Abstract
We outline cryptographic key-computation from biometric data based on error-tolerant transformation of continuous-valued face eigenprojections to zero-error bitstrings suitable for cryptographic applicability. Bio-hashing is based on iterated inner-products between pseudorandom and user-specific eigenprojections, each of which extracts a single-bit from the face data. This discretisation is highly tolerant of data capture offsets, with same-user face data resulting in highly correlated bitstrings. The resultant user identification in terms of a small bitstring-set is then securely reduced to a single cryptographic key via Shamir secret-sharing. Generation of the pseudorandom eigenprojection sequence can be securely parameterised via incorporation of physical tokens. Tokenised bio-hashing is rigorously protective of the face data, with security comparable to cryptographic hashing of token and knowledge key-factors. Our methodology has several major advantages over conventional biometric analysis ie elimination of false accepts (FA) without unacceptable compromise in terms of more probable false rejects (FR), straightforward key-management, and cryptographically rigorous commitment of biometric data in conjunction with verification thereof.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Bodo, A.: Method for Producing a Digital Signature with Aid of a Biometric Feature. German Patent DE 42–43–908–A1 (1994)
Soutar, C., Tomko, G.J.: Secure Private Key Generation Using a Fingerprint. In: Cardtech/Securetech Conf., vol. 1, pp. 245–252 (1996)
Soutar, C., Roberge, D., Stoianov, A., Gilroy, R., Vijaya Kumar, B.V.K.: Biometric Encryption Using Image Processing. In: SPIE, vol. 3314: pp. 178–188 (1998)
Davida, G.I., Frankel, Y., Matt, B.J.: On Enabling Secure Applications Through Off– Line Biometric Identification. In: IEEE Symp. on Security & Privacy, pp. 148–157 (1998)
Davida, G.I., Frankel, Y., Matt, B.J., Peralta, R.: On the Relation of Error Correction and Cryptography to an Off–Line Biometric–Based Identification Scheme. In: Wkshop Coding & Cryptography, Paris, France (1999)
Monrose, F., Reiter, M.K., Wetzel, S.: Password Hardening Based on Keystroke Dynamics. In: 6–th ACM Conf on Comp. & Comms Security, pp. 73–82 (1999)
Monrose, F., Reiter, M.K., Li, Q., Wetzel, S.: Cryptographic Key Generation from Voice. In: IEEE Symp. on Security & Privacy, pp. 202–213 (2001)
Shamir, A.: How to Share a Secret. ACM Comms. 22(11), 612–613 (1979)
Matsumoto, T., Matsumoto, H., Yamada, K., Hoshino, H.: Impact of Artificial “Gummy” Fingers on Fingerprint Systems. In: SPIE, vol. 4677, pp. 275–289 (2002)
Sirovich, L., Kirby, M.: A Low–Dimensional Procedure for Characterisation of Human Faces. J Optical Soc 4(3), 519–524 (1987)
Turk, M., Pentland, A.: Face Recognition Using Eigenfaces. In: IEEE Conf. Comp. Vision & Pattern Recognition, pp. 586–591 (1991)
Hambridge, J.: The Elements of Dynamic Symmetry. Yale Univ. Press, New Haven (1926)
Ngo, D.C.L., Goh, A.: Facial Feature Extraction via Dynamic Symmetry Modelling for User Identification. Pattern Recognition Letters (2003)
Menezes, A.J., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)
Spacek, L.: Face Recognition Data (2000), http://cswww.essex.ac.uk/allfaces/index.html
Menezes, A.J.: Elliptic–Curve Public–Key Cryptosystems. Kluwer Academic Press, Boston (1993)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 IFIP International Federation for Information Processing
About this paper
Cite this paper
Goh, A., Ngo, D.C.L. (2003). Computation of Cryptographic Keys from Face Biometrics. In: Lioy, A., Mazzocchi, D. (eds) Communications and Multimedia Security. Advanced Techniques for Network and Data Protection. CMS 2003. Lecture Notes in Computer Science, vol 2828. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-45184-6_1
Download citation
DOI: https://doi.org/10.1007/978-3-540-45184-6_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-20185-4
Online ISBN: 978-3-540-45184-6
eBook Packages: Springer Book Archive