DocumentCode
3316558
Title
Towards generating irrevocable key for cryptography from cancelable fingerprints
Author
Lalithamani, N. ; Soman, K.P.
Author_Institution
Dept. of Comput. Sci. & Eng., AMRITA Vishwa Vidyapeetham, Coimbatore, India
fYear
2009
fDate
8-11 Aug. 2009
Firstpage
563
Lastpage
568
Abstract
The increasing immensity of identity theft in our society has resulted in the prioritization of dependable information security mechanisms. Despite the fact that it is possible to bring about information security with the aid of a prevailing such as like cryptography, protecting the confidentiality of the cryptographic keys is one of the major issues to be handled. It is possible to effectively solve the issue by combining biometrics and cryptography. Recently, the improved performance of cryptographic key produced from biometrics in terms of protection has acquired massive reputation amid the researchers and experimenters. Nevertheless, there is an enduring association amid the biometric and the user where in alteration is impracticable. Therefore, the biometric is vanished eternally and probably for all the applications that apply it, when a compromise of the biometric identifier is present. This might be resolved by building revocable biometric templates through cancelable biometrics. Here, we have projected an approach to produce irrevocable cryptographic key from cancelable fingerprint templates, a process which proposed algorithm carries out in an efficient manner. To begin with, the fingerprints are utilized to extract the minutiae points that are altered, in an efficient manner so as to acquire transformed points. Consequently, the transformed points are used to produce the cancelable templates which are in turn utilized for the extraction of irrevocable keys. It is extremely unfeasible to obtain cancelable fingerprint templates and original fingerprints from the generated key since the cryptographic key produced is irrevocable. The fingerprints accessible from open sources have been employed to assess the efficacy of our approach.
Keywords
cryptography; feature extraction; fingerprint identification; building revocable biometric identifier; cancelable fingerprint template; feature extraction; fingerprint image; information security mechanism; irrevocable cryptographic key; Authentication; Bioinformatics; Biometrics; Computer crime; Computer science; Cryptography; Data security; Fingerprint recognition; Information security; Protection; Biometric cryptosystems; Biometrics; Cancelable Biometrics; Cryptography; Fingerprint; Irrevocable Key; Key generation; Minutiae Points;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer Science and Information Technology, 2009. ICCSIT 2009. 2nd IEEE International Conference on
Conference_Location
Beijing
Print_ISBN
978-1-4244-4519-6
Electronic_ISBN
978-1-4244-4520-2
Type
conf
DOI
10.1109/ICCSIT.2009.5234801
Filename
5234801
Link To Document