Obtaining cryptographic keys using feature level fusion of iris and face biometrics for secure user authentication

  • Sanjay Kanade
  • , Dijana Petrovska-Delacrétaz
  • , Bernadette Dorizzi

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Biometric traits are permanently associated with a user. Though this is an advantage from identity verification point of view, if such biometric data is compromised, it cannot be replaced by a new one and becomes unusable in the system. This limitation can be overcome by combining biometrics with cryptographic techniques to induce revocability in biometric systems. In this paper, a multi-biometrics based cryptographic key regeneration scheme is proposed which combines information from iris and face to obtain a long cryptographic key having high entropy. The biometric information fusion is carried in feature domain using weighted feature level fusion technique. With the proposed system, we obtain 210-bit keys with 183-bit entropy (which is significantly higher than the 83-bit entropy obtained for iris), at a False Acceptance Rate of 0% and a False Rejection Rate of 0.91%.

Original languageEnglish
Title of host publication2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition - Workshops, CVPRW 2010
Pages138-145
Number of pages8
DOIs
Publication statusPublished - 17 Sept 2010
Event2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition - Workshops, CVPRW 2010 - San Francisco, CA, United States
Duration: 13 Jun 201018 Jun 2010

Publication series

Name2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition - Workshops, CVPRW 2010

Conference

Conference2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition - Workshops, CVPRW 2010
Country/TerritoryUnited States
CitySan Francisco, CA
Period13/06/1018/06/10

Fingerprint

Dive into the research topics of 'Obtaining cryptographic keys using feature level fusion of iris and face biometrics for secure user authentication'. Together they form a unique fingerprint.

Cite this