Abstract
Cryptography is the backbone upon which modern security has been established. For authentication, conventional cryptography depends on either secret knowledge such as passwords or possession of tokens. The fundamental problem of such mechanisms is that they cannot authenticate genuine users. Biometrics such as fingerprints, faces, irises, etc., are considered as uniquely linked to individuals and hence are powerful in authenticating people. However, biometric systems themselves are not attackproof and are vulnerable against several types of attacks. An emerging solution is to integrate the authentication feature of biometrics and the core function of conventional cryptography, called biocryptography. This chapter is designed to provide a comprehensive reference for this topic. The work is based on many publications which includes our own work in this field. This chapter also provides suitable background knowledge so that it is not only suitable for a research reference but also for a textbook targeting senior undergraduates and postgraduates with a major in security.
The organization of this chapter is as follows. Section 7.1 provides background materials on cryptography. Section 7.2 introduces the concept of biometrics technology and its applications. Section 7.3 discusses the issue of protecting biometric systems using bio-cryptography techniques. Section 7.4 is dedicated to conclusions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
M. McLoone, J.V. McCanny: System-on-Chip Architectures and Implementations for Private-Key Data Encryption (Plenum Publishing, USA 2003)
W. Stallings: Cryptography and Network Security Principles and Practice, 3rd edn. (Prentice Hall, Upper Saddle River, NJ 2003)
D. Luciano, G. Prichett: Cryptology: From Caesar Ciphers to Public-Key Cryptosystems, Coll. Math. J. 18(1), 2–17 (1987)
Substitution cipher: http://en.wikipedia.org/wiki/Substitution_cipher
Transposition cipher: http://everything2.com/e2node/transposition
Details of the Data Encryption Standard: http://www.quadibloc.com/crypto/co040201.htm
J. Daemen, V. Rijmen: Rijndael: The Advanced Encryption Standard, Dr. Dobb’s J. 26(3), 137–139 (2001)
J. Weise: Public Key Infrastructure Overview, Sun BluePrintsâ„¢ OnLine (August 2001), http://www.sun.com/blueprints/0801/publickey.pdf
Encryption with RSA, http://en.kioskea.net/contents/crypto/rsa.php3
P. Montgomery: Preliminary Design of Post-Sieving Processing for RSA-768, CADO workshop on integer factorization (October 2008)
A.K. Jain, S. Pankanti: A touch of money, IEEE Spectr. 43(7), 14–19 (2006)
K.D. Mitnick, W.L. Simon, S. Wozniak: The Art of Deception: Controlling the Human Element of Security (Wiley, Canada 2002)
D.V. Klien: Foiling the Cracker: A Survey of, and Improvements to Unix Password Security, Proc. 2nd USENIX Workshop on Security (1990) pp. 5–14
D. Maltoni, D. Maio, A.K. Jain, S. Prabhakar: Handbook of Fingerprint Recognition (Springer, New York 2003)
C.P.F. Bergadano, D. Gunetti: User authentication through keystroke dynamics, ACM transactions on information and system security (2002)
J.L. Wayman: Fundamentals of biometric authentication technologies, Int. J. Image Graph. 1(1), 93–113 (2001)
S.H. Bazen, G. Verwaaijen: A correlation-based fingerprint verification system, ProRISC 2000 Workshop on Circuits, Systems and Signal Processing (2000)
K.A. Toh, J. Kim, S. Lee: Maximizing area under ROC curve for biometric scores fusion, Pattern Recognit. 41(11), 3373–3392 (2008)
S. Chikkerur: Online fingerprint verification, http://www.cubs.buffalo.edu
Y.W. Sen Wang: Fingerprint enhancement in the singular point area, IEEE Signal Process. Lett. 11(1), 16–19 (2004)
K.A. Toh: Training a reciprocal-sigmoid classifier by feature scaling-space, Mach. Learn. 65(1), 273–308 (2006)
K.A. Toh, H.L. Eng: Between classification-error approximation and weighted least-squares learning, IEEE Trans. Pattern Anal. Mach. Intell. 30(4), 658–669 (2008)
A. Jain, H. Lin, R. Bolle: On-line fingerprint verification, IEEE Trans. Pattern Anal. Mach. Intell. 19(4), 302–314 (1997)
A.M. Bazen, S.H. Gerez: Thin-plate spline modelling of elastic deformations in fingerprints, Proc. 3rd IEEE Benelux Signal Processing Symposium, Leuven (2002)
X. Jiang, W. Yau: Fingerprint minutiae matching based on the local and global structures, Proc. 15th Int. Conf. on Pattern Recognition, Washington: IEEE Computer Society (2000)
W.Y. Zhang Wang: Core-based structure matching algorithm of fingerprint verification, Proc. ICPR 2002, IEEE, Vol. 1 (2002) pp. 70–74
A.M. Bazen, G.T.B. Verwaaijen, S.H. Gerez, L.P.J. Veelenturf, B.J. van der Zwaag: A correlation-based fingerprint verification system, 11th Annual Workshop on Circuits Systems and Signal Processing (2000)
K. Venkataramani, B.K.V. Kumar: Fingerprint Verification Using Correlation Filters. In: AVBPA, LNCS, Vol. 2688, ed. by J. Kittler, M.S. Nixon (Springer, Berlin 2003) pp. 886–894
Y. Wang, J. Hu, D. Philip: A fingerprint orientation model based on 2D Fourier expansion (FOMFE) and its application to singular-point detection and fingerprint indexing, IEEE Trans. Pattern Anal. Mach. Intell. 29(4), 573–585 (2007)
N.K. Ratha, S. Chikkerur, J.H. Connell, R.M. Bolle: Generating cancelable fingerprint templates, IEEE Trans. Pattern Anal. Mach. Intell. 29(4), 561–572 (2007)
Z.J. Hou, J.Li, H.K. Lam, T.P. Chen, H.L. Wang, W.Y. Yau: Fingerprint orientation analysis with topological modeling, ICPR (2008)
H.K. Lam, Z.J. Hou, W.Y. Yau, T.P. Chen, J.Li, K.Y. Sim: Reference point detection for arch type fingerprints, Int. Conference on Biometrics (ICB) (2009)
H. K. Lam, Z. J. Hou, W. Y. Yau, T. P. Chen, J. Li: A systematic topological method for fingerprint singular point detection, 10th International Conf. on Control, Automation, Robotics and Vision, IEEE ICARCV (2008)
S. Yang, I. Verbauwhede: Automatic Secure Fingerprint Verification System Based on Fuzzy Vault Scheme, Proc. IEEE ICASSP, Philadelphia, Vol. 5 (2005) pp. 609–612
U. Uludag, A.K. Jain: Securing Fingerprint Template: Fuzzy Vault With Helper Data, Proceedings of CVPR Workshop on Privacy Research In Vision, New York (2006) p. 163
K. Nandakumar, A.K. Jain, S. Pankanti: Fingerprint-based fuzzy vault: implementation and performance, IEEE Trans. Inf. Forensics Secur. 2(4), 744–757 (2007)
A. Ross, A. Jain, J. Reisman: A Hybrid Fingerprint Matcher, 16th Int. Conference on Pattern Recognition (2002)
K. Nandakumar: Multibiometric Systems: Fusion Strategies and Template Security. Ph.D. Thesis (Michigan State University, East Lansing, MI, USA 2008)
A.K. Jain, S. Pankanti, S. Prabhakar, L. Hong, A. Ross: Biometrics: A Grand Challenge, Proc. Int. Conference on Pattern Recognition (ICPR), Cambridge, UK, Vol. 2 (2004) pp. 935–942
N.K. Ratha, J.H. Connell, R.M. Bolle: An analysis of minutiae matching strength, Proc. AVBPA 2001, 3rd Int. Conference on Audio- and Video-Based Biometric Person Authentication (2001) pp. 223–228
U. Uludag, S. Pankanti, S. Prabhakar, A.K. Jain: Biometric Cryptosystems: Issues and Challenges, Proceedings of the IEEE, Special Issue on Enabling Security Technologies for Digital Rights Management, Vol. 92, No. 6 (2004)
D. Brin: Transparent Society: Will Technology Force Us to Choose Between Privacy and Freedom (Perseus Books, New York 1998)
R. Cappelli, A. Lumini, D. Maio, D. Maltoni: Fingerprint image reconstruction from standard templates, IEEE Trans. Pattern Anal. Mach. Intell. 29(9), 1489–1503 (2007)
A.K. Ross, J. Shah, A.K. Jain: From templates to images: reconstructing fingerprints from minutiae points, IEEE Trans. Pattern Anal. Mach. Intell. 29(4), 544–560 (2007)
A. Adler: Images can be Regenerated from Quantized Biometric Match Score Data, Proc. Canadian Conference on Electrical and Computer Engineering, Niagara Falls (2004) pp. 469–472
A.B.J. Teoh, K.-A. Toh, W.K. Yip: 2N Discretisation of BioPhasor in Cancellable Biometrics, Proc. 2nd Int. Conference on Biometrics, Seoul (2007) pp. 435–444
A.B.J. Teoh, A. Goh, D.C.L. Ngo: Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs, IEEE Trans. Pattern Anal. Mach. Intell. 28(12), 1892–1901 (2006)
C.S. Chin, A.B. J Teoh, D.C.L. Ngo: High security iris verification system based on random secret integration, Comput. Vis. Image Underst. 102(2), 169–177 (2006)
T. Connie, A.B. J Teoh, M. Goh, D.C.L. Ngo: PalmHashing: A novel approach for cancelable biometrics, Inf Process. Lett. 93(1), 1–5 (2005)
A. Juels, M. Wattenberg: A Fuzzy Commitment Scheme, Proc. 6th ACM Conference on Computer and Communications Security, Singapore (1999) pp. 28–36
A. Juels, M. Sudan: A Fuzzy Vault Scheme, Proc. IEEE Int. Symposium on Information Theory, Lausanne (2002) p. 408
Y.-J. Chang, W. Zhang, T. Chen: Biometrics Based Cryptographic Key Generation, Proc. IEEE Conference on Multimedia and Expo, Taipei, Vol. 3 (2004) pp. 2203–2206
C. Vielhauer, R. Steinmetz, A. Mayerhofer: Biometric Hash Based on Statistical Features of Online Signatures, Proc. 16th Int. Conference on Pattern Recognition, Quebec, Vol. 1 (2002) pp. 123–126
Y. Dodis, R. Ostrovsky, L. Reyzin, A. Smith: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data, Technical Report 235, Cryptology ePrint Archive (February 2006)
U. Uludag, S. Pankanti, A.K. Jain: Fuzzy Vault for Fingerprints, Proc. Audio- and Video-based Biometric Person Authentication, Rye Town (2005) pp. 310–319
T. Clancy, D. Lin, N. Kiyavash: Secure Smartcard-Based Fingerprint Authentication, Proc. ACM SIGMM Workshop on Biometric Methods and Applications, Berkley (2003) pp. 45–52
Y. Chung, D. Moon, S. Lee, S. Jung, T. Kim, D. Ahn: Automatic alignment of fingerprint features for fuzzy fingerprint vault. In: CISC 2005, Beijing, LNCS, Vol. 3822 (Springer, Berlin 2005) pp. 358–369
D. Ahn, et al.: Specification of ETRI Fingerprint Database(in Korean), Technical Report – ETRI (2002)
H. Wolfson, I. Rigoutsos: Geometric hashing: an overview, IEEE Comput. Sci. Eng. 4(4), 10–21 (1997)
A. Malickas, R. Vitkus: Fingerprint registration using composite features consensus, Informatica 10(4), 389–402 (1999)
K. Xi, J. Hu: Biometric Mobile Template Protection: A Composite Feature based Fingerprint Fuzzy Vault, IEEE Int. Conference on Communication (ICC), Germany (2009)
K. Xi, J. Hu: A Dual Layer Structure Check (DLSC) Fingerprint Verification Scheme Designed for Biometric Mobile Template Protection, 4th IEEE Conference on Industrial Electronics and Applications (ICIEA), China (2009)
D.P.E.K. Mital Teoh: An automated matching technique for fingerprint identification, Proc. KES, Vol. 1 (1997) pp. 142–147
A. Kisel, A. Kochetkov, J. Kranauskas: Fingerprint minutiae matching without global alignment using local structures, Informatica 19(1), 31–44 (2008)
J. Jeffers, A. Arakala: Minutiae-Based Structures for A Fuzzy Vault, Biometric Consortium Conference, 2006 Biometrics Symposium (2006) pp. 1–6
J. Hu: Mobile Fingerprint Template Protection: Progress and Open issues, invited session on pattern analysis and biometrics, 3rd IEEE Conference on Industrial Electronics and Applications, Singapore (June 2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Xi, K., Hu, J. (2010). Bio-Cryptography. In: Stavroulakis, P., Stamp, M. (eds) Handbook of Information and Communication Security. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04117-4_7
Download citation
DOI: https://doi.org/10.1007/978-3-642-04117-4_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-04116-7
Online ISBN: 978-3-642-04117-4
eBook Packages: EngineeringEngineering (R0)