Author:
Amine Hmani Mohamed,Petrovska-Delacretaz Dijana,Dorizzi Bernadette
Abstract
Security is a main concern nowadays. Cryptography and biometrics are the main pillars of security. Using biometrics to obtain cryptographic keys offers distinct advantages over traditional methods. Classical systems rely on passwords or tokens assigned by administrators, which can be stolen or shared, making them insufficient for identity verification. In contrast, biometric-based keys provide a better solution for proving a user’s identity. This chapter proposes an approach to regenerate crypto-biometric keys with high entropy, ensuring high security using facial biometrics. The keys are regenerated using a fuzzy commitment scheme, utilizing BCH error-correcting codes, and have a high entropy of 528 bits. To achieve this, we use an intra-inter variance strategy for the process of bit selection from our facial deep binary embeddings. The system is evaluated on the MOBIO dataset and gives 0% FAR and less than 1% FRR. The proposed crypto-biometric keys are resistant to quantum computing algorithms, provide non-repudiation, and are revocable and convenient with low false rejection rates.
Reference28 articles.
1. Pooja S, SK. Quantum computing review: A decade of research. IEEE Transactions on Engineering Management. 2023:1-15. DOI: 10.1109/TEM.2023.3284689
2. Augot D, Batina L, Bernstein DJ, Bos J, Buchmann J, Castryck W, et al. Initial recommendations of long-term secure post-quantum systems. In: Post-Quantum Cryptography for Long-Term Security. Eindhoven, Netherlands: PQCRYPTO; 2015. Available from: pqcrypto.eu.org/docs/initial-recommendations.pdf
3. Jain AK, Ross A, Uludag U. Biometric template security: Challenges and solutions. In: 2005 13th European Signal Processing Conference in Antalya, Turkey. New York City, USA: IEEE; 2005. pp. 1-4
4. Chen B, Chandran V. Biometric based cryptographic key generation from faces. In: 9th Biennial Conference of the Australian Pattern Recognition Society on Digital Image Computing Techniques and Applications (DICTA 2007) in Glenelg, SA, Australia. New York City, USA: IEEE; 2007. pp. 394-401. DOI: 10.1109/DICTA.2007.4426824
5. Kanade S, Petrovska-Delacrétaz D, Dorizzi B. Generating and sharing biometrics based session keys for secure cryptographic applications. In: 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS) in Washington, DC, USA. New York City, USA: IEEE; 2010. pp. 1-7. DOI: 10.1109/BTAS.2010.5634545