Abstract
In this work we present a new technique for generating cryptographic keys out of iris textures implementing a key-generation scheme. In contrast to existing approaches to iris-biometric cryptosystems the proposed scheme does not store any biometric data, neither in raw nor in encrypted form, providing high secrecy in terms of template protection. The proposed approach is tested on a widely used database revealing key generation rates above 95%.
This work has been supported by the Austrian Science Fund, project no. L554-N15 and the Austrian Grid Project II is gratefully acknowledged.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.K.: Biometric cryptosystems: issues and challenges. Proceedings of the IEEE 92(6), 948–960 (2004)
Bowyer, K., Hollingsworth, K., Flynn, P.: Image understanding for iris biometrics: a survey. Computer Vision and Image Understanding 110, 281–307 (2008)
Hao, F., Anderson, R., Daugman, J.: Combining Cryptography with Biometrics Effectively. IEEE Transactions on Computers 55(9), 1081–1088 (2006)
Wu, X., Qi, N., Wang, K., Zhang, D.: A Novel Cryptosystem based on Iris Key Generation. In: Fourth International Conference on Natural Computation (ICNC’08), pp. 53–56 (2008)
Bringer, J., Chabanne, H., Cohen, G., Kindarji, B., Zémor, G.: Theoretical and practical boundaries of binary secure sketches. IEEE Transactions on Information Forensics and Security 3, 673–683 (2008)
Davida, G., Frankel, Y., Matt, B.: On enabling secure applications through off-line biometric identification. In: Proc. of IEEE, Symp. on Security and Privacy, pp. 148–157 (1998)
Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: Sixth ACM Conference on Computer and Communications Security, pp. 28–36 (1999)
Buhan, I.R., Doumen, J.M., Hartel, P.H., Veldhuis, R.N.J.: Fuzzy extractors for continuous distributions. Technical report, University of Twente (2006)
Rathgeb, C., Uhl, A.: Systematic construction of iris-based fuzzy commitment schemes. In: Tistarelli, M., Nixon, M.S. (eds.) ICB 2009. LNCS, vol. 5558, pp. 947–956. Springer, Heidelberg (2009)
Rathgeb, C., Uhl, A.: Context-based texture analysis for secure revocable iris-biometric key generation. In: Proceedings of the 3rd International Conference on Imaging for Crime Detection and Prevention, ICDP ’09, London, UK (2009)
Bringer, J., Chabanne, H., Cohen, G., Kindarji, B., Zémor, G.: Optimal iris fuzzy sketches. In: Proc. 1st IEEE International Conference on Biometrics: Theory, Applications, and Systems, pp. 1–6 (2007)
Vielhauer, C., Steinmetz, R., Mayerhöfer, A.: Biometric hash based on statistical features of online signatures. In: ICPR ’02: Proceedings of the 16 th International Conference on Pattern Recognition (ICPR’02), vol. 1, pp. 100–123 (2002)
Sutcu, Y., Sencar, H.T., Memon, N.: A secure biometric authentication scheme based on robust hashing. In: MMSec ’05: Proceedings of the 7th Workshop on Multimedia and Security, pp. 111–116 (2005)
Rathgeb, C., Uhl, A.: An iris-based interval-mapping scheme for biometric key generation. In: Proceedings of the 6th International Symposium on Image and Signal Processing and Analysis, ISPA ’09, Salzburg, Austria (September 2009)
Daugman, J.: How Iris Recognition Works. IEEE Trans. CSVT 14(1), 21–30 (2004)
Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal 40, 614–634 (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Rathgeb, C., Uhl, A. (2010). Privacy Preserving Key Generation for Iris Biometrics. In: De Decker, B., Schaumüller-Bichl, I. (eds) Communications and Multimedia Security. CMS 2010. Lecture Notes in Computer Science, vol 6109. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13241-4_18
Download citation
DOI: https://doi.org/10.1007/978-3-642-13241-4_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-13240-7
Online ISBN: 978-3-642-13241-4
eBook Packages: Computer ScienceComputer Science (R0)