Multi-biometrics based cryptographic key regeneration scheme

  • Sanjay Kanade
  • , Dijana Petrovska-Delacrétaz
  • , Bernadette Dorizzi

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Biometrics lack revocability and privacy while cryptography cannot detect the user's identity. By obtaining cryptographic keys using biometrics, one can achieve the properties such as revocability, assurance about user's identity, and privacy. In this paper, we propose a multi-biometric based cryptographic key regeneration scheme. Since left and right irises of a person are uncorrelated, we treat them as two independent biometrics and combine in our system. We propose a novel idea for feature level fusion through weighted error correction to obtain a multi-biometric feature vector which is used to get a secure template. A shuffling key which is protected by a password is used to shuffle the error correcting codes data. The password helps improve revocability, privacy, and security of the system. We succeed to generate 147-bit long keys with as much entropy at 0% FAR and 0.18% FRR on the NIST-ICE database.

Original languageEnglish
Title of host publicationIEEE 3rd International Conference on Biometrics
Subtitle of host publicationTheory, Applications and Systems, BTAS 2009
DOIs
Publication statusPublished - 16 Dec 2009
Externally publishedYes
EventIEEE 3rd International Conference on Biometrics: Theory, Applications and Systems, BTAS 2009 - Washington, DC, United States
Duration: 28 Sept 200930 Sept 2009

Publication series

NameIEEE 3rd International Conference on Biometrics: Theory, Applications and Systems, BTAS 2009

Conference

ConferenceIEEE 3rd International Conference on Biometrics: Theory, Applications and Systems, BTAS 2009
Country/TerritoryUnited States
CityWashington, DC
Period28/09/0930/09/09

Keywords

  • Cryptography
  • Error correcting codes
  • Key generation
  • Multi-biometrics

Fingerprint

Dive into the research topics of 'Multi-biometrics based cryptographic key regeneration scheme'. Together they form a unique fingerprint.

Cite this