2010
DOI: 10.5120/673-946
|View full text |Cite
|
Sign up to set email alerts
|

Cryptographic Key Generation from Multiple Biometric Modalities: Fusing Minutiae with Iris Feature

Abstract: Human users find difficult to remember long cryptographic keys. Therefore, researchers, for a long time period, have been investigating ways to use biometric features of the user rather than memorable password or passphrase, in an attempt to produce tough and repeatable cryptographic keys. Our goal is to integrate the volatility of the user's biometric features into the generated key, so as to construct the key unpredictable to a hacker who is deficient of important knowledge about the user's biometrics. In ou… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
26
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 42 publications
(28 citation statements)
references
References 33 publications
0
26
0
Order By: Relevance
“…The information about the database that we used were acquired from the NCUT Database [52]. The information about the database used are summarized in Table 2.…”
Section: Experimentation and Resultsmentioning
confidence: 99%
“…The information about the database that we used were acquired from the NCUT Database [52]. The information about the database used are summarized in Table 2.…”
Section: Experimentation and Resultsmentioning
confidence: 99%
“…Several other ideas of using a set of multiple biometric characteristics within biometric template protections schemes have been proposed [46][47][48][49][50][51]. That is, a rearrangement of biometric feature vectors in order to provide a uniform distribution of errors improves the overall accuracy of the system.…”
Section: Related Workmentioning
confidence: 99%
“…In [16,32], face biometric is used to extract a suitable length cryptographic key. Iris is also used for cryptographic key generation from iris texture [12,13,31]. Rathgeb et al [31] analyze the iris feature vector and detected the most stable or reliable bits in the binary iris code to construct cryptographic key.…”
Section: Crypto-biometric Systemsmentioning
confidence: 99%
“…In recent research, multimodal or multiple biometrics are used in crypto-biometric systems [11][12][13]. A Jagadeesan et al proposed a method [12] where multimodal biometrics (fingerprint and iris) are used.…”
Section: Crypto-biometric Systemsmentioning
confidence: 99%
See 1 more Smart Citation