Advanced Multimedia Processing Lab -- Projects -- Biometric-Based Key Generation

            About AMP Lab        Projects        Downloads        Publications        People        Links

Project - Key Generation Based on Biometrics

 

Top of this page

                                  

Motivation and Goal

Many access control applications demand some secret information from users to authenticate the users’ identities. One example of such secret information is a digital key. A digital key is also used in many encryption / decryption applications.

In this project, We introduce a framework to generate stable cryptographic keys from biometric data. We also analyze the security problem of user information associated key generation (UIAKG) systems. We consider three kinds of attacks from the hacker: the exhaustive search attack, the authentic key statistics attack and the device key statistics attack. The results show that the proposed approach of key generation is user-friendly, reliable and secure.

Top of this page

 

Key Generation based on Biometrics

We introduce a framework to generate stable cryptographic keys from biometric data that is unstable in nature. Given the biometrics, a set of reliable features are extracted from user-dependent transforms. Each feature is compared with multiple thresholds to generate a multi-bit key. By cascading the multi-bit keys, we obtain one bio-key for security purposes. In order to generate a reliable bio-key, an optimal thresholding method is proposed to minimize the authentication error rate, in terms of the false accept rate (FAR) and the false reject rate (FRR).

We analyze the security problem of user information associated key generation (UIAKG) systems. We consider three kinds of attacks from the hacker: the exhaustive search attack, the authentic key statistics attack and the device key statistics attack. Under each attack, we give the estimate of the number of guesses the hacker has to make in order to access the system. Such analysis provides useful guidelines in designing a UIAKG system. The analysis also suggests that a user-dependent UIAKG is more secure than a user-independent one. The experimental results show that the proposed approach of key generation is user-friendly, reliable and secure.

Top of this page

 

 

Top of this page

 

Any suggestions or comments are welcome. Please send them to Wende Zhang. 

Top of this page


This website is maintained by Wende Zhang
Copyright © 200
1 Advanced Multimedia Processing Lab. All rights reserved.
Revised: May 19, 2005 .