Title :
Biometric cryptosystems: issues and challenges
Author :
Uludag, Umut ; Pankanti, Sharath ; Prabhakar, Salil ; Jain, Anil K.
Author_Institution :
Dept. of Comput. Sci. & Eng., Michigan State Univ., USA
fDate :
6/1/2004 12:00:00 AM
Abstract :
In traditional cryptosystems, user authentication is based on possession of secret keys; the method falls apart if the keys are not kept secret (i.e., shared with non-legitimate users). Further, keys can be forgotten, lost, or stolen and, thus, cannot provide non-repudiation. Current authentication systems based on physiological and behavioral characteristics of persons (known as biometrics), such as fingerprints, inherently provide solutions to many of these problems and may replace the authentication component of traditional cryptosystems. We present various methods that monolithically bind a cryptographic key with the biometric template of a user stored in the database in such a way that the key cannot be revealed without a successful biometric authentication. We assess the performance of one of these biometric key binding/generation algorithms using the fingerprint biometric. We illustrate the challenges involved in biometric key generation primarily due to drastic acquisition variations in the representation of a biometric identifier and the imperfect nature of biometric feature extraction and matching algorithms. We elaborate on the suitability of these algorithms for digital rights management systems.
Keywords :
authorisation; biometrics (access control); cryptography; feature extraction; fingerprint identification; pattern matching; biometric authentication; biometric cryptosystems; biometric key binding algorithm; biometric key generation algorithm; biometric template; cryptographic key; digital rights management systems; feature extraction; feature matching; fingerprint biometric; nonrepudiation; secret keys; user authentication; Authentication; Biometrics; Computer science; Cryptography; Databases; Entropy; Feature extraction; Fingerprint recognition; Privacy; Security; Authentication; biometrics; confidentiality; cryptography; entropy; fingerprints; invariance; key binding; key generation; key release; multibiometrics; privacy; secrecy; security;
Journal_Title :
Proceedings of the IEEE
DOI :
10.1109/JPROC.2004.827372