Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (18)

Search Parameters:
Keywords = cancellable biometrics

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
31 pages, 382 KiB  
Article
The Emerging Challenges of Wearable Biometric Cryptosystems
by Khalid Al Ajlan, Tariq Alsboui, Omar Alshaikh, Isa Inuwa-Dute, Saad Khan and Simon Parkinson
Cryptography 2024, 8(3), 27; https://doi.org/10.3390/cryptography8030027 - 21 Jun 2024
Viewed by 2627
Abstract
Cryptographic key generation and data encryption and decryption using wearable biometric technologies is an emerging research area with significant potential for authentication and communication security. The research area is rapidly developing, and a comprehensive review of recently published literature is necessary to establish [...] Read more.
Cryptographic key generation and data encryption and decryption using wearable biometric technologies is an emerging research area with significant potential for authentication and communication security. The research area is rapidly developing, and a comprehensive review of recently published literature is necessary to establish emerging challenges. This research article aims to critically investigate and synthesize current research using biometric cryptosystems that use behavior or medico-chemical characteristics, ranging from gate analysis to gaze tracking. The study will summarize the state of knowledge, identify critical research gaps, and provide insight into promising future implications and applications that can enable the realization of user-specific and resilient solutions for authentication and secure communication demands. Full article
Show Figures

Figure 1

17 pages, 1554 KiB  
Article
A Hybrid Protection Scheme for the Gait Analysis in Early Dementia Recognition
by Francesco Castro, Donato Impedovo and Giuseppe Pirlo
Sensors 2024, 24(1), 24; https://doi.org/10.3390/s24010024 - 19 Dec 2023
Cited by 2 | Viewed by 1987
Abstract
Human activity recognition (HAR) through gait analysis is a very promising research area for early detection of neurodegenerative diseases because gait abnormalities are typical symptoms of some neurodegenerative diseases, such as early dementia. While working with such biometric data, the performance parameters must [...] Read more.
Human activity recognition (HAR) through gait analysis is a very promising research area for early detection of neurodegenerative diseases because gait abnormalities are typical symptoms of some neurodegenerative diseases, such as early dementia. While working with such biometric data, the performance parameters must be considered along with privacy and security issues. In other words, such biometric data should be processed under specific security and privacy requirements. This work proposes an innovative hybrid protection scheme combining a partially homomorphic encryption scheme and a cancelable biometric technique based on random projection to protect gait features, ensuring patient privacy according to ISO/IEC 24745. The proposed hybrid protection scheme has been implemented along a long short-term memory (LSTM) neural network to realize a secure early dementia diagnosis system. The proposed protection scheme is scalable and implementable with any type of neural network because it is independent of the network’s architecture. The conducted experiments demonstrate that the proposed protection scheme enables a high trade-off between safety and performance. The accuracy degradation is at most 1.20% compared with the early dementia recognition system without the protection scheme. Moreover, security and computational analyses of the proposed scheme have been conducted and reported. Full article
(This article belongs to the Special Issue Human Activity Recognition in Smart Sensing Environment)
Show Figures

Figure 1

18 pages, 1966 KiB  
Article
Encrypt with Your Mind: Reliable and Revocable Brain Biometrics via Multidimensional Gaussian Fitted Bit Allocation
by Ming Li, Yu Qi and Gang Pan
Bioengineering 2023, 10(8), 912; https://doi.org/10.3390/bioengineering10080912 - 1 Aug 2023
Viewed by 1388
Abstract
Biometric features, e.g., fingerprints, the iris, and the face, have been widely used to authenticate individuals. However, most biometrics are not cancellable, i.e., once these biometric features are cloned or stolen, they cannot be replaced easily. Unlike traditional biometrics, brain biometrics are extremely [...] Read more.
Biometric features, e.g., fingerprints, the iris, and the face, have been widely used to authenticate individuals. However, most biometrics are not cancellable, i.e., once these biometric features are cloned or stolen, they cannot be replaced easily. Unlike traditional biometrics, brain biometrics are extremely difficult to clone or forge due to the natural randomness across different individuals, which makes them an ideal option for identity authentication. Most existing brain biometrics are based on electroencephalogram (EEG), which is usually demonstrated unstable performance due to the low signal-to-noise ratio (SNR). For the first time, we propose the use of intracortical brain signals, which have higher resolution and SNR, to realize the construction of the high-performance brain biometrics. Specifically, we put forward a novel brain-based key generation approach called multidimensional Gaussian fitted bit allocation (MGFBA). The proposed MGFBA method extracts keys from the local field potential of ten rats with high reliability and high entropy. We found that with the proposed MGFBA, the average effective key length of the brain biometrics was 938 bits, while achieving high authentication accuracy of 88.1% at a false acceptance rate of 1.9%, which is significantly improved compared to conventional EEG-based approaches. In addition, the proposed MGFBA-based keys can be conveniently revoked using different motor behaviors with high entropy. Experimental results demonstrate the potential of using intracortical brain signals for reliable authentication and other security applications. Full article
(This article belongs to the Section Biosignal Processing)
Show Figures

Figure 1

19 pages, 5265 KiB  
Article
A Cancelable Biometric System Based on Deep Style Transfer and Symmetry Check for Double-Phase User Authentication
by Ahmed Sedik, Ahmed A. Abd El-Latif, Mohammed El-Affendi and Hala Mostafa
Symmetry 2023, 15(7), 1426; https://doi.org/10.3390/sym15071426 - 15 Jul 2023
Cited by 10 | Viewed by 2614
Abstract
In recent times, there has been a noticeable increase in the application of human biometrics for user authentication in various domains, such as online banking. However, the use of biometric systems poses security risks and the potential for misuse, primarily due to the [...] Read more.
In recent times, there has been a noticeable increase in the application of human biometrics for user authentication in various domains, such as online banking. However, the use of biometric systems poses security risks and the potential for misuse, primarily due to the storage of original templates in databases. To tackle this issue, the concept of cancelable biometrics has emerged as a reliable method utilizing one-way encryption. Several algorithms have been developed to implement cancelable biometrics, incorporating visual representations of single or multiple biometrics. This research proposes a cancelable biometric system that utilizes deep learning techniques to generate two encrypted modalities, namely text and image, using facial and fingerprint biometrics acquired from a smartphone. The system consists of two main stages: a visual encoder and a text encoder. The visual encoder converts the fingerprint style into a facial representation, creating a cancelable template to ensure the potential for cancelation. The resulting visual template is then processed by the text encoder, which employs hashing techniques to generate a corresponding text template. User authentication is automatically verified by utilizing the generated templates through Siamese networks. Full article
(This article belongs to the Special Issue Symmetry in Multimedia Security)
Show Figures

Figure 1

14 pages, 839 KiB  
Article
Optimal Feature Analysis for Identification Based on Intracranial Brain Signals with Machine Learning Algorithms
by Ming Li, Yu Qi and Gang Pan
Bioengineering 2023, 10(7), 801; https://doi.org/10.3390/bioengineering10070801 - 4 Jul 2023
Cited by 2 | Viewed by 1547
Abstract
Biometrics, e.g., fingerprints, the iris, and the face, have been widely used to authenticate individuals. However, most biometrics are not cancellable, i.e., once these traditional biometrics are cloned or stolen, they cannot be replaced easily. Unlike traditional biometrics, brain biometrics are extremely difficult [...] Read more.
Biometrics, e.g., fingerprints, the iris, and the face, have been widely used to authenticate individuals. However, most biometrics are not cancellable, i.e., once these traditional biometrics are cloned or stolen, they cannot be replaced easily. Unlike traditional biometrics, brain biometrics are extremely difficult to clone or forge due to the natural randomness across different individuals, which makes them an ideal option for identity authentication. Most existing brain biometrics are based on an electroencephalogram (EEG), which typically demonstrates unstable performance due to the low signal-to-noise ratio (SNR). Thus, in this paper, we propose the use of intracortical brain signals, which have higher resolution and SNR, to realize the construction of a high-performance brain biometric. Significantly, this is the first study to investigate the features of intracortical brain signals for identification. Specifically, several features based on local field potential are computed for identification, and their performance is compared with different machine learning algorithms. The results show that frequency domain features and time-frequency domain features are excellent for intra-day and inter-day identification. Furthermore, the energy features perform best among all features with 98% intra-day and 93% inter-day identification accuracy, which demonstrates the great potential of intracraial brain signals to be biometrics. This paper may serve as a guidance for future intracranial brain researches and the development of more reliable and high-performance brain biometrics. Full article
(This article belongs to the Section Biosignal Processing)
Show Figures

Figure 1

26 pages, 9664 KiB  
Article
Efficient Multi-Biometric Secure-Storage Scheme Based on Deep Learning and Crypto-Mapping Techniques
by Ahmed Sedik, Ahmed A. Abd El-Latif, Mudasir Ahmad Wani, Fathi E. Abd El-Samie, Nariman Abdel-Salam Bauomy and Fatma G. Hashad
Mathematics 2023, 11(3), 703; https://doi.org/10.3390/math11030703 - 30 Jan 2023
Cited by 12 | Viewed by 2855
Abstract
Cybersecurity has been one of the interesting research fields that attract researchers to investigate new approaches. One of the recent research trends in this field is cancelable biometric template generation, which depends on the storage of a cipher (cancelable) template instead of the [...] Read more.
Cybersecurity has been one of the interesting research fields that attract researchers to investigate new approaches. One of the recent research trends in this field is cancelable biometric template generation, which depends on the storage of a cipher (cancelable) template instead of the original biometric template. This trend ensures the confidential and secure storage of the biometrics of a certain individual. This paper presents a cancelable multi-biometric system based on deep fusion and wavelet transformations. The deep fusion part is based on convolution (Conv.), convolution transpose (Conv.Trans.), and additional layers. In addition, the deployed wavelet transformations are based on both integer wavelet transforms (IWT) and discrete wavelet transforms (DWT). Moreover, a random kernel generation subsystem is proposed in this work. The proposed kernel generation method is based on chaotic map modalities, including the Baker map and modified logistic map. The proposed system is implemented on four biometric images, namely fingerprint, iris, face, and palm images. Furthermore, it is validated by comparison with other works in the literature. The comparison reveals that the proposed system shows superior performance regarding the quality of encryption and confidentiality of generated cancelable templates from the original input biometrics. Full article
Show Figures

Figure 1

13 pages, 1964 KiB  
Article
Efficient Cancelable Template Generation Based on Signcryption and Bio Hash Function
by Vani Rajasekar, Muzafer Saračević, Darjan Karabašević, Dragiša Stanujkić, Eldin Dobardžić and Sathya Krishnamoorthi
Axioms 2022, 11(12), 684; https://doi.org/10.3390/axioms11120684 - 29 Nov 2022
Cited by 2 | Viewed by 2045
Abstract
Cancelable biometrics is a demanding area of research in which a cancelable template conforming to a biometric is produced without degrading the efficiency. There are numerous approaches described in the literature that can be used to generate these cancelable templates. These approaches do [...] Read more.
Cancelable biometrics is a demanding area of research in which a cancelable template conforming to a biometric is produced without degrading the efficiency. There are numerous approaches described in the literature that can be used to generate these cancelable templates. These approaches do not, however, perform well in either the qualitative or quantitative perspective. To address this challenge, a unique cancelable template generation mechanism based on signcryption and bio hash function is proposed in this paper. Signcryption is a lightweight cryptographic approach that uses hyper elliptic curve cryptography for encryption and a bio hash function for generating signatures in this proposed method. The cancelable templates are generated from iris biometrics. The hybrid grey level distancing method is used for perfect iris feature extraction for the CASIA and IITD datasets. The proposed approach is compared against the existing state-of-the-art cancelable techniques. The resulting analysis reveals that the proposed method is efficient in terms of accuracy of 98.86%, with lower EER of 0.1%. The average minimum TPR and TNR of the proposed method is about 99.81%. Full article
Show Figures

Figure 1

16 pages, 690 KiB  
Article
A Secure Online Fingerprint Authentication System for Industrial IoT Devices over 5G Networks
by Aseel Bedari, Song Wang and Wencheng Yang
Sensors 2022, 22(19), 7609; https://doi.org/10.3390/s22197609 - 7 Oct 2022
Cited by 10 | Viewed by 4098
Abstract
The development of 5G networks has rapidly increased the use of Industrial Internet of Things (IIoT) devices for control, monitoring, and processing purposes. Biometric-based user authentication can prevent unauthorized access to IIoT devices, thereby safeguarding data security during production. However, most biometric authentication [...] Read more.
The development of 5G networks has rapidly increased the use of Industrial Internet of Things (IIoT) devices for control, monitoring, and processing purposes. Biometric-based user authentication can prevent unauthorized access to IIoT devices, thereby safeguarding data security during production. However, most biometric authentication systems in the IIoT have no template protection, thus risking raw biometric data stored as templates in central databases or IIoT devices. Moreover, traditional biometric authentication faces slow, limited database holding capacity and data transmission problems. To address these issues, in this paper we propose a secure online fingerprint authentication system for IIoT devices over 5G networks. The core of the proposed system is the design of a cancelable fingerprint template, which protects original minutia features and provides privacy and security guarantee for both entity users and the message content transmitted between IIoT devices and the cloud server via 5G networks.Compared with state-of-the-art methods, the proposed authentication system shows competitive performance on six public fingerprint databases, while saving computational costs and achieving fast online matching. Full article
(This article belongs to the Special Issue 5G and beyond Communication Networks in Industry 4.0)
Show Figures

Figure 1

20 pages, 7182 KiB  
Article
Efficient Generation of Cancelable Face Templates Based on Quantum Image Hilbert Permutation
by Hesham Alhumyani, Ghada M. El-Banby, Hala S. El-Sayed, Fathi E. Abd El-Samie and Osama S. Faragallah
Electronics 2022, 11(7), 1040; https://doi.org/10.3390/electronics11071040 - 26 Mar 2022
Cited by 9 | Viewed by 2573
Abstract
The pivotal need to identify people requires efficient and robust schemes to guarantee high levels of personal information security. This paper introduces an encryption algorithm to generate cancelable face templates based on quantum image Hilbert permutation. The objective is to provide sufficient distortion [...] Read more.
The pivotal need to identify people requires efficient and robust schemes to guarantee high levels of personal information security. This paper introduces an encryption algorithm to generate cancelable face templates based on quantum image Hilbert permutation. The objective is to provide sufficient distortion of human facial biometrics to be stored in a database for authentication requirements through encryption. The strength of the proposed Cancelable Biometric (CB) scheme is guaranteed through the ability to generate cancelable face templates by performing the scrambling operation of the face biometrics after addition of a noise mask with a pre-specified variance and an initial seed. Generating the cancelable templates depends on a strategy with three basic steps: Initialization, Odd module, and Even module. Notably, the proposed scheme achieves high recognition rates based on the Area under the Receiver Operating Characteristic (AROC) curve, with a value up to 99.51%. Furthermore, comparisons with the state-of-the-art schemes for cancelable face recognition are performed to validate the proposed scheme. Full article
(This article belongs to the Special Issue Human Face and Motion Recognition in Video)
Show Figures

Figure 1

20 pages, 4014 KiB  
Article
Multimodal Biometric Template Protection Based on a Cancelable SoftmaxOut Fusion Network
by Jihyeon KIM, Yoon Gyo Jung and Andrew Beng Jin Teoh
Appl. Sci. 2022, 12(4), 2023; https://doi.org/10.3390/app12042023 - 15 Feb 2022
Cited by 21 | Viewed by 3434
Abstract
Authentication systems that employ biometrics are commonplace, as they offer a convenient means of authenticating an individual’s identity. However, these systems give rise to concerns about security and privacy due to insecure template management. As a remedy, biometric template protection (BTP) has been [...] Read more.
Authentication systems that employ biometrics are commonplace, as they offer a convenient means of authenticating an individual’s identity. However, these systems give rise to concerns about security and privacy due to insecure template management. As a remedy, biometric template protection (BTP) has been developed. Cancelable biometrics is a non-invertible form of BTP in which the templates are changeable. This paper proposes a deep-learning-based end-to-end multimodal cancelable biometrics scheme called cancelable SoftmaxOut fusion network (CSMoFN). By end-to-end, we mean a model that receives raw biometric data as input and produces a protected template as output. CSMoFN combines two biometric traits, the face and the periocular region, and is composed of three modules: a feature extraction and fusion module, a permutation SoftmaxOut transformation module, and a multiplication-diagonal compression module. The first module carries out feature extraction and fusion, while the second and third are responsible for the hashing of fused features and compression. In addition, our network is equipped with dual template-changeability mechanisms with user-specific seeded permutation and binary random projection. CSMoFN is trained by minimizing the ArcFace loss and the pairwise angular loss. We evaluate the network, using six face–periocular multimodal datasets, in terms of its verification performance, unlinkability, revocability, and non-invertibility. Full article
(This article belongs to the Special Issue Real-Time Technique in Multimedia Security and Content Protection)
Show Figures

Figure 1

18 pages, 2241 KiB  
Article
Dual Hashing Index Cancellable Finger Vein Template Based on Gaussian Random Mapping
by Xueyou Hu, Liping Zhang, Huabin Wang, Jian Zhou and Liang Tao
Symmetry 2022, 14(2), 258; https://doi.org/10.3390/sym14020258 - 28 Jan 2022
Cited by 4 | Viewed by 2268
Abstract
In the existing cancellable finger vein template protection schemes, the original biometric features cannot be well protected, which results in poor security. In addition, the performance of matching recognition performances after generating a cancellable template is poor. Therefore, a dual hashing index cancellable [...] Read more.
In the existing cancellable finger vein template protection schemes, the original biometric features cannot be well protected, which results in poor security. In addition, the performance of matching recognition performances after generating a cancellable template is poor. Therefore, a dual hashing index cancellable finger vein template protection based on Gaussian random mapping is proposed in this study. The scheme is divided into an enrollment stage and a verification stage. In the two stages, symmetric data encryption technology was used to generate encryption templates for matching. In the enrollment stage, first, the extracted finger vein features were duplicated to obtain an extended feature vector; then, this extended vector was uniformly and randomly permuted to obtain a permutation feature vector. The above two vectors were combined into a two-dimensional feature matrix. The extended and permuted feature vector made full use of the original biometric features and further enhanced the non-invertibility. Second, a random Gaussian projection vector with m×q dimensions was generated, and a random orthogonal projection matrix was generated by the Schmidt orthogonalization of the previously generated random vector. This approach accurately transferred the characteristics of the biometric features to another feature space and ensured that the biological template is revocable. Finally, the inner product of the two-dimensional feature vector and random orthogonal projection matrix was obtained and superimposed into a row. The dual index values of the largest and second largest values were repeated m times to obtain a hash code for matching. The secondary maximum value index was introduced to adjust the error generated by the random matrix, which improved the recognition rate of the algorithm. In the verification stage, another hash code for matching was generated based on symmetric data encryption technology, and then the two hash codes were cross matched to obtain the final matching result. The experimental results show that this scheme attains good recognition performance with the PolyU and SDUMLA-FV databases, that it meets the design standard for cancellable biometric identification, and that it is robust to security and privacy attacks. Full article
Show Figures

Figure 1

15 pages, 2129 KiB  
Article
Cancelable Multimodal Biometrics Based on Chaotic Maps
by Sanaa Ghouzali, Ohoud Nafea, Abdul Wadood and Muhammad Hussain
Appl. Sci. 2021, 11(18), 8573; https://doi.org/10.3390/app11188573 - 15 Sep 2021
Cited by 12 | Viewed by 2325
Abstract
Biometric authentication systems raise certain concerns with regard to security, violation of privacy, and storage issues of biometric templates. This paper proposes a protection approach of biometric templates storage in a multimodal biometric system while ensuring both the cancelability of biometric templates and [...] Read more.
Biometric authentication systems raise certain concerns with regard to security, violation of privacy, and storage issues of biometric templates. This paper proposes a protection approach of biometric templates storage in a multimodal biometric system while ensuring both the cancelability of biometric templates and the efficiency of the authentication process. We propose applying a chaotic maps-based transform on the biometric features to address the cancelability issue. We used Logistic map and Torus Automorphism to generate cancelable biometric features of the face and fingerprint minutia points, respectively. Both transformed features would be concatenated and saved in the database of the system instead of the original features. In the authentication stage, the similarity scores of both transformed face and fingerprint templates are computed and fused using the weighted sum rule. The results of the experimentation, conducted using images from the ORL face and FVC2002 DB1 fingerprint databases, demonstrated the higher performance of the proposed approach achieving a genuine accept rate equal to 100%. Moreover, the obtained results confirmed the soundness of the proposed cancelable technique to satisfy the biometric systems’ requirements (i.e., security, revocability, and diversity). Full article
(This article belongs to the Section Computing and Artificial Intelligence)
Show Figures

Figure 1

21 pages, 10879 KiB  
Article
Real-Time Human Detection and Gesture Recognition for On-Board UAV Rescue
by Chang Liu and Tamás Szirányi
Sensors 2021, 21(6), 2180; https://doi.org/10.3390/s21062180 - 20 Mar 2021
Cited by 90 | Viewed by 15292
Abstract
Unmanned aerial vehicles (UAVs) play an important role in numerous technical and scientific fields, especially in wilderness rescue. This paper carries out work on real-time UAV human detection and recognition of body and hand rescue gestures. We use body-featuring solutions to establish biometric [...] Read more.
Unmanned aerial vehicles (UAVs) play an important role in numerous technical and scientific fields, especially in wilderness rescue. This paper carries out work on real-time UAV human detection and recognition of body and hand rescue gestures. We use body-featuring solutions to establish biometric communications, like yolo3-tiny for human detection. When the presence of a person is detected, the system will enter the gesture recognition phase, where the user and the drone can communicate briefly and effectively, avoiding the drawbacks of speech communication. A data-set of ten body rescue gestures (i.e., Kick, Punch, Squat, Stand, Attention, Cancel, Walk, Sit, Direction, and PhoneCall) has been created by a UAV on-board camera. The two most important gestures are the novel dynamic Attention and Cancel which represent the set and reset functions respectively. When the rescue gesture of the human body is recognized as Attention, the drone will gradually approach the user with a larger resolution for hand gesture recognition. The system achieves 99.80% accuracy on testing data in body gesture data-set and 94.71% accuracy on testing data in hand gesture data-set by using the deep learning method. Experiments conducted on real-time UAV cameras confirm our solution can achieve our expected UAV rescue purpose. Full article
(This article belongs to the Section Sensors and Robotics)
Show Figures

Figure 1

40 pages, 29790 KiB  
Article
Discrete Transforms and Matrix Rotation Based Cancelable Face and Fingerprint Recognition for Biometric Security Applications
by Abeer D. Algarni, Ghada El Banby, Sahar Ismail, Walid El-Shafai, Fathi E. Abd El-Samie and Naglaa F. Soliman
Entropy 2020, 22(12), 1361; https://doi.org/10.3390/e22121361 - 30 Nov 2020
Cited by 53 | Viewed by 3466
Abstract
The security of information is necessary for the success of any system. So, there is a need to have a robust mechanism to ensure the verification of any person before allowing him to access the stored data. So, for purposes of increasing the [...] Read more.
The security of information is necessary for the success of any system. So, there is a need to have a robust mechanism to ensure the verification of any person before allowing him to access the stored data. So, for purposes of increasing the security level and privacy of users against attacks, cancelable biometrics can be utilized. The principal objective of cancelable biometrics is to generate new distorted biometric templates to be stored in biometric databases instead of the original ones. This paper presents effective methods based on different discrete transforms, such as Discrete Fourier Transform (DFT), Fractional Fourier Transform (FrFT), Discrete Cosine Transform (DCT), and Discrete Wavelet Transform (DWT), in addition to matrix rotation to generate cancelable biometric templates, in order to meet revocability and prevent the restoration of the original templates from the generated cancelable ones. Rotated versions of the images are generated in either spatial or transform domains and added together to eliminate the ability to recover the original biometric templates. The cancelability performance is evaluated and tested through extensive simulation results for all proposed methods on a different face and fingerprint datasets. Low Equal Error Rate (EER) values with high AROC values reflect the efficiency of the proposed methods, especially those dependent on DCT and DFrFT. Moreover, a comparative study is performed to evaluate the proposed method with all transformations to select the best one from the security perspective. Furthermore, a comparative analysis is carried out to test the performance of the proposed schemes with the existing schemes. The obtained outcomes reveal the efficiency of the proposed cancelable biometric schemes by introducing an average AROC of 0.998, EER of 0.0023, FAR of 0.008, and FRR of 0.003. Full article
Show Figures

Figure 1

30 pages, 1188 KiB  
Article
Cryptobiometrics for the Generation of Cancellable Symmetric and Asymmetric Ciphers with Perfect Secrecy
by Vicente Jara-Vera and Carmen Sánchez-Ávila
Mathematics 2020, 8(9), 1536; https://doi.org/10.3390/math8091536 - 8 Sep 2020
Cited by 3 | Viewed by 3674
Abstract
Security objectives are the triad of confidentiality, integrity, and authentication, which may be extended with availability, utility, and control. In order to achieve these goals, cryptobiometrics is essential. It is desirable that a number of characteristics are further met, such as cancellation, irrevocability, [...] Read more.
Security objectives are the triad of confidentiality, integrity, and authentication, which may be extended with availability, utility, and control. In order to achieve these goals, cryptobiometrics is essential. It is desirable that a number of characteristics are further met, such as cancellation, irrevocability, unlinkability, irreversibility, variability, reliability, and biometric bit-length. To this end, we designed a cryptobiometrics system featuring the above-mentioned characteristics, in order to generate cryptographic keys and the rest of the elements of cryptographic schemes—both symmetric and asymmetric—from a biometric pattern or template, no matter the origin (i.e., face, fingerprint, voice, gait, behaviour, and so on). This system uses perfect substitution and transposition encryption, showing that there exist two systems with these features, not just one (i.e., the Vernam substitution cipher). We offer a practical application using voice biometrics by means of the Welch periodogram, in which we achieved the remarkable result of an equal error rate of (0.0631, 0.9361). Furthermore, by means of a constructed template, we were able to generate the prime value which specifies the elliptic curve describing all other data of the cryptographic scheme, including the private and public key, as well as the symmetric AES key shared between the templates of two users. Full article
(This article belongs to the Special Issue Mathematics Cryptography and Information Security)
Show Figures

Figure 1

Back to TopTop