Open Access Open Access  Restricted Access Subscription or Fee Access

Combining Biometric Features of Iris and Retina for Better Security Cryptography

P. Balakumar, Dr. R. Venkatesan

Abstract


The requirement for dependable user authentication methods has increased in the wake of discriminating worries about security and fast developments in networking, communication and mobility. The majority of authentication systems of present control access to computer systems or secured locations with the help of passwords, but it are not highly durable to attacks because it can be easily broken or stolen. Thus, biometrics has now turned out to be a feasible replacement to conventional identification techniques in several application fields. Biometrics which is indicated as the science of recognizing an individual according to their physiological or behavioral traits is evolving to gain recognition as a legitimate technique for identifying an individual‟s identity. Biometric technique have proved importance in a range of security, access control and monitoring applications. The technologies are still new and rapidly evolving; this also leads to the cracking of even the biometrics system. Therefore, a new technique must be developed to overcome those difficulties. A new technique called multimodal biometrics can be used to satisfy those requirements because it is very difficulty for the attackers to identify more than one biometrics. In this technique, the features are extracted from different biometrics and then they are combined using a technique called Fusion. From this fused features, cryptographic key id generated which is used as a key for authenticating the system. This paper combines the features of Iris and Retina. The experimental result suggests that the combination of Iris and Retina results in better security than the other combination of biometrics.

Keywords


Biometrics, Cryptography Key Generation, Minutiae Points Extraction, Security Analysis

Full Text:

PDF

References


R. Ang, R. Safavi-Naini, L. McAven, “Cancellable key-based fingerprint templates," ACISP 2005, pp. 242-252.

Announcing the Advanced Encryption Standard (AES), Federal Information, Processing Standards Publication 197, Nov. 26, 2001.

Y. J. Chang, Z. Wende, and T. Chen, “Biometrics- based cryptographic key generation," IEEE International Conference on Multimedia and Expo, vol. 3, p. 2203-2206, 2004

Chen, and V. Chandran, “Biometric Based Cryptographic Key Generation from Faces," Proceedings of the 9th Biennial Conference of the Australian Pattern Recognition Society on Digital Image Computing Techniques and Applications, pp. 394-401, 2007.

T. Connie, A. Teoh, M. Goh, and D. Ngo, “ Palm hashing: A novel approach for cancellable biometrics," Information processing letters, vol. 93, no. 1, pp. 1-5, 2005.

Feldmeier and P. Karn. “UNIX password security Ten years later," Advances in Cryptology Crytpo '89, LNCS 435, pp. 44-63, Springer-Verlag, 1990.

Y. C. Feng, P. C. Yuen, and A. K. Jain, “A hybrid approach for face template protection," Proceedings of SPIE Conference of Biometric Technology for Human Identification, Orlando, USA, vol. 6944, pp. ca. 325, 2008.

M. F. Santos, J. F. Aguilar, and J. O. Garcia, Cryptographic key generation using handwritten signature," Proceedings of SPIE, vol. 6202, pp. 225-231, Orlando, Fla, USA, Apr. 2006.

Gabor Filter. (http://en.wikipedia.org/wiki/Gaborlter) [10] F. Hao, R. Anderson, and J. Daugman, “Combining crypto with biometrics effectively," IEEE Transactions on Computers, vol. 55, pp. 1081-1088, 2006.

L. C. Jain, U. Halici, I. Hayashi, S.B. Lee, and S.Tsutsui, “Intelligent Biometric Techniques in Fingerprint and Face Recognition”, CRC Press, 1999.

J. G. Jo, J. W. Seo, and H. W. Lee, “Biometric digital signature key generation and cryptography communication based on fingerprint," First Annual International Workshop 2007, LNCS 4613, pp. 38-49, Springer Verlag, 2007.

Klein, “Foiling the cracker: A survey of, and improvements to, password security," Proceedings of the 2nd USENIX Security Workshop, pp. 5-14, Aug. 1990.

L. Lam, S. W. Lee, and C. Y. Suen, “Thinning methodologies-A comprehensive survey," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol 14, no. 9, pp. 879, Sep. 1992.

B. Teoh, and C. T. Yuang, “Cancellable biometrics realization with multispace random projections," IEEE Transactions on Systems, vol. 37, no. 5, pp.1096-106, 2007.

Alexander P. Pons, and Peter Polak, “Understanding user perspectives on biometric technology,” Communications of the ACM, vol. 51, no. 9, pp. 115-118, September 2008.

N. K. Ratha, J. H. Connell, and R. M. Bolle “Enhancing security and privacy in biometrics based authentication systems”, IBM Systems Journal, vol. 40, pp. 614-634, 2001.

S. C. Chong, A. B. J. Teoh, and D. C. L. Ngo, “Iris Authentication Using Privatized Advanced Correlation Filter,” in ICB, pages 382–388, 2006.

Li Chen, IEEE Member, Xiao-Long Zhang, “Feature-based Image Registration using Bifurcation Structures”, Matlab Central.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.