2018
DOI: 10.1155/2018/6107912
|View full text |Cite
|
Sign up to set email alerts
|

Construction of a New Biometric-Based Key Derivation Function and Its Application

Abstract: Biometric data is user-identifiable and therefore methods to use biometrics for authentication have been widely researched. Biometric cryptosystems allow for a user to derive a cryptographic key from noisy biometric data and perform a cryptographic task for authentication or encryption. The fuzzy extractor is known as a prominent biometric cryptosystem. However, the fuzzy extractor has a drawback in that a user is required to store user-specific helper data or receive it online from the server with additional … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 54 publications
0
3
0
Order By: Relevance
“…As shown in Figure 6(a), our solution can achieve an accuracy of 92.3%. Other schemes [18][19][20] calculate the templates in unencrypted form, indicating that the accuracy of template recognition does not significantly decrease after encryption in our scheme. Additionally, we have implemented our FBKDF on encrypted biometric templates and have presented the results in Figure 6(b).…”
Section: Accuracy Of Facial Biometric Recognitionmentioning
confidence: 77%
See 1 more Smart Citation
“…As shown in Figure 6(a), our solution can achieve an accuracy of 92.3%. Other schemes [18][19][20] calculate the templates in unencrypted form, indicating that the accuracy of template recognition does not significantly decrease after encryption in our scheme. Additionally, we have implemented our FBKDF on encrypted biometric templates and have presented the results in Figure 6(b).…”
Section: Accuracy Of Facial Biometric Recognitionmentioning
confidence: 77%
“…The mean and variance of the ith feature are calculated as: • P rocess(f eature vector) → (w 0 ): Quantize feature vector value and transform it into a highly distinguishable binary string(w 0 ). Feature vector quantization approach can be seen in [17][18][19]. In this work,w 0 is calculated as…”
Section: Key Generation From Facial Biometric Datamentioning
confidence: 99%
“…It is not easy to find a representative study because their proposals do not provide a reasonable and concrete method [18][19][20][21]. Minhye Seo et al proposed a new biometric-based key derivation function for enhancement of the authentication system by the replacement of password-based key derivation functions [22]. Some researchers have tried to use other noise sources such as Physical Unclonable Function and image link, but these results are also insignificant [23].…”
Section: Introductionmentioning
confidence: 99%