DocumentCode :
3050359
Title :
Security analysis for key generation systems using face images
Author :
Zhang, Wende ; Zhang, Cha ; Chen, Tsuhan
Author_Institution :
Dept. of Electr. & Comput. Eng., Carnegie Mellon Univ., Pittsburgh, PA, USA
Volume :
5
fYear :
2004
fDate :
24-27 Oct. 2004
Firstpage :
3455
Abstract :
In this paper, we analyze the security problem of user information associated key generation (UIAKG) systems. We consider three kinds of attacks from the hacker: the exhaustive search attack, the authentic key statistics attack and the device key statistics attack. Under each attack, we give the estimate of the number of guesses the hacker has to make in order to access the system. Such analysis provides useful guidelines in designing a UIAKG system. The analysis also suggests that a user-dependent UIAKG is more secure than a user-independent one. Two UIAKG systems using face images as inputs are designed and compared to support the above theoretical analysis.
Keywords :
cryptography; face recognition; authentic key statistics attack; device key statistics attack; exhaustive search attack; face image; hacker; key generation system; security analysis; user information associated key generation system; Application software; Biometrics; Computer hacking; Computer security; Cryptography; Guidelines; Image analysis; Information security; Lungs; Statistics;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Image Processing, 2004. ICIP '04. 2004 International Conference on
ISSN :
1522-4880
Print_ISBN :
0-7803-8554-3
Type :
conf
DOI :
10.1109/ICIP.2004.1421858
Filename :
1421858
Link To Document :
بازگشت