Biometric cryptosystems: issues and challenges
Top Cited Papers
- 18 May 2004
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in Proceedings of the IEEE
- Vol. 92 (6), 948-960
- https://doi.org/10.1109/jproc.2004.827372
Abstract
In traditional cryptosystems, user authentication is based on possession of secret keys; the method falls apart if the keys are not kept secret (i.e., shared with non-legitimate users). Further, keys can be forgotten, lost, or stolen and, thus, cannot provide non-repudiation. Current authentication systems based on physiological and behavioral characteristics of persons (known as biometrics), such as fingerprints, inherently provide solutions to many of these problems and may replace the authentication component of traditional cryptosystems. We present various methods that monolithically bind a cryptographic key with the biometric template of a user stored in the database in such a way that the key cannot be revealed without a successful biometric authentication. We assess the performance of one of these biometric key binding/generation algorithms using the fingerprint biometric. We illustrate the challenges involved in biometric key generation primarily due to drastic acquisition variations in the representation of a biometric identifier and the imperfect nature of biometric feature extraction and matching algorithms. We elaborate on the suitability of these algorithms for digital rights management systems.Keywords
This publication has 14 references indexed in Scilit:
- FVC2002: Second Fingerprint Verification CompetitionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- A fuzzy vault schemePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- On enabling secure applications through off-line biometric identificationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- On the individuality of fingerprintsIeee Transactions On Pattern Analysis and Machine Intelligence, 2002
- FUNDAMENTALS OF BIOMETRIC AUTHENTICATION TECHNOLOGIESInternational Journal of Image and Graphics, 2001
- Enhancing security and privacy in biometrics-based authentication systemsIBM Systems Journal, 2001
- Inside risks: the uses and abuses of biometricsCommunications of the ACM, 1999
- Biometric Encryption: enrollment and verification proceduresPublished by SPIE-Intl Soc Optical Eng ,1998
- An identity-authentication system using fingerprintsProceedings of the IEEE, 1997
- High confidence visual recognition of persons by a test of statistical independenceIeee Transactions On Pattern Analysis and Machine Intelligence, 1993