Systematic Construction of Iris-Based Fuzzy Commitment Schemes

  • Christian Rathgeb
  • Andreas Uhl
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5558)


As a result of the growing interest in biometrics a new field of research has emerged entitled Biometric Cryptosystems. Only a small amount of work, which additionally tends to be custom-built according to the specific application context, has been published in this area. This work provides a systematic treatment of how to construct biometric cryptosystems based on iris biometrics. A cryptographic primitive called Fuzzy Commitment Scheme is adopted to different types of iris recognition algorithms to hide and retrieve a cryptographic key in and out of a biometric template. Experimental results confirm the soundness of the approach.


Error Correction Hadamard Matrice Iris Recognition Biometric Template Iris Code 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.K.: Biometric cryptosystems: issues and challenges. Proceedings of the IEEE 92(6), 948–960 (2004)Google Scholar
  2. 2.
    Juels, A., Wattenberg, M.: A FCS. In: Sixth ACM Conference on Computer and Communications Security, pp. 28–36 (1999)Google Scholar
  3. 3.
    Bowyer, K., Hollingsworth, K., Flynn, P.: Image understanding for iris biometrics: a survey. Computer Vision and Image Understanding 110, 281–307 (2008)Google Scholar
  4. 4.
    Daugman, J.: How Iris Recognition Works. IEEE Trans. CSVT 14(1), 21–30 (2004)Google Scholar
  5. 5.
    Ma, L., Tan, T., Wang, Y., Zhang, D.: Efficient Iris Recogntion by Characterizing Key Local Variations. IEEE Transactions on Image Processing 13(6), 739–750 (2004)Google Scholar
  6. 6.
    Ko, J.-G., Gil, Y.-H., Yoo, J.-H., Chung, K.-I.: A Novel and Efficient Feature Extraction Method for Iris Recognition. ETRI Journal 29(3), 399–401 (2007)Google Scholar
  7. 7.
    Soutar, C., Roberge, D., Stoianov, A., Gilroy, R., Kumar, B.V.: Biometric Encryption - Enrollment and Verification Procedures. In: Proc. SPIE, Optical Pattern Recognition IX, vol. 3386, pp. 24–35 (1998)Google Scholar
  8. 8.
    Davida, G., Frankel, Y., Matt, B.: On enabling secure applications through off-line biometric identification. In: Proc. of IEEE Symp. on Security and Privacy, pp. 148–157 (1998)Google Scholar
  9. 9.
    Davida, G., Frankel, Y., Matt, B.: On the relation of error correction and cryptography to an off line biometric based identication scheme. In: Proc. of WCC 1999, Workshop on Coding and Cryptography, pp. 129–138 (1999)Google Scholar
  10. 10.
    Hao, F., Anderson, R., Daugman, J.: Combining Cryptography with Biometrics Effectively. IEEE Transactions on Computers 55(9), 1081–1088 (2006)Google Scholar
  11. 11.
    Monrose, F., Reiter, M.K., Wetzel, S.: Password hardening based on keystroke dynamics. In: Proceedings of sixth ACM Conference on Computer and Communications Security, CCCS, pp. 73–82 (1999)Google Scholar
  12. 12.
    Monrose, F., Li, Q., Reiter, M.K., Wetzel, S.: Cryptographic Key Generation from Voice. In: SP 2001: Proceedings of the 2001 IEEE Symposium on Security and Privacy, 12 pages (2001)Google Scholar
  13. 13.
    Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523–540. Springer, Heidelberg (2004)Google Scholar
  14. 14.
    Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal 40, 614–634 (2001)Google Scholar
  15. 15.
    Vielhauer, C., Steinmetz, R., Mayerhöfer, A.: Biometric hash based on statistical features of online signatures. In: ICPR 2002: Proceedings of the 16th International Conference on Pattern Recognition (ICPR 2002), vol. 1, p. 10123 (2002)Google Scholar
  16. 16.
    Wu, X., Qi, N., Wang, K., Zhang, D.: A Novel Cryptosystem based on Iris Key Generation. In: Fourth International Conference on Natural Computation (ICNC 2008), pp. 53–56 (2008)Google Scholar
  17. 17.
    Agaian, S.S.: Hadamard Matrix and Their Applications. Lect. notes in math., vol. 1168. Springer, Heidelberg (1985)Google Scholar
  18. 18.
    Reed, I., Solomon, G.: Polynomial codes over certain finite fields. Journal of the Society for Industrial and Applied Mathematics 8, 300–304 (1960)Google Scholar
  19. 19.
    Berlekamp, E.: Factoring Polynomials Over Finite Fields. Bell Systems Technical Journal 46, 1853–1859 (1967)Google Scholar
  20. 20.
    The Center of Biometrics and Security Research, CASIA Iris Image Database,

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Christian Rathgeb
    • 1
  • Andreas Uhl
    • 1
  1. 1.Department of Computer SciencesUniversity of SalzburgSalzburgAustria

Personalised recommendations