Constructing Passwords from Biometrical Data

  • Vladimir B. Balakirsky
  • Anahit R. Ghazaryan
  • A. J. Han Vinck
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5558)

Abstract

We propose a probabilistic model for constructing passwords on the basis of outcomes of biometrical measurements. An algorithm for the transformation of biometrical data to passwords is given. The performance of the authentication scheme is evaluated by the compression factor, the false acceptance/rejection rates, the probability distribution over the set of passwords, and the probability of a correct guess of the input biometrical data mapped to the known password. An application of the results to DNA measurements is presented.

Keywords

Authentication Scheme Maximum Probability Biometrical Data False Acceptance Rate False Rejection Rate 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Korte, U., Krawczak, M., Merkle, J., Plaga, R., Niesing, M., Tiemann, C., Han Vinck, A.J., Martini, U.: A cryptographic biometric authentication system based on genetic fingerprints. Sicherheit, 263–276 (2008)Google Scholar
  2. 2.
    Balakirsky, V.B., Ghazaryan, A.R., Han Vinck, A.J.: Additive block coding schemes for biometric authentication with the DNA data. In: Schouten, B., Jul, N.C., Drygajlo, A., Tistarelli, M. (eds.) BIOID 2008. LNCS, vol. 5372, pp. 160–169. Springer, Heidelberg (2008)Google Scholar
  3. 3.
    Bolle, R.M., Connell, J.H., Pankanti, S., Ratha, N.K., Senior, A.W.: Guide to Biometrics. Springer, NY (2004)Google Scholar
  4. 4.
    Balakirsky, V.B., Ghazaryan, A.R., Han Vinck, A.J.: An Algorithm for Biometric Authentication Based on the Model of Non-Stationary Random Processes. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol. 4642, pp. 319–327. Springer, Heidelberg (2007)Google Scholar
  5. 5.
    Balakirsky, V.B., Ghazaryan, A.R., Han Vinck, A.J.: Mathematical model for constructing passwords from biometrical data. In: Security and Communication Networks, vol. 2(1), pp. 1–9. Wiley, Chichester (2009)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Vladimir B. Balakirsky
    • 1
  • Anahit R. Ghazaryan
    • 1
  • A. J. Han Vinck
    • 1
  1. 1.Institute for Experimental MathematicsEssenGermany

Personalised recommendations