44
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Secured Cryptographic Key Generation From Multimodal Biometrics: Feature Level Fusion of Fingerprint and Iris

      Preprint
      ,

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Human users have a tough time remembering long cryptographic keys. Hence, researchers, for so long, have been examining ways to utilize biometric features of the user instead of a memorable password or passphrase, in an effort to generate strong and repeatable cryptographic keys. Our objective is to incorporate the volatility of the user's biometric features into the generated key, so as to make the key unguessable to an attacker lacking significant knowledge of the user's biometrics. We go one step further trying to incorporate multiple biometric modalities into cryptographic key generation so as to provide better security. In this article, we propose an efficient approach based on multimodal biometrics (Iris and fingerprint) for generation of secure cryptographic key. The proposed approach is composed of three modules namely, 1) Feature extraction, 2) Multimodal biometric template generation and 3) Cryptographic key generation. Initially, the features, minutiae points and texture properties are extracted from the fingerprint and iris images respectively. Subsequently, the extracted features are fused together at the feature level to construct the multi-biometric template. Finally, a 256-bit secure cryptographic key is generated from the multi-biometric template. For experimentation, we have employed the fingerprint images obtained from publicly available sources and the iris images from CASIA Iris Database. The experimental results demonstrate the effectiveness of the proposed approach.

          Related collections

          Most cited references11

          • Record: found
          • Abstract: not found
          • Article: not found

          Biometric cryptosystems: issues and challenges

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Systematic methods for the computation of the directional fields and singular points of fingerprints

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Fingerprint enhancement using STFT analysis

                Bookmark

                Author and article information

                Journal
                07 March 2010
                Article
                1003.1458
                db467eba-2cbe-4c4b-8bfa-fcf4ca8e4525

                http://creativecommons.org/licenses/by-nc-sa/3.0/

                History
                Custom metadata
                Computer Science ISSN 19475500
                International Journal of Computer Science and Information Security, IJCSIS, Vol. 7, No. 2, pp. 028-037, February 2010, USA
                Pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS February 2010, ISSN 1947 5500, http://sites.google.com/site/ijcsis/
                cs.CR cs.CV

                Comments

                Comment on this article