Title :
Security analysis for key generation systems using face images
Author :
Zhang, Wende ; Zhang, Cha ; Chen, Tsuhan
Author_Institution :
Dept. of Electr. & Comput. Eng., Carnegie Mellon Univ., Pittsburgh, PA, USA
Abstract :
In this paper, we analyze the security problem of user information associated key generation (UIAKG) systems. We consider three kinds of attacks from the hacker: the exhaustive search attack, the authentic key statistics attack and the device key statistics attack. Under each attack, we give the estimate of the number of guesses the hacker has to make in order to access the system. Such analysis provides useful guidelines in designing a UIAKG system. The analysis also suggests that a user-dependent UIAKG is more secure than a user-independent one. Two UIAKG systems using face images as inputs are designed and compared to support the above theoretical analysis.
Keywords :
cryptography; face recognition; authentic key statistics attack; device key statistics attack; exhaustive search attack; face image; hacker; key generation system; security analysis; user information associated key generation system; Application software; Biometrics; Computer hacking; Computer security; Cryptography; Guidelines; Image analysis; Information security; Lungs; Statistics;
Conference_Titel :
Image Processing, 2004. ICIP '04. 2004 International Conference on
Print_ISBN :
0-7803-8554-3
DOI :
10.1109/ICIP.2004.1421858