Mining association rules between sets of items in large databases
SIGMOD '93 Proceedings of the 1993 ACM SIGMOD international conference on Management of data
Toward Machine Emotional Intelligence: Analysis of Affective Physiological State
IEEE Transactions on Pattern Analysis and Machine Intelligence - Graph Algorithms and Computer Vision
Comparison of different implementations of MFCC
Journal of Computer Science and Technology
An Analysis of Minutiae Matching Strength
AVBPA '01 Proceedings of the Third International Conference on Audio- and Video-Based Biometric Person Authentication
Biometric Recognition: Security and Privacy Concerns
IEEE Security and Privacy
Cryptographic Key Generation from Voice
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Emotion recognition from physiological signals using wireless sensors for presence technologies
Cognition, Technology and Work
Emotions and heart rate while sitting on a chair
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Pattern Recognition
Towards practical biometric key generation with randomized biometric templates
Proceedings of the 15th ACM conference on Computer and communications security
The practical subtleties of biometric key generation
SS'08 Proceedings of the 17th conference on Security symposium
Cryptographic-speech-key generation architecture improvements
IbPRIA'05 Proceedings of the Second Iberian conference on Pattern Recognition and Image Analysis - Volume Part II
Fingerprint-Based Fuzzy Vault: Implementation and Performance
IEEE Transactions on Information Forensics and Security
Biometrics: a tool for information security
IEEE Transactions on Information Forensics and Security
Hardening fingerprint Fuzzy vault using password
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Neuroscience meets cryptography: designing crypto primitives secure against rubber hose attacks
Security'12 Proceedings of the 21st USENIX conference on Security symposium
On the feasibility of side-channel attacks with brain-computer interfaces
Security'12 Proceedings of the 21st USENIX conference on Security symposium
Coercion resistance in authentication responsibility shifting
Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
Hi-index | 0.00 |
Many techniques have been proposed to generate keys including text passwords, graphical passwords, biometric data and etc. Most of these techniques are not resistant to coercion attacks in which the user is forcefully asked by an attacker to generate the key to gain access to the system or to decrypt the encrypted file. We present a novel approach in generating cryptographic keys to fight against coercion attacks. Our novel technique incorporates the user's emotional status, which changes when the user is under coercion, into the key generation through measurements of the user's skin conductance. We present a model that generates cryptographic keys with one's voice and skin conductance. In order to exploremore, a preliminary user study with 39 subjects was done which shows that our approach has moderate false-positive and false-negative rates. We also present the attacker's strategy in guessing the cryptographic keys, and show that the resulting change in the password space under such attacks is small.