CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Password hardening based on keystroke dynamics
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems
Theory of Information and Coding
Theory of Information and Coding
Protocols Using Keys from Faulty Data
Revised Papers from the 9th International Workshop on Security Protocols
Cryptographic Key Generation from Voice
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Secure smartcardbased fingerprint authentication
WBMA '03 Proceedings of the 2003 ACM SIGMM workshop on Biometrics methods and applications
Reusable cryptographic fuzzy extractors
Proceedings of the 11th ACM conference on Computer and communications security
Cancellable biometrics and annotations on BioHash
Pattern Recognition
Image understanding for iris biometrics: A survey
Computer Vision and Image Understanding
EURASIP Journal on Advances in Signal Processing
Secure Biometric Authentication with Improved Accuracy
ACISP '08 Proceedings of the 13th Australasian conference on Information Security and Privacy
Efficient Helper Data Key Extractor on FPGAs
CHES '08 Proceeding sof the 10th international workshop on Cryptographic Hardware and Embedded Systems
Towards practical biometric key generation with randomized biometric templates
Proceedings of the 15th ACM conference on Computer and communications security
The best of both worlds: Applying secure sketches to cancelable biometrics
Science of Computer Programming
The practical subtleties of biometric key generation
SS'08 Proceedings of the 17th conference on Security symposium
A Biometric Key-Binding and Template Protection Framework Using Correlation Filters
ICB '09 Proceedings of the Third International Conference on Advances in Biometrics
Systematic Construction of Iris-Based Fuzzy Commitment Schemes
ICB '09 Proceedings of the Third International Conference on Advances in Biometrics
Robust Biometric Key Extraction Based on Iris Cryptosystem
ICB '09 Proceedings of the Third International Conference on Advances in Biometrics
A secure cryptosystem from palm vein biometrics
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
Biometric quantization through detection rate optimized bit allocation
EURASIP Journal on Advances in Signal Processing
Multibiometric cryptosystem: model structure and performance analysis
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
Development of a new cryptographic construct using palmprint-based fuzzy vault
EURASIP Journal on Advances in Signal Processing - Special issue on recent advances in biometric systems: a signal processing perspective
Sorted index numbers for privacy preserving face recognition
EURASIP Journal on Advances in Signal Processing - Special issue on recent advances in biometric systems: a signal processing perspective
Multi-biometrics based cryptographic key regeneration scheme
BTAS'09 Proceedings of the 3rd IEEE international conference on Biometrics: Theory, applications and systems
Biometrics-based identifiers for digital identity management
Proceedings of the 9th Symposium on Identity and Trust on the Internet
A hybrid biometric cryptosystem for securing fingerprint minutiae templates
Pattern Recognition Letters
Robust iris verification for key management
Pattern Recognition Letters
Extended private information retrieval and its application in biometrics authentications
CANS'07 Proceedings of the 6th international conference on Cryptology and network security
An efficient biocryptosystem based on the iris biometrics
PSIVT'07 Proceedings of the 2nd Pacific Rim conference on Advances in image and video technology
An alignment-free fingerprint cryptosystem based on fuzzy vault scheme
Journal of Network and Computer Applications
Minutiae and modified Biocode fusion for fingerprint-based key generation
Journal of Network and Computer Applications
Cancelable fingerprint templates using minutiae-based bit-strings
Journal of Network and Computer Applications
A formal study of the privacy concerns in biometric-based remote authentication schemes
ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
An authentication protocol with encrypted biometric data
AFRICACRYPT'08 Proceedings of the Cryptology in Africa 1st international conference on Progress in cryptology
An effective crypto-biometric system for secure email in wireless environment
Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia
Information leakage in fuzzy commitment schemes
IEEE Transactions on Information Forensics and Security
Information Sciences: an International Journal
Iris boundary detection using a novel algorithm
ACE'10 Proceedings of the 9th WSEAS international conference on Applications of computer engineering
A new accurate technique for iris boundary detection
WSEAS Transactions on Computers
Binary spectral minutiae representation with multi-sample fusion for fingerprint recognition
Proceedings of the 12th ACM workshop on Multimedia and security
An analysis of random projection for changeable and privacy-preserving biometric verification
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
A novel algorithm of fingerprint encryption using minutiae-based transformation
Pattern Recognition Letters
A key binding system based on n-nearest minutiae structure of fingerprint
Pattern Recognition Letters
Enforcing physically restricted access control for remote data
Proceedings of the first ACM conference on Data and application security and privacy
Increasing error tolerance in biometric systems
Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia
A biometric-based authentication system for web services mobile user
Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia
Eigen-model projections for protected on-line signature recognition
BioID'11 Proceedings of the COST 2101 European conference on Biometrics and ID management
Pair-polar coordinate-based cancelable fingerprint templates
Pattern Recognition
A Proposal for a Privacy-preserving National Identity Card
Transactions on Data Privacy
Problems of Information Transmission
Multi-biometrics based crypto-biometric session key generation and sharing protocol
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
Enhancing the privacy of electronic passports
International Journal of Information Technology and Management
Identities, forgeries and disguises
International Journal of Information Technology and Management
An effective biometric cryptosystem combining fingerprints with error correction codes
Expert Systems with Applications: An International Journal
Computing the Principal Local Binary Patterns for face recognition using data mining tools
Expert Systems with Applications: An International Journal
Biometric-Based non-transferable anonymous credentials
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
Random number generation based on fingerprints
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
Privacy preserving key generation for iris biometrics
CMS'10 Proceedings of the 11th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security
SP'11 Proceedings of the 19th international conference on Security Protocols
The challenges raised by the privacy-preserving identity card
Cryptography and Security
Biometric Security from an Information-Theoretical Perspective
Foundations and Trends in Communications and Information Theory
Iris-Biometric fuzzy commitment schemes under signal degradation
ICISP'12 Proceedings of the 5th international conference on Image and Signal Processing
Security analysis of key binding biometric cryptosystems
ICISP'12 Proceedings of the 5th international conference on Image and Signal Processing
Security analysis of a multi-factor authenticated key exchange protocol
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
Protecting biometric templates with image watermarking techniques
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Hardening fingerprint Fuzzy vault using password
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Biometric cryptosystem based on discretized fingerprint texture descriptors
Expert Systems with Applications: An International Journal
A taxonomy of biometric system vulnerabilities and defences
International Journal of Biometrics
How confident are you to counter uncertainty?
Proceedings of the First International Conference on Security of Internet of Things
Hi-index | 14.99 |
We propose the first practical and secure way to integrate the iris biometric into cryptographic applications. A repeatable binary string, which we call a biometric key, is generated reliably from genuine iris codes. A well-known difficulty has been how to cope with the 10 to 20 percent of error bits within an iris code and derive an error-free key. To solve this problem, we carefully studied the error patterns within iris codes and devised a two-layer error correction technique that combines Hadamard and Reed-Solomon codes. The key is generated from a subject's iris image with the aid of auxiliary error-correction data, which do not reveal the key and can be saved in a tamper-resistant token, such as a smart card. The reproduction of the key depends on two factors: the iris biometric and the token. The attacker has to procure both of them to compromise the key. We evaluated our technique using iris samples from 70 different eyes, with 10 samples from each eye. We found that an error-free key can be reproduced reliably from genuine iris codes with a 99.5 percent success rate. We can generate up to 140 bits of biometric key, more than enough for 128-bit AES. The extraction of a repeatable binary string from biometrics opens new possible applications, where a strong binding is required between a person and cryptographic operations. For example, it is possible to identify individuals without maintaining a central database of biometric templates, to which privacy objections might be raised.