Abstract
Recently, crypto-biometric systems have been studied for solving the key management problem of cryptographic systems and protecting templates in biometric systems at the same time. The fuzzy vault system is a well-known crypto-biometric system. We propose a new method of applying iris data to the fuzzy vault. Our research has following two advantages and contributions. First, in order to solve the variation problem of the extracted iris features, we introduce a pattern clustering method. Second, in order to produce unordered sets for fuzzy vault, we use the iris feature extraction algorithm based on ICA (Independent Component Analysis). Experimental results showed that 128-bit cryptographic keys as well as the iris templates were secure with the fuzzy vault scheme.
Chapter PDF
Similar content being viewed by others
References
Uludag, U., Pankanti, S., Jain, A.K.: Fuzzy Vault for Fingerprints. In: Proceedings of Audio- and Video-based Biometrics, December 4, 2006 DRAFT 31 Person Authentication, Rye Town, USA, July 2005, pp. 310–319 (2005)
Trappe, W., Washington, L.C.: Introduction to Cryptography with coding theory. Prentice-Hall, Upper Saddle River, NJ
Juels, A., Sudan, M.: A fuzzy vault scheme. In: CCS 2002. ACM Conference on Computer and Communications Security, ACM, New York (2002)
Bae, K.H.: An Iris Feature Extraction Method using the Independent Component Analysis. The Graduate School of Yonsei University, Dept. of Electrical and Electronic Eng. (2002)
Bae, K.H., Noh, S.I., Park, Kim, J.H.: Iris Feature Extraction Using Independent Component Analysis. In: Kittler, J., Nixon, M.S. (eds.) AVBPA 2003. LNCS, vol. 2688, pp. 838–844. Springer, Heidelberg (2003)
Clancy, T., Lin, D., Kiyavash, N.: Secure Smartcard-Based Fingerprint Authentication. In: Proceedings of ACM SIGMM Workshop on Biometric Methods and Applications, Berkley, USA, November 2003, pp. 45–52. ACM, New York (2003)
Uludag, U., et al.: Securing Fingerprint Template: Fuzzy Vault With Helper Data. In: Proc. of CVPR Workshop on Privacy Research In Vision, New York, USA, June 2006, p. 163 (2006)
Shibata, Y., Nishigak, M.: A study on biometric key generation. Asian Biometrics Forum (2006)
Yang, S., et al.: Automatic Secure Fingerprint Verification System Based on Fuzzy Vault Scheme. In: Proc. of IEEE ICASSP, Philadelphia, USA, March 2005, vol. 5, pp. 609–612. IEEE, Los Alamitos (2005)
Freire-Santos, M., Fierrez-Aguilar, J., Ortega-Garcia, J.: Cryptographic Key Generation Using Handwritten Signature. In: Proceedings of Biometric Technologies for Human Identification III, Orlando, USA, April 2006, vol. 6202, pp. 225–231 (2006)
Feng, Y.C., Yuen, P.C.: Protecting Face Biometric Data on Smartcard with Reed-Solomon Code. In: Proceedings of CVPR Workshop on Privacy Research In Vision, New York, USA, June 2006, p. 29 (2006)
Daugman, J.: How iris recognition works. IEEE Trans. Circuits Syst. Video Techno. 14(1), 21–30 (2004)
Wicker, S.B.: Error Control Systems for Digital Communication and Storage. Prentice-Hall, Englewood Cliffs, NJ (1995)
Sylvester, J.: Reed-Solomon Codes (January 2001), Available from http://www.elektrobit.co.uk
Sklar, B.: Reed-Solomon Codes (accessed on 2007.2.10), Available at http://www.informit.com/content/images/art_sklar7_reed-solomon/elementLinks/art_sklar7_reed-solomon.pdf
Duda, R.O., Har, P.E., Stork, D.G.: Pattern Classification, 2nd edn. Wiley-Interscience, Chichester (2001)
Kreyszig, E.: Advanced Engineering Mathematics, 8th edn. Wiley, Chichester (1999)
(accessed on 2007.1. 2) http://berc.yonsei.ac.kr
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lee, Y.J., Bae, K., Lee, S.J., Park, K.R., Kim, J. (2007). Biometric Key Binding: Fuzzy Vault Based on Iris Images. In: Lee, SW., Li, S.Z. (eds) Advances in Biometrics. ICB 2007. Lecture Notes in Computer Science, vol 4642. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74549-5_84
Download citation
DOI: https://doi.org/10.1007/978-3-540-74549-5_84
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74548-8
Online ISBN: 978-3-540-74549-5
eBook Packages: Computer ScienceComputer Science (R0)