- Research Article
- Open Access

# Development of a New Cryptographic Construct Using Palmprint-Based Fuzzy Vault

- Amioy Kumar
^{1}and - Ajay Kumar
^{1, 2}Email author

**2009**:967046

https://doi.org/10.1155/2009/967046

© A. Kumar and A. Kumar. 2009

**Received:**7 October 2008**Accepted:**16 July 2009**Published:**8 September 2009

## Abstract

The combination of cryptology and biometrics has emerged as promising component of information security. Despite the current popularity of palmprint biometric, there has not been any attempt to investigate its usage for the fuzzy vault. This paper therefore investigates the possible usage of palmprint in fuzzy vault to develop a user friendly and reliable crypto system. We suggest the use of both symmetric and asymmetric approach for the encryption. The ciphertext of any document is generated by symmetric cryptosystem; the symmetric key is then encrypted by asymmetric approach. Further, Reed and Solomon codes are used on the generated asymmetric key to provide some error tolerance while decryption. The experimental results from the proposed approach on the palmprint images suggest its possible usage in an automated palmprint-based key generation system.

## Keywords

- Discrete Cosine Transform
- Secret Message
- Advance Encryption Standard
- Equal Error Rate
- False Acceptance Rate

## 1. Introduction

Hacking of the information is widely considered as one of the potential attacks on any secure system. Authentication systems should be designed to withstand such attacks when deployed for critical security applications such as e-commerce and accesses to restricted data/buildings. Biometric-based authentication is considered as one of the most secured systems whenever high privacy is demanded. However, such authentication systems itself follow stepwise procedural algorithms, like feature extraction, matching, classification, and so forth, for authentication/verification purposes [1]. As biometric templates are required at each step, it increases the possibilities of intrusion at every step and requires additional security management [2]. For instance, even a most secure authentication system is not reliable if it cannot defy the attacks on the stored database, or if an intruder can intercept the template features generated from the biometric traits. Recent research efforts have developed some promising ideas to resist attacks on biometric authentication system. One of such proposed solutions is to cancel the tainted biometric features and regenerate the new one for authentication purposes (also known as cancelable biometric [3]). BioHashing technique is frequently used to transform (noninvertible) biometric template into some other representations using one-way hash functions. This reissuance of the biometric templates can withstand the attacks on stored templates and widely accepted as a solution to the intrusion in extracted features. The most acknowledgeable work in this area is to provide cryptography-based security at different stages of biometric authentication. Cryptography is one of the most effective ways to enhance the security of the information system via its encryption and decryption modules [4]. Even so, the weakest link of cryptography-based security systems is the associated secret key. While the simple memorized key can be easily intercepted, a long and complex key needs extra storage management like tokens, smart cards, and so forth. Consequently, the smart card-based solutions came in existence. To provide an aid to security, the cryptographic keys are now stored somewhere (e.g., in a computer or on a smart card) and released based on some alternative authentication mechanism. The most popular mechanism used for this purpose is password-based security [5], which is again a long string and difficult to make secure, as now the whole security depends upon the password given, used for authentication.

As a solution, a secure encryption key can be associated with a biometric signature to ensure *the integrity and confidentiality* of communication in distributed systems. Many of the limitations of the password and PIN-based encryption schemes can be alleviated by using biometric features, which are unique and can be conveniently extracted from every user. The biometric-based encryption requires physical presence of persons to be authenticated and is therefore reliable, convenient, and efficient. The encryption keys can be generated using low-level combination of biometric features and cryptology. Jules and Sudan [6] have proposed the generation of a secure vault using an unordered set, to lock any secret inside and referred it as fuzzy vault. The concept of fuzzy vault has been further explored by Uludag et al. [7], where they used fingerprint templates as an unordered set to create the vault around the secret. They further utilizes error correcting codes, such as Reed and Solomon code to produce some error tolerance in the input biometric templates, while decryption module.

However, the motivation to protect secret key involved in cryptographic modules using biometric based fuzzy vault can have several drawbacks due to different cryptographic approaches. While the symmetric cryptographic approaches suffered authentication problems, asymmetric approaches are computationally intensive (as further discussed in Section 3). We, therefore, proposed the combination of both symmetric and asymmetric cryptographic approaches (which is referred to as double encryption in this paper) into the fuzzy vault to meet high-security standard and utilize the advantages of both approaches in a common domain. In the recent years, biometric features such as face, iris, fingerprint, hand geometry, palmprint, and signature have been suggested for the security in access control. Most of the current research in biometrics has been focused on fingerprint and face. The recent research on face recognition has shown some thorny problems regarding pose, lighting, orientation, and gesture which made it less reliable as compared to other biometrics. Fingerprint identification has successfully implemented and widely accepted in most of the cases for recognition purposes. However, it also has difficulties regarding feature extraction. The fingerprint features are very difficult to extract from the elderly, laborer, and handicapped users. As a result, other biometric characteristics are receiving increasing attention. Moreover, additional biometric features, such as palmprint and hand geometry, can be easily integrated with the existing authentication system to provide enhanced level of confidence in personal authentication. We explored the usage of palmprint biometric to create fuzzy vault. The prior works in this area is summarized in Section 2, while the detail of the earlier cryptographic approaches is presented in Section 3. Double encryption is explored in Section 4. The proposed system is discussed in Section 5. The experimental results from the performed approach are summarized in Section 6. This section also includes a summary of related prior work. Finally, the main conclusions from this paper are summarized in Section 7.

## 2. Prior Work

The issue of nonrevocable biometric has been investigated by Ratha et al. [3] by introducing the concept of cancelable biometrics. Davida et al*.* [8] proposed majority decoding and error correcting codes-based technique to generate the cancelable biometric features. The approach is further utilized using optical computation techniques in [9] and using keystroke dynamics in [10]. Sautar et al. [9] were the first to commercialize the concept in to their product *bioscrypt.* They applied Fourier transform and majority coding to reduce the feature variation. A predefined random key is locked by biometric sample using phase angle product, and this product can be further unlocked by other genuine biometrics. The performance analysis is however not reported. Connie et al. [11] used the concept of BioHashing by calculating fisherprojections. However, the results shown by them are based on the assumption that the generated token or keys will be never stolen or shared. This is quite unrealistic and creates doubts about real evaluation. The study of such unrealistic evaluation has been presented by Kong et al. in [12]. One of the innovative works proposed in this area is by [2], where the authors utilized random orientation field into the feature extractor to generate cancelable competitive codes. The authors further considered all the three attacks possible (template reissuance, replay attacks, and database attacks) to provide a complete secure system. To protect the generated cancelable competitive codes (replay attacks) [2], the idea of one-time pad (OTP) ciphers is explored. The OTP [13] is a symmetric cipher (same key is used for both encryption and decryption) generated by applying XOR between the randomly generated key and the plaintext. The decryption can be done using the matched OTP and the key (used for encryption). The advantage with OTP is that each encryption is independent to the next encryption, and random key can be used only once for encryption. Hence, theoretically there is no way to break such encryption just by analyzing a sequence of message. Although OTP encryption has advantages over other encryption algorithms, still it has some open issues like (i) the key involved for decryption should be identical to encryption once and hence required safe communication of key to the decrypting party [13]; (ii) the number of bits in the key is same as in the plaintext which makes the algorithm computationally inefficient for encrypting bulk data; (iii) one of the major requirements of the algorithm is that not part or bit of the key should be ever reused in any other encryption; otherwise it is easy to break it [14]. (Synchronized OTP generator can be employed to counter such problems.) Authors in [15] proposed a new cryptosystem by generating 1024 bits binary string, extracted from the differential operations. The string is then mapped to 128 bits encryption key using a Hash function. The approach is novel and secure in many respects but still has issues to resist against attack on generated encrypting key using Hash function, as raised by Kong et al*.* in [12].

In most of the works proposed in literature of cancelable biometrics, security of system depends upon the generated unique code from a particular one-way hash functions. Thus the system is secure till the unique code is not compromised and hence requires extra security management. Juels and Sudan [6] have presented a promising model which was an improvement on the prior study by Juel and Wttenberg in [16]. They have produced a significant improvement by modifying the Scheme of Davida et al. (in using error correcting code size) [8] by introducing Reed and Solomon error correcting coding theory in their fuzzy vault. Their contribution is to hide any secret in fuzzy vault using polynomial construction under unordered set. The secret can be retrieved back by polynomial reconstruction, if certain points of the unordered set can be known at receiving end. The security of the scheme mainly depends upon polynomial construction and reconstruction problem. Uludag et al. [7] have combined the concept of fuzzy vault with biometrics (fingerprint) by using biometric template as an unordered set. Uludag and Jain [17] proposed to use minutiae-based features from the fingerprints for locking and unlocking the vault. However, this approach is limited to its usage due to its inability to eliminate the inherent variability in minutiae feature. Nandakumar et al*.*[18] have attempted to eliminate such variability using *helper data* and illustrated promising results. Hao et al. [19] use iris biometric for generating cryptographic keys and a combination of Reed and Solomon and Hadamard error correcting theories for error tolerance. Calancy et al. [20] proposed a smart card-based fuzzy vault that employed fingerprints for locking and unlocking. The presumption that acquired fingerprint images are prealigned is not realistic and could be the possible reason for high false rejection rate (30.0%) reported in the paper. Lin and Lai [21] have done remarkable work in order to prevent repudiation but their work still required smart card and password for better implementation and hence reduces its usability. Recently, a modified fuzzy vault scheme is proposed in [19] using asymmetric cryptosystem. Having generated RSA public and private keys, authors have used Reed-Solomon coding to convert the keys in to codes. Further they used two grids, one for codes and the other for biometric features. The elements in the corresponding grids are in same positions. The unlocking of vault only requires the knowledge of the correct positions of the numbers in any of the grids. However, this approach utilizes the asymmetric cryptosystem and has all the problems associated with such systems. Moreover, the database used for the experimental evaluation is too small (9 users) to generate any reliable conclusion on the performance. In summary, a different range of biometrics has been used for fuzzy vaults in literature. However, with few notable exceptions, for example*,* [15, 19], with small false rejection rates, the average FAR of 15% has been cited.

In contrast to prior work in this area, we proposed [22] fuzzy vault-based security to withstand the attacks on secret key employing palmprint. The secret document/information can be first encrypted using double encryption. The symmetric key approach can be easily employed to encrypt bulk data. The attacks on security of symmetric key (secure communication, authentication, as detailed in Sections 3.1.1 and 3.1.2 in this paper) are reduced by encrypting it again using asymmetric cryptographic approach. Finally, the private key of asymmetric approach (at the end of double encryption) is protected by creating fuzzy vault around it. The approach is to firstly employ double encryption to strengthen the security system and reduce the shortcomings associated with both symmetric and asymmetric cryptographic approaches and finally to utilize the palmprint features to create fuzzy vault around the key at the end of double encryption.

*The main contributions of this paper can be summarized as follows*. Firstly, this paper investigates a new approach for fuzzy vault using palmprint biometric. Secondly, unlike prior work in literature, this paper proposes a combined cryptosystem which successfully exhibits the advantage of both symmetric and asymmetric cryptography. It may be noted that the asymmetric approach (RSA, named as initials of Ron Rivest, Adi Shamir, and Leonard Adleman) for encryption has been estimated to be very slow as compared to traditional symmetric approach (Data Encryption Standard, abbreviated as DES) [4]. Therefore the proposed approach is to use symmetric cryptography to encrypt the entire document and then we encrypted symmetric key using asymmetric (RSA) approach. The palmprint-based fuzzy vault is then constructed around decryption key. Finally, we investigate the performance of the palmprint-based cryptosystem on a large dataset and achieve promising results.

## 3. Cryptographic Approaches

The objective of this work is to incorporate both symmetric and asymmetric cryptographic approaches into the fuzzy vault in order to ensure higher security and utilize the advantages of both systems in a common domain. This is referred to as double encryption. The approach is to use symmetric key approach (DES) for encrypting the secret document, and the generated symmetric key is again encrypted by asymmetric approach (RSA). In the next subsections, both symmetric and asymmetric approaches are briefly introduced, and then the proposed approach utilizing the combination of both approaches is discussed.

### 3.1. The Symmetric Cryptosystem

The symmetric approach is most commonly used cryptosystem, as the system is easy to implement and more importantly it has very fast encryption speed [4]. Symmetric algorithms, such as, DES, Triple DES, and Rijndael [4], provide efficient and powerful cryptographic solutions, especially for encrypting bulk data. Let
be the secret message required to be hidden by source *A*(Lucie). The *m* letters of message are alphabets. The message is intended to B*(* Bryan). Lucie generates its symmetric key, say
, and uses this key to lock secret message *X*:

She then sends the encrypted (locked) message and the respective symmetric key to B (Bryan). Receiver B (Bryan) used the symmetric key to decrypt the message:

In the presented work we have used advance encryption standard (AES) as a symmetric cryptosystem, which is advanced version of data encryption standard (DES). The AES is symmetric key-based cryptosystem which is based on the principle of block and substitution cipher. The AES algorithm uses substitution boxes, polynomial matrices, and symmetric key to convert a plain text to cipher text. These are the parameter for AES cryptosystem and required to be generated first before the encryption module [4]. Although symmetric key algorithm is very fast and efficient in bulk data encryption, it can sometimes fail to ensure high-security requirements. There are few shortcomings with the usage of symmetric key cryptography. We now detail the problems associated with symmetric key algorithms.

#### 3.1.1. The Problems behind Authentication

Ensuring the integrity of received data and verifying the identity of the source of that data is of major concern to ensure the security in data communication. A symmetric key can be used to check the identity of the individual, as it requires the presence of symmetric key, but this authentication scheme can have some problems involving trust. The problem is that this scheme cannot discriminate between the two individuals who know the shared key. For example, any person having control on Lucie's private particulars can make any fraud message to her pals by pretending himself as Lucie. This not only allows intruder to do any unauthorized work in place of Lucie but also creates problems for other related persons. This uncertainty with symmetric approaches made them useless whenever high confidentiality required in the communication system. The above discussed issues can lead to the position where there is no stand to deny if the disputes were to arise. The relevant example is of repudiation when Lucie's friend renews the contract signed by Lucie without telling her and repudiates from the fact by claiming that someone else might have stolen the key from Lucie to sign the contract. This concludes the key point that the communication system must present nonrepudiation between communicating parties. The major weakness with symmetric approach is that they sometimes fail to authenticate persons in communication.

#### 3.1.2. The Problems behind Security of Key

The other problem associated with this system is to ensure the security of the involved symmetric key and how to exchange it safely. The security of a signed document depends upon the secret key involved as only secret key can ensure the decryption of this document. Thus for a secure communication system the secret key should be exchanged safely. One of the shortcomings of the cryptographic approaches is that they do not emphasize on key exchange problems. The asymmetric approaches such as RSA, DSA, and ECC are very good substitution of symmetric approach as it eliminates many of its shortcomings. Both of the above discussed problems can be alleviate by using asymmetric approach.

### 3.2. The Asymmetric Cryptosystem

The intended receiver in the position to matching is able to invert above using the following transformation:

In this work, we have used RSA cryptosystem which is the most commonly used asymmetric approach. A traditional RSA algorithm [23] requires two randomly generated prime numbers [24]. For the security of RSA algorithm, the prime numbers should be bigger (512 bit in our case) and randomly chosen. Any secret encrypted using public key can only be decrypted by using private key and vice versa. The main points involved in encryption and decryption are as follows.

- (1)
obtains the recipient Bryan's public key,

- (2)
represents the plaintext message as a positive integer,

- (3)
computes the ciphertext,

- (4)
sends the ciphertext to Bryan.

- (1)
uses his private key to compute positive integer,

- (2)
extracts the plaintext from the integer representative.

Using RSA algorithm, asymmetric cryptosystem can be employed to solve a number of problems regarding symmetric cryptographic approach. But as compared to symmetric approach, asymmetric approach also has few drawbacks.

#### 3.2.1. The Problems behind RSA

The private and public key approach of RSA cryptosystem can be substitute of the key exchange problem involved with symmetric approaches, but the major problem regarding this approach is the distribution of public keys. Having signed the secret document with Bryan's secret key, Alice must ensure that the public key available is really Bryan's key but not of intruder Carol. The management and security of private key is also a major concern. The other important problem with asymmetric cryptography is that the processing requires intense use of the central processing unit as it is computationally intensive and requires a lot of mathematical computations. This may be a real problem when several simultaneous sessions are required. The asymmetric approaches like RSA, DSA, and so forth are generally known to be slower (about 100 times slower) [4] than symmetric approaches like DES, AES, and so forth. As a conclusion one can argue that the symmetric cryptography is highly suitable for encrypting and decrypting the bulk of messages on data lines. However, the associated problem of providing all the recipients with an advanced copy of secret key can be expensive and hazardous. The insecurity associated with the distribution of all the necessary secret keys to all the recipients on a regular basis is very high. In summary, working with RSA cryptosystem can certainly eliminate several drawbacks associated with symmetric approaches. However, this cryptosystem still has some problems regarding complexity of algorithm as it works very slowly (whenever a bulk data encryption is required) due to the fact that it is mathematically intensive and requires extra management for public keys.

## 4. Double Encryption

One way to alleviate above discussed problems associated with the symmetric and asymmetric cryptographic approaches is to use double encryption. A secret message is encrypted using fast symmetric algorithm; the secret key is then encrypted using asymmetric cryptography; the Ciphertext (encrypted message) and the encrypted keys are finally sent to the recipient. Asymmetric cryptography is slow (computationally intensive), but not too slow to encrypt such a small (as compared to secret message) bits as a symmetric encryption key. Upon receipt, the recipient can easily use his/her private asymmetric key to decrypt the symmetric key. Further that symmetric key can be used to quickly decrypt the message file. This idea not only resolves the problem using both approaches but is also more computationally sound.

### 4.1. Why Double Encryption?

Most of the problems regarding symmetric/asymmetric approaches can be remedied using double encryption. The advantages of the symmetric approaches are utilized to encrypt bulk of the data, while asymmetric approaches are used to provide authentication/verification to secure communication (as discussed in Sections 3.1.1 and 3.1.2 symmetric approaches are sometimes fail in authentication purposes). Using double encryption, a message (may be bulk data) can be encrypted by symmetric key approach, while the key is again encrypted by public/private keys of asymmetric approach. Once the message is encrypted by public key of recipients, it can only be decrypted by its private key. This ensures a safe communication between the source and the verified/authenticated recipient. On the other hand, if the message is encrypted by private key of the recipient, it can only be decrypted by corresponding public key (which is publicly available). This process authenticates the source of encryption and therefore prevents any possible repudiation or denial from the message generator.

### 4.2. Prior Work in Double Encryption

The concept of double encryption is not new in cryptographic literature [25–27]. However, most of the related work is centered on the implementation of cryptographic encryption and decryption modules [28–30]. Some of these notable efforts can now be outlined. Nishimura et al. [25] in their recent European patent have detailed the concept of encrypting symmetric key with public and private keys of asymmetric approach. Their developed approach ensures that when a doubly-encrypted message is received, it is sent by a particular/authenticated user; also the recipient of this message is a specific/verified user(s). Doh et al. [31] have presented double encryption-based optical security system. They have utilized the facial images by using random-phase patterns in the spatial plane and the Fourier plane and a personal information image consisting of a personal identification number (PIN). With the recognition of PIN, the authentication of the encrypted personal identification card has done by primary classification and recognition of the PIN with the proposed multiplexed MACE phase-encrypted filter. In this technique, the possibility of spoofing is significantly decreased using the double-identification process. Z. Liu and S. Liu [32] proposed Double image encryption based on iterative fractional Fourier transform. They used to encrypt two different images into a single one simultaneously by their amplitudes of fractional Fourier transform with different orders.

In contrast to proposed double encryption schemes, we explored this concept for fuzzy vault. The combination of cryptographic algorithms with biometrics has been presented in several prior publications, for example, [2, 15, 17–19]. Some of these attempts have been focused to hide the secret information in biometric-based fuzzy vault [17, 18] while others used to generate cryptographic keys using biometrics ([15, 19]) to hide the secret information. *Our contribution to literature is that we attempt* to hide secret information using double encryption (via symmetric and asymmetric cryptographic approaches). In order to strengthen the cryptographic approaches, we closed the asymmetric key (at the end of double encryption) by creating palmprint-based fuzzy vault around it. *Our scheme is quite unique in the sense that, it overcomes any dependency on generated secret key (like [ 11 , 33 ]) in cryptographic approaches and utilized the unique palmprint features to create the fuzzy vault.*

### 4.3. Motivation to Fuzzy Vault

One of the most important applications of double encryption is that it can overcome many of the problems associated with the symmetric key approach (as the symmetric key is again encrypted by asymmetric approach). In addition, the level of security offered by the resulting asymmetric key, at the end of double encryption, is very high and desired to secure the entire system. *In the cryptographic literature, security of asymmetric key (at the end of double encryption) is generally questioned as the main/key weakness of the double encryption [ 28 ].* In the proposed approach, we have utilized the concept of fuzzy vault to overcome this shortcoming of double encryption by locking the private key in the vault. This combination of double encryption with biometrics (fuzzy vault) can overcome most of the weaknesses regarding symmetric and asymmetric cryptographic approaches.

## 5. Proposed System

Let *X* denote the dummy message to be encrypted and let
be the symmetric key, used to encrypt the document. In order to encrypt the message *X*, the symmetric key can be generated using AES algorithm. Let the symmetric key be denoted by
. Now for making system more secure and overcome the difficulties of symmetric key approach, (key exchange problem, confidentiality, etc.) the generated symmetric key again is encrypted by asymmetric approach using RSA algorithm. Let the public and private keys associated with the RSA cryptosystem are denoted by
and
*.* We will use this generated public key
for encryption and the generated private key
for decryption. Equation (5) summarize the complete procedure:

### 5.1. Palmprint-Based Fuzzy Vault

One of the key objectives of this work is to investigate the usage of palmprint biometric in the development of a cryptographic construct. The palmprint-based cryptosystem can have higher user acceptance and performance. Despite the recent popularity of palmprint-based systems [34–36], there has not been any attempt to investigate its usage for the fuzzy vault. The palmprint literature has cited number of advantages of palmprint biometric: (i) due to large surface area, the region of interest for palmprint is larger as compared to fingerprint and hence more features can be extracted, (ii) the chances of damaged hand are less than damage fingerprint for a person, (iii) even the presence of very less amount of dirt or grease can affect the performance of fingerprint verification, but having little effect in case of palmprint, and importantly (iv) higher user acceptance for palmprint mainly due to the stigma of fingerprints is associated with criminal investigations.

The double encryption method detailed in previous section incorporates both the ideas of symmetric and asymmetric cryptosystem efficiently and minimizes most of the shortcomings associated with both approaches. The other important concern of the system is the management of private key, as at the end of double encryption security of the entire system depends upon the security of private decryption key. The security to private key can be ensured by the use of well-known concept fuzzy vault detailed in [6]. Using the concept of fuzzy vault, our main goal is to hide this decryption key using biometric features to provide some security to the decryption key and make the whole system tailored for its practical usage. The combination of cryptographic keys with biometric offers several advantages including the fact that this removes the extra key management efforts required by the user and ensures that it is nontransferable. This method of protecting the private key not only makes the usage of smart cards redundant but also makes the user self dependent for its key. The difficulties lie in the fact that the cryptographic algorithm expects that the keys should be highly similar for every attempt for successful access, but it is clearly not the case with a typical biometric. The key is to use suitable coding theory scheme which can tolerate errors. We have used Reed and Solomon (RS) coding scheme for providing some error tolerance while decryption. This error tolerance is essentially required to handle inherent variations in palmprint (biometric) features from the same user during decryption. These variations can be attributed to the scale, orientation, and translational variations in the user palmprint due to peg-free imaging. The RS coding scheme has error correcting capacity of
, where
is the length of code and *k* is the length of message, and used to encode decryption key
.

*b*. Then we generate a grid of size such that th row of grid contains th place. The rest two places are filled by random numbers generated during encoding. We designate this grid as grid F. Further, a grid of same size is generated, and the biometric features are placed at the same position as in the case of RS codes. The rest of the two places are filled with numbers such that each row is maintained in the arithmetic progression. Let us designate these numbers as tolerance value. These points are actually the chaff points making the grid fuzzy. We called this grid as grid G. To unlock the vault we only need to know the correct positions of the elements in grid G, which can be achieved by comparing the input palmprint features with all the numbers in the corresponding row. Taking minimum of the distance, we can conveniently locate the positions of actual biometrics from grid F and hence the corresponding positions for the codes in grid G. The idea of generating such random numbers to combine with biometric templates is somewhat similar to as discussed in [2]. However, in contrast to [2], our approach is to add the tolerance value to the feature vectors. Out of the three places on the grid G, only one place is filled by original feature, and the rest two places are filled by original features added with tolerance value. The work presented in [2] has been motivated from the random orientation field, which is inserted into the feature extractor to generate noise-like feature codes. The inverse Reed and Solomon codes are used to decode the codes. One can select the suitable values for

*n*and

*k*to control the error occurred due to the variability in palmprint features.

*The motivation behind choosing the tolerance for the palmprint features is to make them fuzzy such that an imposter is not able to predict the feature vector just at random*. The block diagram for locking the vault using palmprint features is shown in Figure 2. The corresponding unlocking mechanism is illustrated in Figure 3. Once the procedure for the locking and unlocking of vault is determined, we fix the criteria for the genuine users to successfully open the vault while rejecting the imposter attempts. The vault is said to open successfully, if the codes retrieved from grid F (created by R-S codes) using the query palmprint features will be identically equal to the codes used at the time of locking. The inverse R-S codes can be applied to the retrieved codes to get back the original symmetric decryption key. Finally, this decryption key should successfully decrypt the secret private RSA key.

### 5.2. Feature Extraction and Normalization

*acquired from the digital camera*using unconstrained peg-free setup in indoor environment. The extraction of region of interest, that is, palmprint, from the acquired images is similar as detailed in [38]. The Discrete Cosine Transform (DCT) is used for the characterization of unique palmprint texture. The DCT is highly computationally efficient and therefore suitable for any online cryptosystem. (DCT is the basis of JPEG and several other standards (MPEG-1, MPEG-2 for TV/video, and H-263 for video-phones).) As illustrated in Figure 4, each of the pixels palmprint image is divided into pixels overlapping blocks. The extent of this overlapping has been empirically selected as 6 pixels. Thus we obtain 144 separate blocks from each palmprint image. The DCT coefficients from each of these

*N*square block pixels, that is, , are obtained as follows:

The standard deviation of DCT coefficients, obtained from each of the overlapping blocks, is used to characterize the region. Thus we obtain a feature vector of 144 values. High degree of intraclass variability in the palmprint features, mainly due to peg-free imaging, poses serious problems in the unlocking of the constructed vault by the genuine. The variability in feature vectors has been reduced with the help of Z-rule normalization. Corresponding to each feature vector, the training images are normalized, and then their mean and standard deviations are used for feature normalization in the test phase. This normalization reduces the interclass variability of the extracted features and very much helpful in fixing the tolerance for fuzzy vault.

## 6. Experimental Results

Summary of experimental results.

Key length | EER (%) | Tolerance |
---|---|---|

306 | 0.905 | 1.060 |

307 | 0.375 | 0.995 |

308 | 0.752 | 1.065 |

309 | 2.134 | 1.118 |

### 6.1. Discussion

Summary of related prior work.

Biometric | Feature | Error Correction Code | FRR (%) | FAR (%) | Reference | Database Size |
---|---|---|---|---|---|---|

fingerprint | Minutiae Points | RS Code | 5 | 0 | [42] | 9 Users |

Voice | Cepstrum coefficient | Discretization | 20 | NA* | [41] | 10 Users |

Signature | Dynamic time wrapping | Feature coding | 28 | 1.2 | [40] | 25 Users |

Iris | Gabor Feature | RS code and Hadamard Codes | 0.47 | 0 | [19] | 70 Users |

Fingerprint | Fourier transform | Majority code | 12 | 35 | [33] | 20 Users |

Fingerprint | Minutiae point | RS code | 30 | NA | [17] | NA* |

Fingerprint | Minutiae points and helper data | RS code | 3 | 0.24 | [18] | 100 Users ( |

Palmprint | DCT features | RS code | 0 | 0.4 | — | 85 |

Despite the current popularity of palmprint biometric, there has not been any attempt to investigate its usage for the fuzzy vault. This paper [22] therefore investigated the possible usage of palmprint in fuzzy vault to develop a user friendly and reliable crypto system. The image dataset used for the experiments (85 users) was acquired from unconstrained peg-free setup as such images are more realistic and expected to show large variations.

Our experimental results illustrated the EER up to about 0.3% while achieving the FRR of 0% at 0.35% FAR. However, these results may be less convincing as other approaches [2, 15]; our system is more reliable and robust, as far as attacks on secret key are concerned. The experimental results in BioHashing are dependent upon security of tokenized (pseudo)random number, as reported in [12] and have to put additional efforts to secure these numbers. In contrast, our emphasis is to strengthen the cryptographic approaches for encryption (the problems with symmetric and asymmetric approach have been discussed earlier in Sections 3.1.1-3.1.2) and withstand the attacks on secret key. Any secret document/information (of any length) can be encrypted by symmetric cryptographic approach (as symmetric approaches such as, DES, and AES are very efficient for the encryption of bulk data) and the secret symmetric key is again encrypted using asymmetric approach (to overcome dependency on secret symmetric key). Finally, the palmprint-based fuzzy vault is created around the private asymmetric key to prevent unauthorized disclosure of the key. At the decryption end, if the input palmprint template is able to open the vault (using matching criteria), the access to private key is granted. The rest is the conventional cryptographic mechanism as the private key is used to decrypt symmetric key and finally the secret document. In fact, we propose a mixed cryptosystem which has advantage over both symmetric and asymmetric cryptography. The advantage of the proposed system lies in that it not only attempts to alleviate the shortcomings of symmetric key-based cryptosystem but also solves the problems involved in asymmetric key-based approach. The approach minifies dependency on secret key involved and alternatively investigates a more secure and promising system, as compared to BioHashing-based techniques.

Performance of the proposed system depends upon choice of tolerance chosen for grid of palmprint features. The increase in tolerance could lead to wrong positions in grid, and hence even the genuine user cannot open the vault, which can result in unacceptably high false rejection rate. The low tolerance value could diminish the fuzziness of grid which can cause the imposters to be accepted and hence increase in false acceptance rate. The optimal range for tolerance value is dependent on the range of palmprint features.

The main consideration is on the construction of palmprint-based fuzzy vault around the private key. The private and public keys are generated on publicly available RSA toolbox [26]. The bit length of modulus
, where *m*,
*,* and *l* are prime numbers (Section
), is chosen as 1024 bits, and length of the encryption exponent *n* is 64 bit. The two large primes are chosen to be 512 bits, so that 1024 bit RSA modulus *m* can be generated. The RSA implementation has utilized the string format to generate the RSA keys and its length varies from 306 to 309 which is equivalent to 1015 to 1024 in binary bits. For the used RSA cryptosystem, the private key *sc* should be chosen such that it satisfies the following equation:

It can be observed from the above equation that more than one value of *n* can satisfy the congruence, and hence the length of the generated string (key) can vary. The prime numbers are randomly chosen and so are the values of *si* and *n*, and therefore the variations in length of keys are not controlled. In our experiments we have observed and accounted for this variation. Our implementation stores the fixed length key and loads it at the time of generating grids to construct the vault. Therefore Table 1 illustrated all the possible variations in key length and the corresponding performance (EER) with the tolerance value. It can be observed from this table that as the key length varies (in the range 306 to 309), the system has different equal error rates at different tolerances. The minimum equal error rate is achieved when the key length is 307.

## 7. Conclusions

This paper has investigated a new approach to construct the cryptographic vault using palmprint features. In order to combine cryptography with palmprint features we have also incorporated the implementation of double encryption. This can efficiently reduce the possibility of hacking within a cryptosystem. The experimental results presented in Section 6 illustrate that the palmprint-based cryptosystem can operate at low EER (0.375%). The summary of the prior work, presented in Table 2, suggests that the palmprint can be used as a promising biometric in the construction of a cryptosystem. However, the work presented in Table 2 is not directly comparable; our motivation is to mere outline the effectiveness of the proposed work. The cryptosystem investigated in this paper employed localized spectral features from the palmprint. The multiple feature representation, such as detailed in [34], can offer more reliable characterization of features, and therefore cryptosystem based on multiple-palmprint representation can be considered for the extension of this work.

## Declarations

### Acknowledgment

This work was partially supported by the research Grant from the Department of Science and Technology, Government of India (Grant no. 100/IFD/1275/2006-2007).

## Authors’ Affiliations

## References

- Jain AK, Ross A, Prabhakar S:
**An introduction to biometric recognition.***IEEE Transactions on Circuits and Systems for Video Technology*2004,**14**(1):4-20. 10.1109/TCSVT.2003.818349View ArticleGoogle Scholar - Kong A, Zhang D, Kamel M:
**Three measures for secure palmprint identification.***Pattern Recognition*2008,**41**(4):1329-1337. 10.1016/j.patcog.2007.09.002View ArticleGoogle Scholar - Ratha NK, Connell JH, Bolle RM:
**Enhancing security and privacy in biometrics-based authentication systems.***IBM Systems Journal*2001,**40**(3):614-634.View ArticleGoogle Scholar - Stallings W:
*Cryptology and Network Security: Principles and Practices*. 3rd edition. Prentice Hall, Upper Saddle River, NJ, USA; 2003.Google Scholar - Nam J, Lee Y, Kim S, Won D:
**Security weakness in a three-party pairing-based protocol for password authenticated key exchange.***Information Sciences*2007,**177**(6):1364-1375. 10.1016/j.ins.2006.09.001MATHMathSciNetView ArticleGoogle Scholar - Juels A, Sudan M:
**A fuzzy vault scheme.***Proceedings of the IEEE International Symposium on Information Theory, June-July 2002, Lausanne, Switzerland*408.View ArticleGoogle Scholar - Uludag U, Pankanti S, Jain AK:
**Fuzzy vault for fingerprints.**In*Proceedings of the 5th Audio- and Video-Based Biometric Person Authentication (AVBPA '05), July 2005, Hilton Rye Town, NY, USA, Lecture Notes in Computer Science*.*Volume 3546*. Springer; 310-319.View ArticleGoogle Scholar - Davida GI, Frankel Y, Matt BJ:
**On enabling secure applications through off-line biometric identification.***Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, May 1998, Oakland, Calif, USA*148-157.Google Scholar - Sautar C, Roberge D, Stoianov A, Gilroy R, Vijaya Kumar BVK:
**Biometric encryption.***Information Management and Computer Security*2001,**9**(5):205-212. 10.1108/09685220110408022View ArticleGoogle Scholar - Monrose F, Reiter MK, Wetzel S:
**Password hardening based on keystroke dynamics.***Proceedings of the 6th ACM Conference on Computer and Communications Security, 1999*73-82.Google Scholar - Connie T, Teoh A, Goh M, Ngo D:
**PalmHashing: a novel approach for cancelable biometrics.***Information Processing Letters*2005,**93**(1):1-5. 10.1016/j.ipl.2004.09.014MathSciNetView ArticleGoogle Scholar - Kong A, Cheung K-H, Zhang D, Kamel M, You J:
**An analysis of BioHashing and its variants.***Pattern Recognition*2006,**39**(7):1359-1368. 10.1016/j.patcog.2005.10.025MATHView ArticleGoogle Scholar - http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci213673,00.html
- http://world.std.com/~franl/crypto/one-time-pad.html
- Wu X, Zhang D, Wang K:
**A palmprint cryptosystem.***Proceedings of IAPR/IEEE International Conference on Biometrics (ICB '07), August 2007, Lecture Notes in Computer Science***4642:**1035-1042.Google Scholar - Juel A, Wttenberg M:
**A fuzzy vault commitment scheme.**In*Proceedings of the 6th ACM Conference on Computer and Communications Security, 2002*Edited by: Tsudik G. 408-412.Google Scholar - Uludag U, Jain AK:
**Fuzzy fingerprint vault.***Proceedings of Biometrics: Challenges Arising from Theory and Practice, August 2004, Cambridge, UK*13-16.Google Scholar - Nandakumar K, Jain AK, Pankanti S:
**Fingerprint-based fuzzy vault: implementation and performance.***IEEE Transactions on Information Forensics and Security*2007,**2**(4):744-757.View ArticleGoogle Scholar - Hao F, Anderson R, Daugman J:
**Combining crypto with biometrics effectively.***IEEE Transactions on Computers*2006,**55**(9):1081-1088.View ArticleGoogle Scholar - Calancy TC, Kiyavash N, Lin DJ:
**Secure smartcard-based fingerprint authentication.***Proceedings of the ACM SIGMM Multimedia Workshop on Biometrics Methods and Applications, 2003, Berkeley, Calif, USA*45-52.Google Scholar - Lin C-H, Lai Y-Y:
**A flexible biometrics remote user authentication scheme.***Computer Standards and Interfaces*2004,**27**(1):19-23. 10.1016/j.csi.2004.03.003View ArticleGoogle Scholar - Kumar A, Kumar A:
**A palmprint-based cryptosystem using double encryption.***Biometric Technology for Human Identification V, March 2008, Orlando, Fla, USA, Proceedings of SPIE***6944:**1-9.Google Scholar - RSA algorithm http://www.di-mgt.com.au/rsa_alg.html
- http://pajhome.org.uk/crypt/rsa/maths.html
- Nishimura KA, Wenstrand SJ, Panotopoulos G: Biometric identification device. European patent EP1760667, July 2007Google Scholar
- http://www.wipo.int/pctdb/en/wo.jsp?wo=2001092994&IA;=WO2001092994&DISPLAY;=DESC
- Dent PW: Cryptographic method and system for double encryption of messages. US patent no. 6904150, June 2005Google Scholar
- Fischer MJ:
**Cryptography and computer security.**In*Lecture Note-5*. Department Of Computer Science, Yale University; http://zoo.cs.yale.edu/classes/cs467/2006f/attach/ln05.html - Ng H:
**Simple pseudorandom number generator with strengthened double encryption (Cilia).**http://eprint.iacr.org/2005/086.pdf - Immega G, Vlaar T, Vanderkooy G, Tucker K: Method for biometric encryption of email. European patent no. EP1290534, December 2003Google Scholar
- Doh Y-H, Yoon J-S, Choi K-H, Alam MS:
**Optical security system for the protection of personal identification information.***Applied Optics*2005,**44**(5):742-750. 10.1364/AO.44.000742View ArticleGoogle Scholar - Liu Z, Liu S:
**Double image encryption based on iterative fractional Fourier transform.***Optics Communications*2007,**275**(2):324-329. 10.1016/j.optcom.2007.03.039View ArticleGoogle Scholar - Goh A, Ngo DCL:
**Computation of cryptographic keys from face biometrics.**In*Communications and Multimedia Security, Lecture Notes in Computer Science*.*Volume 2828*. Springer, Berlin, Germany; 2003:1-13. 10.1007/978-3-540-45184-6_1Google Scholar - Kumar A, Zhang D:
**Personal authentication using multiple palmprint representation.***Pattern Recognition*2005,**38**(10):1695-1704. 10.1016/j.patcog.2005.03.012View ArticleGoogle Scholar - Kong A, Zhang D:
**Compititive coding scheme for palmprint verification.***Proceedings of the International Conference on Pattern Recognition (ICPR '04), August 2004***1:**520-523.Google Scholar - Kumar A:
**Incorporating cohort information for reliable palmprint authentication.***Proceedings of the 6th Indian Conference on Computer Vision, Graphics and Image Processing (ICVGIP '08), December 2008, Bhubaneswar, India*583-590.Google Scholar - Nagar A, Chaudhury S:
**Biometrics based asymmetric cryptosystem design using modified fuzzy vault scheme.***Proceedings of the 18th International Conference on Pattern Recognition (ICPR '06), August 2006, Hong Kong***4:**537-540.View ArticleGoogle Scholar - Kumar A, Wong DCM, Shen HC, Jain AK:
**Personal authentication using hand images.***Pattern Recognition Letters*2006,**27**(13):1478-1486. 10.1016/j.patrec.2006.02.021View ArticleGoogle Scholar - http://islab.oregonstate.edu/koc/ece575/02Project/Kie+Raj
- Feng H, Wah CC:
**Private key generation from on-line handwritten signatures.***Information Management and Computer Security*2002,**10**(4):159-164. 10.1108/09685220210436949View ArticleGoogle Scholar - Monrose F, Reiter MK, Li Q, Wetzel S:
**Cryptographic key generation from voice.***Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, May 2001*202-213.Google Scholar - Monrose F, Reiter MK, Wetzel R:
**Password hardening based on keystroke dynamics.***International Journal of Information and Computer Security*1999,**1**(2):69-83.View ArticleGoogle Scholar

## Copyright

This article is published under license to BioMed Central Ltd. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.