGNATURE
Abstract
Existing symmetric encryption algorithms require storage of the secret
key. Stored keys are often protected by poorly selected user passwords or pin-
codes. Combining biometrics with cryptography is often assumed as a possible
solution. This paper describes a novel method for transforming an online
biometric signature into a binary vector, which can be used as a cryptographic
key. The method is based on a secure sketch scheme and makes it possible to
construct 16-bit keys with false accept rate and false reject rate less than 10%.
[+] References (6)
- Ushmaev, O., V. Gudkov, and V. Kuznetsov. 2011. Algoritm izvlecheniya binarnogo
vektora iz izobrazheniy otpechatkov pal'tsev [Algorithm of the binary vector extraction
from fingerprint images]. Matematicheskie metody raspoznavaniya obrazov: Sb. dokl.
XV Vseross. konf. [15th Conference on MathematicalMethods for Pattern Recognition
Proceedings]. Moscow:Maks Press. 485 - 488.
- Freire-Santos, M., J. Fierrez-Aguilar, and J. Ortega-Garcia. 2006. Cryptographic key
generation using handwritten signature. SPIE Conference on Biometric Technology for
Human Identification III Proceedings. 6202:225 - 231. doi: 10.1117/12.665875.
- Kholmatov, A., and B. Yanikoglu. 2006. Biometric cryptosystemusing online signatures.
Computer and Information Sciences. Eds. A. Levi, E. Savas, H. Yenigun, S. Balcisoy,
and Y. Saygin. Lectures note in computer science ser. Berlin - Heidelberg: Springer.
4263:981 - 990. doi: 10.1007/11902140 102.
- Freire-Santos, M., J. Fierrez-Aguilar, M. Martinez-Diaz, and J. Ortega-Garcia. 2007.
On the applicability of off-line signatures to the fuzzy vault construction. 9th Conference
(International) on Document Analysis and Recognition (ICDAR 2007) Proceedings.
IEEE Computer Society. 2:1173 - 1177. doi: 10.1109/ICDAR.2007.195.
- Ivanov, A., V. Funtikov, and O. Efimov. 2008. Neyrosetevaya zashchita biometricheskikh dannykh pol'zovatelya, a takzhe ego lichnogo kriptograficheskogo klyucha pri
lokal'noy i distantsionnoy autentifikatsii [Neural protection of personal cryptographic
key and user's biometric template in local and remote authentication]. Voprosy Zashchity
Informatsii [Information security questions] 2(81):25 - 27.
- Ruchaj, A. 2009. Invarianty kak metod verifikatsii po staticheskoy podpisi [Using
invariants for verification on offline signature]. Znaniya - Ontologii - Teorii (ZONT-
09): Mat-ly II Vseross. konf. s mezhdunarodnym uchastiem [2nd Conference on
Knowledge - Ontology - Theory (KONT-09) Proceedings]. Novosibirsk: Sobolev Institute
of Mathematics RAS. 212 - 215.
[+] About this article
Title
NOVEL METHOD FOR ROBUST KEY GENERATION FROM ONLINE BIOMETRIC SIGNATURE
Journal
Systems and Means of Informatics
Volume 25, Issue 2, pp 85-95
Cover Date
2015-01-30
DOI
10.14357/08696527150205
Print ISSN
0869-6527
Publisher
Institute of Informatics Problems, Russian Academy of Sciences
Additional Links
Key words
biometric cryptography; online signature; fuzzy extractor; secure sketch
Authors
V. V. Kuznetsov
Author Affiliations
Institute of Informatics Problems, Federal Research Center "Computer Science
and Control," Russian Academy of Sciences, 44-2 Vavilov Str., Moscow 119333,
Russian Federation
|