- Research Article
- Open Access
Development of a New Cryptographic Construct Using Palmprint-Based Fuzzy Vault
© A. Kumar and A. Kumar. 2009
- Received: 7 October 2008
- Accepted: 16 July 2009
- Published: 8 September 2009
The combination of cryptology and biometrics has emerged as promising component of information security. Despite the current popularity of palmprint biometric, there has not been any attempt to investigate its usage for the fuzzy vault. This paper therefore investigates the possible usage of palmprint in fuzzy vault to develop a user friendly and reliable crypto system. We suggest the use of both symmetric and asymmetric approach for the encryption. The ciphertext of any document is generated by symmetric cryptosystem; the symmetric key is then encrypted by asymmetric approach. Further, Reed and Solomon codes are used on the generated asymmetric key to provide some error tolerance while decryption. The experimental results from the proposed approach on the palmprint images suggest its possible usage in an automated palmprint-based key generation system.
- Discrete Cosine Transform
- Secret Message
- Advance Encryption Standard
- Equal Error Rate
- False Acceptance Rate
Hacking of the information is widely considered as one of the potential attacks on any secure system. Authentication systems should be designed to withstand such attacks when deployed for critical security applications such as e-commerce and accesses to restricted data/buildings. Biometric-based authentication is considered as one of the most secured systems whenever high privacy is demanded. However, such authentication systems itself follow stepwise procedural algorithms, like feature extraction, matching, classification, and so forth, for authentication/verification purposes . As biometric templates are required at each step, it increases the possibilities of intrusion at every step and requires additional security management . For instance, even a most secure authentication system is not reliable if it cannot defy the attacks on the stored database, or if an intruder can intercept the template features generated from the biometric traits. Recent research efforts have developed some promising ideas to resist attacks on biometric authentication system. One of such proposed solutions is to cancel the tainted biometric features and regenerate the new one for authentication purposes (also known as cancelable biometric ). BioHashing technique is frequently used to transform (noninvertible) biometric template into some other representations using one-way hash functions. This reissuance of the biometric templates can withstand the attacks on stored templates and widely accepted as a solution to the intrusion in extracted features. The most acknowledgeable work in this area is to provide cryptography-based security at different stages of biometric authentication. Cryptography is one of the most effective ways to enhance the security of the information system via its encryption and decryption modules . Even so, the weakest link of cryptography-based security systems is the associated secret key. While the simple memorized key can be easily intercepted, a long and complex key needs extra storage management like tokens, smart cards, and so forth. Consequently, the smart card-based solutions came in existence. To provide an aid to security, the cryptographic keys are now stored somewhere (e.g., in a computer or on a smart card) and released based on some alternative authentication mechanism. The most popular mechanism used for this purpose is password-based security , which is again a long string and difficult to make secure, as now the whole security depends upon the password given, used for authentication.
As a solution, a secure encryption key can be associated with a biometric signature to ensure the integrity and confidentiality of communication in distributed systems. Many of the limitations of the password and PIN-based encryption schemes can be alleviated by using biometric features, which are unique and can be conveniently extracted from every user. The biometric-based encryption requires physical presence of persons to be authenticated and is therefore reliable, convenient, and efficient. The encryption keys can be generated using low-level combination of biometric features and cryptology. Jules and Sudan  have proposed the generation of a secure vault using an unordered set, to lock any secret inside and referred it as fuzzy vault. The concept of fuzzy vault has been further explored by Uludag et al. , where they used fingerprint templates as an unordered set to create the vault around the secret. They further utilizes error correcting codes, such as Reed and Solomon code to produce some error tolerance in the input biometric templates, while decryption module.
However, the motivation to protect secret key involved in cryptographic modules using biometric based fuzzy vault can have several drawbacks due to different cryptographic approaches. While the symmetric cryptographic approaches suffered authentication problems, asymmetric approaches are computationally intensive (as further discussed in Section 3). We, therefore, proposed the combination of both symmetric and asymmetric cryptographic approaches (which is referred to as double encryption in this paper) into the fuzzy vault to meet high-security standard and utilize the advantages of both approaches in a common domain. In the recent years, biometric features such as face, iris, fingerprint, hand geometry, palmprint, and signature have been suggested for the security in access control. Most of the current research in biometrics has been focused on fingerprint and face. The recent research on face recognition has shown some thorny problems regarding pose, lighting, orientation, and gesture which made it less reliable as compared to other biometrics. Fingerprint identification has successfully implemented and widely accepted in most of the cases for recognition purposes. However, it also has difficulties regarding feature extraction. The fingerprint features are very difficult to extract from the elderly, laborer, and handicapped users. As a result, other biometric characteristics are receiving increasing attention. Moreover, additional biometric features, such as palmprint and hand geometry, can be easily integrated with the existing authentication system to provide enhanced level of confidence in personal authentication. We explored the usage of palmprint biometric to create fuzzy vault. The prior works in this area is summarized in Section 2, while the detail of the earlier cryptographic approaches is presented in Section 3. Double encryption is explored in Section 4. The proposed system is discussed in Section 5. The experimental results from the performed approach are summarized in Section 6. This section also includes a summary of related prior work. Finally, the main conclusions from this paper are summarized in Section 7.
The issue of nonrevocable biometric has been investigated by Ratha et al.  by introducing the concept of cancelable biometrics. Davida et al.  proposed majority decoding and error correcting codes-based technique to generate the cancelable biometric features. The approach is further utilized using optical computation techniques in  and using keystroke dynamics in . Sautar et al.  were the first to commercialize the concept in to their product bioscrypt. They applied Fourier transform and majority coding to reduce the feature variation. A predefined random key is locked by biometric sample using phase angle product, and this product can be further unlocked by other genuine biometrics. The performance analysis is however not reported. Connie et al.  used the concept of BioHashing by calculating fisherprojections. However, the results shown by them are based on the assumption that the generated token or keys will be never stolen or shared. This is quite unrealistic and creates doubts about real evaluation. The study of such unrealistic evaluation has been presented by Kong et al. in . One of the innovative works proposed in this area is by , where the authors utilized random orientation field into the feature extractor to generate cancelable competitive codes. The authors further considered all the three attacks possible (template reissuance, replay attacks, and database attacks) to provide a complete secure system. To protect the generated cancelable competitive codes (replay attacks) , the idea of one-time pad (OTP) ciphers is explored. The OTP  is a symmetric cipher (same key is used for both encryption and decryption) generated by applying XOR between the randomly generated key and the plaintext. The decryption can be done using the matched OTP and the key (used for encryption). The advantage with OTP is that each encryption is independent to the next encryption, and random key can be used only once for encryption. Hence, theoretically there is no way to break such encryption just by analyzing a sequence of message. Although OTP encryption has advantages over other encryption algorithms, still it has some open issues like (i) the key involved for decryption should be identical to encryption once and hence required safe communication of key to the decrypting party ; (ii) the number of bits in the key is same as in the plaintext which makes the algorithm computationally inefficient for encrypting bulk data; (iii) one of the major requirements of the algorithm is that not part or bit of the key should be ever reused in any other encryption; otherwise it is easy to break it . (Synchronized OTP generator can be employed to counter such problems.) Authors in  proposed a new cryptosystem by generating 1024 bits binary string, extracted from the differential operations. The string is then mapped to 128 bits encryption key using a Hash function. The approach is novel and secure in many respects but still has issues to resist against attack on generated encrypting key using Hash function, as raised by Kong et al. in .
In most of the works proposed in literature of cancelable biometrics, security of system depends upon the generated unique code from a particular one-way hash functions. Thus the system is secure till the unique code is not compromised and hence requires extra security management. Juels and Sudan  have presented a promising model which was an improvement on the prior study by Juel and Wttenberg in . They have produced a significant improvement by modifying the Scheme of Davida et al. (in using error correcting code size)  by introducing Reed and Solomon error correcting coding theory in their fuzzy vault. Their contribution is to hide any secret in fuzzy vault using polynomial construction under unordered set. The secret can be retrieved back by polynomial reconstruction, if certain points of the unordered set can be known at receiving end. The security of the scheme mainly depends upon polynomial construction and reconstruction problem. Uludag et al.  have combined the concept of fuzzy vault with biometrics (fingerprint) by using biometric template as an unordered set. Uludag and Jain  proposed to use minutiae-based features from the fingerprints for locking and unlocking the vault. However, this approach is limited to its usage due to its inability to eliminate the inherent variability in minutiae feature. Nandakumar et al. have attempted to eliminate such variability using helper data and illustrated promising results. Hao et al.  use iris biometric for generating cryptographic keys and a combination of Reed and Solomon and Hadamard error correcting theories for error tolerance. Calancy et al.  proposed a smart card-based fuzzy vault that employed fingerprints for locking and unlocking. The presumption that acquired fingerprint images are prealigned is not realistic and could be the possible reason for high false rejection rate (30.0%) reported in the paper. Lin and Lai  have done remarkable work in order to prevent repudiation but their work still required smart card and password for better implementation and hence reduces its usability. Recently, a modified fuzzy vault scheme is proposed in  using asymmetric cryptosystem. Having generated RSA public and private keys, authors have used Reed-Solomon coding to convert the keys in to codes. Further they used two grids, one for codes and the other for biometric features. The elements in the corresponding grids are in same positions. The unlocking of vault only requires the knowledge of the correct positions of the numbers in any of the grids. However, this approach utilizes the asymmetric cryptosystem and has all the problems associated with such systems. Moreover, the database used for the experimental evaluation is too small (9 users) to generate any reliable conclusion on the performance. In summary, a different range of biometrics has been used for fuzzy vaults in literature. However, with few notable exceptions, for example, [15, 19], with small false rejection rates, the average FAR of 15% has been cited.
In contrast to prior work in this area, we proposed  fuzzy vault-based security to withstand the attacks on secret key employing palmprint. The secret document/information can be first encrypted using double encryption. The symmetric key approach can be easily employed to encrypt bulk data. The attacks on security of symmetric key (secure communication, authentication, as detailed in Sections 3.1.1 and 3.1.2 in this paper) are reduced by encrypting it again using asymmetric cryptographic approach. Finally, the private key of asymmetric approach (at the end of double encryption) is protected by creating fuzzy vault around it. The approach is to firstly employ double encryption to strengthen the security system and reduce the shortcomings associated with both symmetric and asymmetric cryptographic approaches and finally to utilize the palmprint features to create fuzzy vault around the key at the end of double encryption.
The main contributions of this paper can be summarized as follows. Firstly, this paper investigates a new approach for fuzzy vault using palmprint biometric. Secondly, unlike prior work in literature, this paper proposes a combined cryptosystem which successfully exhibits the advantage of both symmetric and asymmetric cryptography. It may be noted that the asymmetric approach (RSA, named as initials of Ron Rivest, Adi Shamir, and Leonard Adleman) for encryption has been estimated to be very slow as compared to traditional symmetric approach (Data Encryption Standard, abbreviated as DES) . Therefore the proposed approach is to use symmetric cryptography to encrypt the entire document and then we encrypted symmetric key using asymmetric (RSA) approach. The palmprint-based fuzzy vault is then constructed around decryption key. Finally, we investigate the performance of the palmprint-based cryptosystem on a large dataset and achieve promising results.
The objective of this work is to incorporate both symmetric and asymmetric cryptographic approaches into the fuzzy vault in order to ensure higher security and utilize the advantages of both systems in a common domain. This is referred to as double encryption. The approach is to use symmetric key approach (DES) for encrypting the secret document, and the generated symmetric key is again encrypted by asymmetric approach (RSA). In the next subsections, both symmetric and asymmetric approaches are briefly introduced, and then the proposed approach utilizing the combination of both approaches is discussed.
3.1. The Symmetric Cryptosystem
The symmetric approach is most commonly used cryptosystem, as the system is easy to implement and more importantly it has very fast encryption speed . Symmetric algorithms, such as, DES, Triple DES, and Rijndael , provide efficient and powerful cryptographic solutions, especially for encrypting bulk data. Let be the secret message required to be hidden by source A(Lucie). The m letters of message are alphabets. The message is intended to B( Bryan). Lucie generates its symmetric key, say , and uses this key to lock secret message X:
In the presented work we have used advance encryption standard (AES) as a symmetric cryptosystem, which is advanced version of data encryption standard (DES). The AES is symmetric key-based cryptosystem which is based on the principle of block and substitution cipher. The AES algorithm uses substitution boxes, polynomial matrices, and symmetric key to convert a plain text to cipher text. These are the parameter for AES cryptosystem and required to be generated first before the encryption module . Although symmetric key algorithm is very fast and efficient in bulk data encryption, it can sometimes fail to ensure high-security requirements. There are few shortcomings with the usage of symmetric key cryptography. We now detail the problems associated with symmetric key algorithms.
3.1.1. The Problems behind Authentication
Ensuring the integrity of received data and verifying the identity of the source of that data is of major concern to ensure the security in data communication. A symmetric key can be used to check the identity of the individual, as it requires the presence of symmetric key, but this authentication scheme can have some problems involving trust. The problem is that this scheme cannot discriminate between the two individuals who know the shared key. For example, any person having control on Lucie's private particulars can make any fraud message to her pals by pretending himself as Lucie. This not only allows intruder to do any unauthorized work in place of Lucie but also creates problems for other related persons. This uncertainty with symmetric approaches made them useless whenever high confidentiality required in the communication system. The above discussed issues can lead to the position where there is no stand to deny if the disputes were to arise. The relevant example is of repudiation when Lucie's friend renews the contract signed by Lucie without telling her and repudiates from the fact by claiming that someone else might have stolen the key from Lucie to sign the contract. This concludes the key point that the communication system must present nonrepudiation between communicating parties. The major weakness with symmetric approach is that they sometimes fail to authenticate persons in communication.
3.1.2. The Problems behind Security of Key
The other problem associated with this system is to ensure the security of the involved symmetric key and how to exchange it safely. The security of a signed document depends upon the secret key involved as only secret key can ensure the decryption of this document. Thus for a secure communication system the secret key should be exchanged safely. One of the shortcomings of the cryptographic approaches is that they do not emphasize on key exchange problems. The asymmetric approaches such as RSA, DSA, and ECC are very good substitution of symmetric approach as it eliminates many of its shortcomings. Both of the above discussed problems can be alleviate by using asymmetric approach.
3.2. The Asymmetric Cryptosystem
The intended receiver in the position to matching is able to invert above using the following transformation:
In this work, we have used RSA cryptosystem which is the most commonly used asymmetric approach. A traditional RSA algorithm  requires two randomly generated prime numbers . For the security of RSA algorithm, the prime numbers should be bigger (512 bit in our case) and randomly chosen. Any secret encrypted using public key can only be decrypted by using private key and vice versa. The main points involved in encryption and decryption are as follows.
obtains the recipient Bryan's public key,
represents the plaintext message as a positive integer,
computes the ciphertext,
sends the ciphertext to Bryan.
uses his private key to compute positive integer,
extracts the plaintext from the integer representative.
Using RSA algorithm, asymmetric cryptosystem can be employed to solve a number of problems regarding symmetric cryptographic approach. But as compared to symmetric approach, asymmetric approach also has few drawbacks.
3.2.1. The Problems behind RSA
The private and public key approach of RSA cryptosystem can be substitute of the key exchange problem involved with symmetric approaches, but the major problem regarding this approach is the distribution of public keys. Having signed the secret document with Bryan's secret key, Alice must ensure that the public key available is really Bryan's key but not of intruder Carol. The management and security of private key is also a major concern. The other important problem with asymmetric cryptography is that the processing requires intense use of the central processing unit as it is computationally intensive and requires a lot of mathematical computations. This may be a real problem when several simultaneous sessions are required. The asymmetric approaches like RSA, DSA, and so forth are generally known to be slower (about 100 times slower)  than symmetric approaches like DES, AES, and so forth. As a conclusion one can argue that the symmetric cryptography is highly suitable for encrypting and decrypting the bulk of messages on data lines. However, the associated problem of providing all the recipients with an advanced copy of secret key can be expensive and hazardous. The insecurity associated with the distribution of all the necessary secret keys to all the recipients on a regular basis is very high. In summary, working with RSA cryptosystem can certainly eliminate several drawbacks associated with symmetric approaches. However, this cryptosystem still has some problems regarding complexity of algorithm as it works very slowly (whenever a bulk data encryption is required) due to the fact that it is mathematically intensive and requires extra management for public keys.
One way to alleviate above discussed problems associated with the symmetric and asymmetric cryptographic approaches is to use double encryption. A secret message is encrypted using fast symmetric algorithm; the secret key is then encrypted using asymmetric cryptography; the Ciphertext (encrypted message) and the encrypted keys are finally sent to the recipient. Asymmetric cryptography is slow (computationally intensive), but not too slow to encrypt such a small (as compared to secret message) bits as a symmetric encryption key. Upon receipt, the recipient can easily use his/her private asymmetric key to decrypt the symmetric key. Further that symmetric key can be used to quickly decrypt the message file. This idea not only resolves the problem using both approaches but is also more computationally sound.
4.1. Why Double Encryption?
Most of the problems regarding symmetric/asymmetric approaches can be remedied using double encryption. The advantages of the symmetric approaches are utilized to encrypt bulk of the data, while asymmetric approaches are used to provide authentication/verification to secure communication (as discussed in Sections 3.1.1 and 3.1.2 symmetric approaches are sometimes fail in authentication purposes). Using double encryption, a message (may be bulk data) can be encrypted by symmetric key approach, while the key is again encrypted by public/private keys of asymmetric approach. Once the message is encrypted by public key of recipients, it can only be decrypted by its private key. This ensures a safe communication between the source and the verified/authenticated recipient. On the other hand, if the message is encrypted by private key of the recipient, it can only be decrypted by corresponding public key (which is publicly available). This process authenticates the source of encryption and therefore prevents any possible repudiation or denial from the message generator.
4.2. Prior Work in Double Encryption
The concept of double encryption is not new in cryptographic literature [25–27]. However, most of the related work is centered on the implementation of cryptographic encryption and decryption modules [28–30]. Some of these notable efforts can now be outlined. Nishimura et al.  in their recent European patent have detailed the concept of encrypting symmetric key with public and private keys of asymmetric approach. Their developed approach ensures that when a doubly-encrypted message is received, it is sent by a particular/authenticated user; also the recipient of this message is a specific/verified user(s). Doh et al.  have presented double encryption-based optical security system. They have utilized the facial images by using random-phase patterns in the spatial plane and the Fourier plane and a personal information image consisting of a personal identification number (PIN). With the recognition of PIN, the authentication of the encrypted personal identification card has done by primary classification and recognition of the PIN with the proposed multiplexed MACE phase-encrypted filter. In this technique, the possibility of spoofing is significantly decreased using the double-identification process. Z. Liu and S. Liu  proposed Double image encryption based on iterative fractional Fourier transform. They used to encrypt two different images into a single one simultaneously by their amplitudes of fractional Fourier transform with different orders.
In contrast to proposed double encryption schemes, we explored this concept for fuzzy vault. The combination of cryptographic algorithms with biometrics has been presented in several prior publications, for example, [2, 15, 17–19]. Some of these attempts have been focused to hide the secret information in biometric-based fuzzy vault [17, 18] while others used to generate cryptographic keys using biometrics ([15, 19]) to hide the secret information. Our contribution to literature is that we attempt to hide secret information using double encryption (via symmetric and asymmetric cryptographic approaches). In order to strengthen the cryptographic approaches, we closed the asymmetric key (at the end of double encryption) by creating palmprint-based fuzzy vault around it. Our scheme is quite unique in the sense that, it overcomes any dependency on generated secret key (like [ 11 , 33 ]) in cryptographic approaches and utilized the unique palmprint features to create the fuzzy vault.
4.3. Motivation to Fuzzy Vault
One of the most important applications of double encryption is that it can overcome many of the problems associated with the symmetric key approach (as the symmetric key is again encrypted by asymmetric approach). In addition, the level of security offered by the resulting asymmetric key, at the end of double encryption, is very high and desired to secure the entire system. In the cryptographic literature, security of asymmetric key (at the end of double encryption) is generally questioned as the main/key weakness of the double encryption [ 28 ]. In the proposed approach, we have utilized the concept of fuzzy vault to overcome this shortcoming of double encryption by locking the private key in the vault. This combination of double encryption with biometrics (fuzzy vault) can overcome most of the weaknesses regarding symmetric and asymmetric cryptographic approaches.
Let X denote the dummy message to be encrypted and let be the symmetric key, used to encrypt the document. In order to encrypt the message X, the symmetric key can be generated using AES algorithm. Let the symmetric key be denoted by . Now for making system more secure and overcome the difficulties of symmetric key approach, (key exchange problem, confidentiality, etc.) the generated symmetric key again is encrypted by asymmetric approach using RSA algorithm. Let the public and private keys associated with the RSA cryptosystem are denoted by and . We will use this generated public key for encryption and the generated private key for decryption. Equation (5) summarize the complete procedure:
5.1. Palmprint-Based Fuzzy Vault
One of the key objectives of this work is to investigate the usage of palmprint biometric in the development of a cryptographic construct. The palmprint-based cryptosystem can have higher user acceptance and performance. Despite the recent popularity of palmprint-based systems [34–36], there has not been any attempt to investigate its usage for the fuzzy vault. The palmprint literature has cited number of advantages of palmprint biometric: (i) due to large surface area, the region of interest for palmprint is larger as compared to fingerprint and hence more features can be extracted, (ii) the chances of damaged hand are less than damage fingerprint for a person, (iii) even the presence of very less amount of dirt or grease can affect the performance of fingerprint verification, but having little effect in case of palmprint, and importantly (iv) higher user acceptance for palmprint mainly due to the stigma of fingerprints is associated with criminal investigations.
The double encryption method detailed in previous section incorporates both the ideas of symmetric and asymmetric cryptosystem efficiently and minimizes most of the shortcomings associated with both approaches. The other important concern of the system is the management of private key, as at the end of double encryption security of the entire system depends upon the security of private decryption key. The security to private key can be ensured by the use of well-known concept fuzzy vault detailed in . Using the concept of fuzzy vault, our main goal is to hide this decryption key using biometric features to provide some security to the decryption key and make the whole system tailored for its practical usage. The combination of cryptographic keys with biometric offers several advantages including the fact that this removes the extra key management efforts required by the user and ensures that it is nontransferable. This method of protecting the private key not only makes the usage of smart cards redundant but also makes the user self dependent for its key. The difficulties lie in the fact that the cryptographic algorithm expects that the keys should be highly similar for every attempt for successful access, but it is clearly not the case with a typical biometric. The key is to use suitable coding theory scheme which can tolerate errors. We have used Reed and Solomon (RS) coding scheme for providing some error tolerance while decryption. This error tolerance is essentially required to handle inherent variations in palmprint (biometric) features from the same user during decryption. These variations can be attributed to the scale, orientation, and translational variations in the user palmprint due to peg-free imaging. The RS coding scheme has error correcting capacity of , where is the length of code and k is the length of message, and used to encode decryption key .
5.2. Feature Extraction and Normalization
The standard deviation of DCT coefficients, obtained from each of the overlapping blocks, is used to characterize the region. Thus we obtain a feature vector of 144 values. High degree of intraclass variability in the palmprint features, mainly due to peg-free imaging, poses serious problems in the unlocking of the constructed vault by the genuine. The variability in feature vectors has been reduced with the help of Z-rule normalization. Corresponding to each feature vector, the training images are normalized, and then their mean and standard deviations are used for feature normalization in the test phase. This normalization reduces the interclass variability of the extracted features and very much helpful in fixing the tolerance for fuzzy vault.
Summary of experimental results.
Summary of related prior work.
Error Correction Code
Dynamic time wrapping
RS code and Hadamard Codes
Minutiae points and helper data
100 Users (FVC '02)
Despite the current popularity of palmprint biometric, there has not been any attempt to investigate its usage for the fuzzy vault. This paper  therefore investigated the possible usage of palmprint in fuzzy vault to develop a user friendly and reliable crypto system. The image dataset used for the experiments (85 users) was acquired from unconstrained peg-free setup as such images are more realistic and expected to show large variations.
Our experimental results illustrated the EER up to about 0.3% while achieving the FRR of 0% at 0.35% FAR. However, these results may be less convincing as other approaches [2, 15]; our system is more reliable and robust, as far as attacks on secret key are concerned. The experimental results in BioHashing are dependent upon security of tokenized (pseudo)random number, as reported in  and have to put additional efforts to secure these numbers. In contrast, our emphasis is to strengthen the cryptographic approaches for encryption (the problems with symmetric and asymmetric approach have been discussed earlier in Sections 3.1.1-3.1.2) and withstand the attacks on secret key. Any secret document/information (of any length) can be encrypted by symmetric cryptographic approach (as symmetric approaches such as, DES, and AES are very efficient for the encryption of bulk data) and the secret symmetric key is again encrypted using asymmetric approach (to overcome dependency on secret symmetric key). Finally, the palmprint-based fuzzy vault is created around the private asymmetric key to prevent unauthorized disclosure of the key. At the decryption end, if the input palmprint template is able to open the vault (using matching criteria), the access to private key is granted. The rest is the conventional cryptographic mechanism as the private key is used to decrypt symmetric key and finally the secret document. In fact, we propose a mixed cryptosystem which has advantage over both symmetric and asymmetric cryptography. The advantage of the proposed system lies in that it not only attempts to alleviate the shortcomings of symmetric key-based cryptosystem but also solves the problems involved in asymmetric key-based approach. The approach minifies dependency on secret key involved and alternatively investigates a more secure and promising system, as compared to BioHashing-based techniques.
Performance of the proposed system depends upon choice of tolerance chosen for grid of palmprint features. The increase in tolerance could lead to wrong positions in grid, and hence even the genuine user cannot open the vault, which can result in unacceptably high false rejection rate. The low tolerance value could diminish the fuzziness of grid which can cause the imposters to be accepted and hence increase in false acceptance rate. The optimal range for tolerance value is dependent on the range of palmprint features.
The main consideration is on the construction of palmprint-based fuzzy vault around the private key. The private and public keys are generated on publicly available RSA toolbox . The bit length of modulus , where m, , and l are prime numbers (Section ), is chosen as 1024 bits, and length of the encryption exponent n is 64 bit. The two large primes are chosen to be 512 bits, so that 1024 bit RSA modulus m can be generated. The RSA implementation has utilized the string format to generate the RSA keys and its length varies from 306 to 309 which is equivalent to 1015 to 1024 in binary bits. For the used RSA cryptosystem, the private key sc should be chosen such that it satisfies the following equation:
It can be observed from the above equation that more than one value of n can satisfy the congruence, and hence the length of the generated string (key) can vary. The prime numbers are randomly chosen and so are the values of si and n, and therefore the variations in length of keys are not controlled. In our experiments we have observed and accounted for this variation. Our implementation stores the fixed length key and loads it at the time of generating grids to construct the vault. Therefore Table 1 illustrated all the possible variations in key length and the corresponding performance (EER) with the tolerance value. It can be observed from this table that as the key length varies (in the range 306 to 309), the system has different equal error rates at different tolerances. The minimum equal error rate is achieved when the key length is 307.
This paper has investigated a new approach to construct the cryptographic vault using palmprint features. In order to combine cryptography with palmprint features we have also incorporated the implementation of double encryption. This can efficiently reduce the possibility of hacking within a cryptosystem. The experimental results presented in Section 6 illustrate that the palmprint-based cryptosystem can operate at low EER (0.375%). The summary of the prior work, presented in Table 2, suggests that the palmprint can be used as a promising biometric in the construction of a cryptosystem. However, the work presented in Table 2 is not directly comparable; our motivation is to mere outline the effectiveness of the proposed work. The cryptosystem investigated in this paper employed localized spectral features from the palmprint. The multiple feature representation, such as detailed in , can offer more reliable characterization of features, and therefore cryptosystem based on multiple-palmprint representation can be considered for the extension of this work.
This work was partially supported by the research Grant from the Department of Science and Technology, Government of India (Grant no. 100/IFD/1275/2006-2007).
- Jain AK, Ross A, Prabhakar S: An introduction to biometric recognition. IEEE Transactions on Circuits and Systems for Video Technology 2004,14(1):4-20. 10.1109/TCSVT.2003.818349View ArticleGoogle Scholar
- Kong A, Zhang D, Kamel M: Three measures for secure palmprint identification. Pattern Recognition 2008,41(4):1329-1337. 10.1016/j.patcog.2007.09.002View ArticleGoogle Scholar
- Ratha NK, Connell JH, Bolle RM: Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal 2001,40(3):614-634.View ArticleGoogle Scholar
- Stallings W: Cryptology and Network Security: Principles and Practices. 3rd edition. Prentice Hall, Upper Saddle River, NJ, USA; 2003.Google Scholar
- Nam J, Lee Y, Kim S, Won D: Security weakness in a three-party pairing-based protocol for password authenticated key exchange. Information Sciences 2007,177(6):1364-1375. 10.1016/j.ins.2006.09.001MATHMathSciNetView ArticleGoogle Scholar
- Juels A, Sudan M: A fuzzy vault scheme. Proceedings of the IEEE International Symposium on Information Theory, June-July 2002, Lausanne, Switzerland 408.View ArticleGoogle Scholar
- Uludag U, Pankanti S, Jain AK: Fuzzy vault for fingerprints. In Proceedings of the 5th Audio- and Video-Based Biometric Person Authentication (AVBPA '05), July 2005, Hilton Rye Town, NY, USA, Lecture Notes in Computer Science. Volume 3546. Springer; 310-319.View ArticleGoogle Scholar
- Davida GI, Frankel Y, Matt BJ: On enabling secure applications through off-line biometric identification. Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, May 1998, Oakland, Calif, USA 148-157.Google Scholar
- Sautar C, Roberge D, Stoianov A, Gilroy R, Vijaya Kumar BVK: Biometric encryption. Information Management and Computer Security 2001,9(5):205-212. 10.1108/09685220110408022View ArticleGoogle Scholar
- Monrose F, Reiter MK, Wetzel S: Password hardening based on keystroke dynamics. Proceedings of the 6th ACM Conference on Computer and Communications Security, 1999 73-82.Google Scholar
- Connie T, Teoh A, Goh M, Ngo D: PalmHashing: a novel approach for cancelable biometrics. Information Processing Letters 2005,93(1):1-5. 10.1016/j.ipl.2004.09.014MathSciNetView ArticleGoogle Scholar
- Kong A, Cheung K-H, Zhang D, Kamel M, You J: An analysis of BioHashing and its variants. Pattern Recognition 2006,39(7):1359-1368. 10.1016/j.patcog.2005.10.025MATHView ArticleGoogle Scholar
- Wu X, Zhang D, Wang K: A palmprint cryptosystem. Proceedings of IAPR/IEEE International Conference on Biometrics (ICB '07), August 2007, Lecture Notes in Computer Science 4642: 1035-1042.Google Scholar
- Juel A, Wttenberg M: A fuzzy vault commitment scheme. In Proceedings of the 6th ACM Conference on Computer and Communications Security, 2002 Edited by: Tsudik G. 408-412.Google Scholar
- Uludag U, Jain AK: Fuzzy fingerprint vault. Proceedings of Biometrics: Challenges Arising from Theory and Practice, August 2004, Cambridge, UK 13-16.Google Scholar
- Nandakumar K, Jain AK, Pankanti S: Fingerprint-based fuzzy vault: implementation and performance. IEEE Transactions on Information Forensics and Security 2007,2(4):744-757.View ArticleGoogle Scholar
- Hao F, Anderson R, Daugman J: Combining crypto with biometrics effectively. IEEE Transactions on Computers 2006,55(9):1081-1088.View ArticleGoogle Scholar
- Calancy TC, Kiyavash N, Lin DJ: Secure smartcard-based fingerprint authentication. Proceedings of the ACM SIGMM Multimedia Workshop on Biometrics Methods and Applications, 2003, Berkeley, Calif, USA 45-52.Google Scholar
- Lin C-H, Lai Y-Y: A flexible biometrics remote user authentication scheme. Computer Standards and Interfaces 2004,27(1):19-23. 10.1016/j.csi.2004.03.003View ArticleGoogle Scholar
- Kumar A, Kumar A: A palmprint-based cryptosystem using double encryption. Biometric Technology for Human Identification V, March 2008, Orlando, Fla, USA, Proceedings of SPIE 6944: 1-9.Google Scholar
- RSA algorithm http://www.di-mgt.com.au/rsa_alg.html
- Nishimura KA, Wenstrand SJ, Panotopoulos G: Biometric identification device. European patent EP1760667, July 2007Google Scholar
- Dent PW: Cryptographic method and system for double encryption of messages. US patent no. 6904150, June 2005Google Scholar
- Fischer MJ: Cryptography and computer security. In Lecture Note-5. Department Of Computer Science, Yale University; http://zoo.cs.yale.edu/classes/cs467/2006f/attach/ln05.html
- Ng H: Simple pseudorandom number generator with strengthened double encryption (Cilia). http://eprint.iacr.org/2005/086.pdf
- Immega G, Vlaar T, Vanderkooy G, Tucker K: Method for biometric encryption of email. European patent no. EP1290534, December 2003Google Scholar
- Doh Y-H, Yoon J-S, Choi K-H, Alam MS: Optical security system for the protection of personal identification information. Applied Optics 2005,44(5):742-750. 10.1364/AO.44.000742View ArticleGoogle Scholar
- Liu Z, Liu S: Double image encryption based on iterative fractional Fourier transform. Optics Communications 2007,275(2):324-329. 10.1016/j.optcom.2007.03.039View ArticleGoogle Scholar
- Goh A, Ngo DCL: Computation of cryptographic keys from face biometrics. In Communications and Multimedia Security, Lecture Notes in Computer Science. Volume 2828. Springer, Berlin, Germany; 2003:1-13. 10.1007/978-3-540-45184-6_1Google Scholar
- Kumar A, Zhang D: Personal authentication using multiple palmprint representation. Pattern Recognition 2005,38(10):1695-1704. 10.1016/j.patcog.2005.03.012View ArticleGoogle Scholar
- Kong A, Zhang D: Compititive coding scheme for palmprint verification. Proceedings of the International Conference on Pattern Recognition (ICPR '04), August 2004 1: 520-523.Google Scholar
- Kumar A: Incorporating cohort information for reliable palmprint authentication. Proceedings of the 6th Indian Conference on Computer Vision, Graphics and Image Processing (ICVGIP '08), December 2008, Bhubaneswar, India 583-590.Google Scholar
- Nagar A, Chaudhury S: Biometrics based asymmetric cryptosystem design using modified fuzzy vault scheme. Proceedings of the 18th International Conference on Pattern Recognition (ICPR '06), August 2006, Hong Kong 4: 537-540.View ArticleGoogle Scholar
- Kumar A, Wong DCM, Shen HC, Jain AK: Personal authentication using hand images. Pattern Recognition Letters 2006,27(13):1478-1486. 10.1016/j.patrec.2006.02.021View ArticleGoogle Scholar
- Feng H, Wah CC: Private key generation from on-line handwritten signatures. Information Management and Computer Security 2002,10(4):159-164. 10.1108/09685220210436949View ArticleGoogle Scholar
- Monrose F, Reiter MK, Li Q, Wetzel S: Cryptographic key generation from voice. Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, May 2001 202-213.Google Scholar
- Monrose F, Reiter MK, Wetzel R: Password hardening based on keystroke dynamics. International Journal of Information and Computer Security 1999,1(2):69-83.View ArticleGoogle Scholar
This article is published under license to BioMed Central Ltd. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.