DocumentCode :
2018742
Title :
Revocable key generation from irrevocable biometric data for symmetric cryptography
Author :
Barman, Subhas ; Samanta, Debasis ; Chattopadhyay, Samiran
Author_Institution :
Dept. of Comput. Sc. & Eng., Gov. Coll. of Eng. & Textile Tech., Berhampore, India
fYear :
2015
fDate :
7-8 Feb. 2015
Firstpage :
1
Lastpage :
4
Abstract :
Crypto-biometric system (CBS) is a combination of biometrie with cryptography to enhance network security. Biometrie is the most trustworthy measure to identify a person uniquely using his or her behavioral and physiological characteristics. Cryptography is an effective concern to the security of information. The security of cryptography depends on the strength of cryptographic key and strength of key depends on the length of key. In the traditional cryptography, key is generated randomly and it is very difficult to remember as the key is not linked with user. To address this limitation of cryptography, CBS uses biometrie data of user to bind key with its owner and as the key is linked with user´s biometrie data, user does not need to remember the key. As biometrie data is irrevocable, it becomes useless when compromised and as a result the biometrie based key becomes also useless. In this approach, fingerprint features are used to generate key for cryptographic application. The key is revocable and easy to revoke when required. In our experiment, FVC2004 fingerprint database is used to investigate the result.
Keywords :
cryptography; fingerprint identification; CBS; FVC2004 fingerprint database; behavioral and physiological characteristics; biometrie based key; biometrie data; crypto-biometric system; cryptographic application; cryptographic key; fingerprint feature; information security; irrevocable biometric data; network security; revocable key generation; symmetric cryptography; Bioinformatics; Cryptography; Databases; Feature extraction; Fingerprint recognition; Iris recognition;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer, Communication, Control and Information Technology (C3IT), 2015 Third International Conference on
Conference_Location :
Hooghly
Print_ISBN :
978-1-4799-4446-0
Type :
conf
DOI :
10.1109/C3IT.2015.7060182
Filename :
7060182
Link To Document :
بازگشت