Skip to main content

Cryptographic Keys Generation Using FingerCodes

  • Conference paper
Advances in Artificial Intelligence - IBERAMIA-SBIA 2006 (IBERAMIA 2006, SBIA 2006)

Abstract

We show an architecture to automatically generate cryptographic keys using the FingerCode as defined by Jain et al. [4]. The FingerCode is obtained from gray scale fingerprint images. The architecture uses a classifier to compensate for the natural variability on the FingerCodes. In a training step the FingerCodes of the fingerprint samples for registered users are obtained; then random binary codes are assigned to each set of FingerCodes from the same finger, and finally an array of Support Vector Machines (SVM) is trained to associate the FingerCodes to their assigned random binary key. Each SVM is independent and assigns one bit, allowing the construction of binary keys of arbitrary length by adding and training more SVMs. To test the system, different set of fingerprint images from the same fingers used on the training step were used. The FingerCodes were calculated used as input to the SVM array to generate the assigned keys. Experimental results obtained using fingerprints selected from the FVC2000 and FVC2002 databases show results up to 90% performance on generating valid keys.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Jain, A.K., Bolle, R., Pankanti, S.: Biometric Personal Identification in Networked Society. Kluwer Academic Publishers, Boston (1999)

    Google Scholar 

  2. Jain, A.K., Hong, L., Bolle, R.: On-line Fingerprint Verification. IEEE Transactions on Pattern Analysis and Machine Intelligence 19(4), 302–314 (1997)

    Article  Google Scholar 

  3. Jain, A.K., Ross, A., Prabhakar, S.: Fingerprint matching using minutiae and texture features. In: Proc. Int. Conference on Image Processing, vol. 3, pp. 282–285 (2001)

    Google Scholar 

  4. Jain, A.K., Prabhakar, S., Hong, L., Pankanti, S.: FingerCode: Filterbank-Based Fingerprint Matching. IEEE Trans. on Image Processing 9(5), 846–859 (2000)

    Article  Google Scholar 

  5. Boser, B., Guyon, I., Vapnik, V.: A training algorithm for optimal margin classifiers. In: Proceedings of the Fifth Annual Workshop on Computational Learning Theory (1992)

    Google Scholar 

  6. Stojanov, R., Gilroy Soutar, G., Roberge, D., Kumar, V.: Biometric encryption using image processing, SPIE. Optical Security and Counterfeit Deterrence Techniques H. 3314, 178–188 (1998)

    Google Scholar 

  7. Cortes, C., Vapnik, V.: Support-vector network. Machine Learning 20, 273–297 (1995)

    MATH  Google Scholar 

  8. Furui, S.: Digital Speech Processing, Synthesis, and Recognition. Mercel Dekker, inc, New York (2001)

    Google Scholar 

  9. Garcia-Perera, L.P., Nolazco-Flores, J.A., Mex-Perera, C.: Phoneme Spotting for Speech-Based Cryto-key Generation. In: Sanfeliu, A., Cortés, M.L. (eds.) CIARP 2005. LNCS, vol. 3773, pp. 770–777. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  10. Monrose, F., Reiter, M.K., Li, Q., Wetzel, S.: Cryptographic Key Generation From Voice. In: Proceedings of the IEEE Conference on Security and Privacy, Oakland, CA (2001)

    Google Scholar 

  11. Osuna, E., Freund, R., Girosi, F.: Support vector machines: Training and applications. Technical Report AIM-1602, MIT A.I. Lab. (1996)

    Google Scholar 

  12. Osuna, E., Freund, R., Girosi, F.: Training Support Vector Machines: An Application to Face Recognition. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 130–136 (1997)

    Google Scholar 

  13. Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.K.: Biometric cryptosystems: issues and challenges. Proceedings of the IEEE 92(6) (2004)

    Google Scholar 

  14. Joachims, T.: SVMLight: Support Vector Machine, SVM-Light Support Vector Machine, University of Dortmund (1999), http://svmlight.joachims.org/

  15. Maltoni, D., Maio, D., Jain, A.K., Prabhakar, S.: Handbook of Fingerprint Recognition. Springer, New York (2003)

    MATH  Google Scholar 

  16. Soutar, C., Roberge, D., Stojanov, S.A., Gilroy, R., Vijaya Kumar, B.V.K.: Biometric Cryptosystem: Biometric encryption using image processing. In: Proc. SPIE, Optical Security and Counterfeit Deterrence Techniques II, vol. 3314, pp. 178–188 (1998)

    Google Scholar 

  17. Clancy, T.C., Kiyavash, N., Lin, D.J.: Biometric Cryptosystem: Secure smartcard-based fingerprint authentication. In: Proc. ACM SIGMM 2003 Multimedia, Biometrics Methods and Aplications Workshop, pp. 45–52 (2003)

    Google Scholar 

  18. Wan, V., Renals, S.: Speaker Verification Using Sequence Discriminant Support Vector Machines. IEEE Transactions on speech and audio processing 13(2) (March 2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ramírez-Ruiz, J.A., Pfeiffer, C.F., Nolazco-Flores, J.A. (2006). Cryptographic Keys Generation Using FingerCodes. In: Sichman, J.S., Coelho, H., Rezende, S.O. (eds) Advances in Artificial Intelligence - IBERAMIA-SBIA 2006. IBERAMIA SBIA 2006 2006. Lecture Notes in Computer Science(), vol 4140. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11874850_22

Download citation

  • DOI: https://doi.org/10.1007/11874850_22

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-45462-5

  • Online ISBN: 978-3-540-45464-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics