A Palmprint Cryptosystem

  • Xiangqian Wu
  • David Zhang
  • Kuanquan Wang
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4642)


Traditional cryptosystems are based on passwords, which can be cracked (simple ones) or forgotten (complex ones). This paper proposes a novel cryptosystem based on palmprints. This system directly uses the palmprint as a key to encrypt/decrypt information. The information of a palmprint is so complex that it is very difficult, if not impossible, to crack the system while it need not remember anything to use the system. In the encrypting phase, a 1024 bits binary string is extracted from the palmprints using differential operations. Then the string is translated to a 128 bits encrypting key using a Hash function, and at the same time, an error-correct-code (ECC) is generated. Some general encryption algorithms use the 128 bits encrypting key to encrypt the secret information. In decrypting phase, the 1024 bits binary string extracted from the input palmprint is first corrected using the ECC. Then the corrected string is translated to a decrypting key using the same Hash function. Finally, the corresponding general decryption algorithms use decrypting key to decrypt the information. The experimental results show that the accuracy and security of this system can meet the requirement of most applications.


Hash Function Binary String Palmprint Image Corrected String Palmprint Recognition 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Uludag, U., Pankant, S., Prabhakar, S., Jain, A.K.: Biometric cryptosystems: issues and challenges. Proceedings of the IEEE 92, 948–960 (2004)CrossRefGoogle Scholar
  2. 2.
    Freire-Santos, M., Fierrez-Aguilar, J., Ortega-Garcia, J.: Cryptographic key generation using handwritten signature. In: Proc. of SPIE, Biometric Technologies for Human Identificatin III (2006)Google Scholar
  3. 3.
    Uludag, U., Pankant, S., Jain, A.K.: Fuzzy vault for fingerprints. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol. 3546, pp. 310–319. Springer, Heidelberg (2005)Google Scholar
  4. 4.
    Monrose, F., Reiter, M.K., Li, Q., Wetzel, S.: Using voice to generate cryptographic keys. In: A Speaker Odyssey, The Speaker Recognition Workshop, pp. 202–213 (2001)Google Scholar
  5. 5.
    Juels, A., Sudan, M.: A fuzzy vault scheme. In: Proc. IEEE International Symposium on Information Theory, IEEE Computer Society Press, Los Alamitos (2002)Google Scholar
  6. 6.
    Soutar, C., Roberge, D., Stojanov, S.A., Gilroy, R., Kumar, B.V.K.V.: Biometric encryption. ICSA Guide to Cryptography (1999)Google Scholar
  7. 7.
    Monrose, F., Reiter, M.K., Li, Q., Lopresti, D.P., Shih, C.: Towards speech-generated cryptographic keys on resource constrained devices. In: Proc. 11th USENIX Security Symposium, pp. 283–296 (2002)Google Scholar
  8. 8.
    Zhang, D.: Palmprint Authentication. Kluwer Academic Publishers, Dordrecht (2004)Google Scholar
  9. 9.
    Wu, X., Zhang, D., Wang, K.: Palmprint Recognition. Scientific Publishers, China (2006)Google Scholar
  10. 10.
    Wu, X., Wang, K., Zhang, D.: Fisherpalms based palmprint recognition. Pattern Recognition Letters 24, 2829–2838 (2003)CrossRefGoogle Scholar
  11. 11.
    Duta, N., Jain, A., Mardia, K.: Matching of palmprint. Pattern Recognition Letters 23, 477–485 (2001)CrossRefGoogle Scholar
  12. 12.
    Han, C., Chen, H., Lin, C., Fan, K.: Personal authentication using palm-print features. Pattern Recognition 36, 371–381 (2003)CrossRefGoogle Scholar
  13. 13.
    Zhang, D., Kong, W., You, J., Wong, M.: Online palmprint identification. IEEE Transactions on Pattern Analysis and Machine Intelligence 25, 1041–1050 (2003)CrossRefGoogle Scholar
  14. 14.
    Jain, A., Ross, A., Prabhakar, S.: An introduction to biometric recognition. IEEE Transactions on Circuits and Systems for Video Technology 14, 4–20 (2004)CrossRefGoogle Scholar
  15. 15.
    PolyU Palmprint Palmprint Database:

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Xiangqian Wu
    • 1
  • David Zhang
    • 2
  • Kuanquan Wang
    • 1
  1. 1.School of Computer Science and Technology, Harbin Institute of Technology (HIT), Harbin 150001China
  2. 2.Biometric Research Centre, Department of Computing, Hong Kong Polytechnic University, KowloonHong Kong

Personalised recommendations