• DocumentCode
    3316558
  • Title

    Towards generating irrevocable key for cryptography from cancelable fingerprints

  • Author

    Lalithamani, N. ; Soman, K.P.

  • Author_Institution
    Dept. of Comput. Sci. & Eng., AMRITA Vishwa Vidyapeetham, Coimbatore, India
  • fYear
    2009
  • fDate
    8-11 Aug. 2009
  • Firstpage
    563
  • Lastpage
    568
  • Abstract
    The increasing immensity of identity theft in our society has resulted in the prioritization of dependable information security mechanisms. Despite the fact that it is possible to bring about information security with the aid of a prevailing such as like cryptography, protecting the confidentiality of the cryptographic keys is one of the major issues to be handled. It is possible to effectively solve the issue by combining biometrics and cryptography. Recently, the improved performance of cryptographic key produced from biometrics in terms of protection has acquired massive reputation amid the researchers and experimenters. Nevertheless, there is an enduring association amid the biometric and the user where in alteration is impracticable. Therefore, the biometric is vanished eternally and probably for all the applications that apply it, when a compromise of the biometric identifier is present. This might be resolved by building revocable biometric templates through cancelable biometrics. Here, we have projected an approach to produce irrevocable cryptographic key from cancelable fingerprint templates, a process which proposed algorithm carries out in an efficient manner. To begin with, the fingerprints are utilized to extract the minutiae points that are altered, in an efficient manner so as to acquire transformed points. Consequently, the transformed points are used to produce the cancelable templates which are in turn utilized for the extraction of irrevocable keys. It is extremely unfeasible to obtain cancelable fingerprint templates and original fingerprints from the generated key since the cryptographic key produced is irrevocable. The fingerprints accessible from open sources have been employed to assess the efficacy of our approach.
  • Keywords
    cryptography; feature extraction; fingerprint identification; building revocable biometric identifier; cancelable fingerprint template; feature extraction; fingerprint image; information security mechanism; irrevocable cryptographic key; Authentication; Bioinformatics; Biometrics; Computer crime; Computer science; Cryptography; Data security; Fingerprint recognition; Information security; Protection; Biometric cryptosystems; Biometrics; Cancelable Biometrics; Cryptography; Fingerprint; Irrevocable Key; Key generation; Minutiae Points;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer Science and Information Technology, 2009. ICCSIT 2009. 2nd IEEE International Conference on
  • Conference_Location
    Beijing
  • Print_ISBN
    978-1-4244-4519-6
  • Electronic_ISBN
    978-1-4244-4520-2
  • Type

    conf

  • DOI
    10.1109/ICCSIT.2009.5234801
  • Filename
    5234801