Robust Biometric Key Extraction Based on Iris Cryptosystem

  • Long Zhang
  • Zhenan Sun
  • Tieniu Tan
  • Shungeng Hu
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5558)


Biometric cryptosystem can not only provide an efficient mechanism for template protection, but also facilitate cryptographic key management, thus becomes a promising direction in information security field. In this paper, we propose a robust key extraction approach which consists of concatenated coding scheme and bit masking scheme based on iris database. The concatenated coding scheme that combines Reed-Solomon code and convolutional code is proposed so that much longer keys can be extracted from the iris data, while the bit masking scheme is proposed to minimize and randomize the errors occur in the iris codes, making the error pattern more suitable for the coding scheme. The experiment results show that the system can achieve a FRR of 0.52% with the key length of 938 bits.


Biometrics cryptography iris code key binding concatenated coding scheme Reed-Solomon code convolutional code bit masking scheme 


  1. 1.
    Jain, A.K., Nandakumar, K., Nagar, A.: Biometric Template Security. EURASIP Journal on Advances in Signal Processing 2008, Article ID 579416, 17 (2008), doi:10.1155/2008/579416 Google Scholar
  2. 2.
    Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.K.: Biometric cryptosystems: issues and challenges. Proceedings of the IEEE 92(6), 948–960 (2004) Google Scholar
  3. 3.
    Davida, G.I., Frankel, Y., Matt, B.J.: On enabling secure applications through off-line biometric identification. In: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, Calif, USA, pp. 148–157 (May 1998) Google Scholar
  4. 4.
    Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: Proceedings of 6th ACM Conference on Computer and Communications Security (ACM CCS 1999), Singapore, pp. 28–36 (November 1999) Google Scholar
  5. 5.
    Hao, F., Anderson, R., Daugman, J.: Combining crypto with biometrics effectively. IEEE Transactions on Computers 55(9), 1081–1088 (2006) Google Scholar
  6. 6.
    Tuyls, P., Akkermans, A.H.M., Kevenaar, T.A.M., Schrijen, G.-J., Bazen, A.M., Veldhuis, R.N.J.: Practical biometric authentication with template protection. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol. 3546, pp. 436–446. Springer, Heidelberg (2005) Google Scholar
  7. 7.
    Juels, A., Sudan, M.: A fuzzy vault scheme. In: Proceedings of the IEEE International Symposium on Information Theory, Piscataway, NJ, USA, p. 408 (June-July 2002) Google Scholar
  8. 8.
    Clancy, T., Lin, D., Kiyavash, N.: Secure smartcard-based fingerprint authentication. In: Proceedings of the ACMSIGMM Workshop on Biometric Methods and Applications, Berkley, Mich, USA, pp. 45–52 (November 2003) Google Scholar
  9. 9.
    Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.K.: Fuzzy vault for fingerprints. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol. 3546, pp. 310–319. Springer, Heidelberg (2005) Google Scholar
  10. 10.
    Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523–540. Springer, Heidelberg (2004) Google Scholar
  11. 11.
    Draper, S.C., Khisti, A., Martinian, E., Vetro, A., Yedidia, J.S.: Using distributed source coding to secure fingerprint biometrics. In: Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2007), Honolulu, Hawaii, USA, vol. 2, pp. 129–132 (April 2007) Google Scholar
  12. 12.
    Itakura, Y., Tsujii, S.: Proposal on a multifactor biometric authentication method based on cryptosystem keys containing biometric signatures. International Journal of Information Security, 288–296 (2005) Google Scholar
  13. 13.
    Soutar, C.: Security Considerations for the Implementation of Biometric Systems. In: Ratha, N., Bolle, R. (eds.) Automatic Fingerprint Recognition Systems, pp. 415–431. Springer, Heidelberg (2004) Google Scholar
  14. 14.
    Lin, S., Costello, D.J.: Error Control Coding Second Edition. China Machine Press, Beijing (2007)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Long Zhang
    • 1
  • Zhenan Sun
    • 2
  • Tieniu Tan
    • 2
  • Shungeng Hu
    • 1
    • 3
  1. 1.Center for Intelligence Science and Technology ResearchBeijing University of Posts and TelecommunicationsBeijingChina
  2. 2.Center for Biometrics and Security Research, National Laboratory of Patten Recognition, Institute of AutomationChinese Academy of SciencesBeijingChina
  3. 3.China Netcom Group LabsBeijingChina

Personalised recommendations