CRYPTO KEY GENERATION USING SLICING WINDOW ALGORITHM M.S. Altarawneh, L.C. Khor, W.L. Woo, and S.S. Dlay School of Electrical, Electronic and Computer.

Slides:



Advertisements
Similar presentations
GSM Security Threats and Countermeasures Saravanan Bala Tanvir Ahmed Samuel Solomon Travis Atkison.
Advertisements

Biometrics & Security Tutorial 9. 1 (a) What is palmprint and palmprint authentication? (P10: 9-10)
CS470, A.SelcukCryptographic Authentication1 Cryptographic Authentication Protocols CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Securing Fingerprint Template - Fuzzy Vault with Helper Data
Fuzzy Stuff Lecture 24, Outline Motivation: Biometric Architectures Motivation: Biometric Architectures New Tool (for us): Error Correcting.
Biometrics based Cryptosystem Design. Cryptosystem A mechanism using which one can encode an information content to an incomprehensible form and also.
Fingerprint Verification Bhushan D Patil PhD Research Scholar Department of Electrical Engineering Indian Institute of Technology, Bombay Powai, Mumbai.
Fingerprint Minutiae Matching Algorithm using Distance Histogram of Neighborhood Presented By: Neeraj Sharma M.S. student, Dongseo University, Pusan South.
Activity Recognition Aneeq Zia. Agenda What is activity recognition Typical methods used for action recognition “Evaluation of local spatio-temporal features.
A Low-cost Attack on a Microsoft CAPTCHA Yan Qiang,
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
66: Priyanka J. Sawant 67: Ayesha A. Upadhyay 75: Sumeet Sukthankar.
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
Randomized Radon Transforms for Biometric Authentication via Fingerprint Hashing 2007 ACM Digital Rights Management Workshop Alexandria, VA (USA) October.
Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun.
A Novel Scheme for Video Similarity Detection Chu-Hong Hoi, Steven March 5, 2003.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Introduction to Fingerprint Biometrics By Tamar Bar.
Automatic Fingerprint Matching System Hsing-Hua Yu and Chaur-Chin Chen Department of Computer Science National Tsing Hua University Hsinchu 30013, Taiwan.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Symmetric hash functions for fingerprint minutiae
Efficient fault-tolerant scheme based on the RSA system Author: N.-Y. Lee and W.-L. Tsai IEE Proceedings Presented by 詹益誌 2004/03/02.
Encapsulation Security Payload Protocol Lan Vu. OUTLINE 1.Introduction and terms 2.ESP Overview 3.ESP Packet Format 4.ESP Fields 5.ESP Modes 6.ESP packet.
Comparison and Combination of Ear and Face Images in Appearance-Based Biometrics IEEE Trans on PAMI, VOL. 25, NO.9, 2003 Kyong Chang, Kevin W. Bowyer,
Network Security – Part 2 V.T. Raja, Ph.D., Oregon State University.
Robust Digital Right Management Scheme (DRM) for Multimedia Anuj Maheshwari Victor Sutan
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT Project Members Sanyam Sharma Sunil Mohan Ranta Group No FINGERPRINT.
Introduction to Biometric Systems
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
An Efficient Identity-based Cryptosystem for
CPSC 601 Lecture Week 5 Hand Geometry. Outline: 1.Hand Geometry as Biometrics 2.Methods Used for Recognition 3.Illustrations and Examples 4.Some Useful.
Fingerprint Analysis (part 2) Pavel Mrázek. Local ridge frequency.
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Symmetric hash functions for fingerprint minutiae S. Tulyakov, V. Chavan and V. Govindaraju Center for Unified Biometrics and Sensors SUNY at Buffalo,
Cryptanalysis of a Chaotic Neural Network Based Multimedia Encryption Scheme Chengqing Li a, Shujun Li b, Dan Zhang a and Guanrong Chen b a Zhejiang University,
On The Effectiveness of Kolmogorov Complexity Estimation to Discriminate Semantic Types Presenters: Enkh-Amgalan Baatarjav Kalyan Pathapati Subbu Satyajeet.
“Fingerprint Recognition based on Silicon Chips”.
National Institute of Science & Technology Cryptology and Its Applications Akshat Mathur [1] Cryptology and Its Applications Presented By AKSHAT MATHUR.
Information Security -- Part II Public-Key Encryption and Hash Functions Frank Yeong-Sung Lin Information Management Department National Taiwan University.
Protecting Satellite Networks from Disassociation DoS Attacks Protecting Satellite Networks from Disassociation DoS Attacks (2010 IEEE International Conference.
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT Project Members Sanyam Sharma Sunil Mohan Ranta Group No FINGERPRINT.
CS 4244: Internet Programming Security 1.0. Introduction Client identification and cookies Basic Authentication Digest Authentication Secure HTTP.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
2005/12/021 Content-Based Image Retrieval Using Grey Relational Analysis Dept. of Computer Engineering Tatung University Presenter: Tienwei Tsai ( 蔡殿偉.
Biometrics: A Tool for Information Security 1 Authors: Anil K. Jain, Arun Ross, Sharath Pankanti IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY,
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
BZUPAGES.COM Cryptography Cryptography is the technique of converting a message into unintelligible or non-understandable form such that even if some unauthorized.
A Multiresolution Symbolic Representation of Time Series Vasileios Megalooikonomou Qiang Wang Guo Li Christos Faloutsos Presented by Rui Li.
CRYPTOGRAPHY Gayathri V.R. Kunapuli. OUTLINE History of Cryptography Need for cryptography Private Key Cryptosystems Public Key Cryptosystems Comparison.
Multimedia Security. “Everything” is digital these days - a copy of a digital media element is identical to the original. How can an owner protect their.
Irfan Ullah Department of Information and Communication Engineering Myongji university, Yongin, South Korea Copyright © solarlits.com.
Similarity Measurement and Detection of Video Sequences Chu-Hong HOI Supervisor: Prof. Michael R. LYU Marker: Prof. Yiu Sang MOON 25 April, 2003 Dept.
Key Generation Protocol in IBC Author : Dhruti Sharma and Devesh Jinwala 論文報告 2015/12/24 董晏彰 1.
 劉庭瑋 Electronic Medical Report Security Using Visual Secret Sharing Scheme.
Computer Security Set of slides 8 Dr Alexei Vernitski.
Biometric Encryption Base RSA Algorithm Supervisor: Ass. Prof. Dr. Dang Tran Khanh Student: Dung Ngo Dinh.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
Hand Geometry Recognition
Improving the Performance of Fingerprint Classification
State of the art – Part 1 Xin Jin
ATM using fingerprint
Secure and Privacy-Preserving User Authentication Using Biometrics
Mean value based reversible data hiding in encrypted images
Biometrics , Computer & Network Security 1
Presentation transcript:

CRYPTO KEY GENERATION USING SLICING WINDOW ALGORITHM M.S. Altarawneh, L.C. Khor, W.L. Woo, and S.S. Dlay School of Electrical, Electronic and Computer Engineering University of Newcastle Newcastle upon Tyne, NE1 7RU UNITED KINGDOM {mokhled.al-tarawneh, l.c.khor, w.l.woos. l.c.khor, w.l.woos.

Abstract Background  Fingerprint minutiae points are used for generating cryptographic key.  Slicing window partitioning formation on base Euclidean distance between detected core and minutiae points.  Generated vector used to derive an encryption key. Challenges  Security at your fingertips.  Bio-Crypto Key Generation.  However, approach has to be validated based on consistency to avoid false positives: relatively little work done in the field of cryptographic key- generation. Contributions  A novel approach to generate encryption key from fingerprint sample is introduced.  Experimental analysis show encouraging prospects.

Outline  Introduction  Prior related work  Proposed Approach  Mathematical representation of RP detecting algorithm  Slicing window construction  Key generation  Experimental Evaluation  Conclusion

Introduction Using biometric data as a basis for cryptographic keys is problematic:  biometric measurement is not perfectly reproducible.  cryptography relies on a stable and unique key to encrypt and decrypt texts. Incorporation address approaches of biometric - cryptography :  Key release algorithms.  key generation algorithms.

Proposed Approach Slicing Window Construction Reference Point Detection Minutiae Extraction Key Generation SW<=MA S YES NO

Proposed Approach Orientation tensor image field computation: Reference Point Detection where and denote the derivatives of the image in x and y direction respectively Complex filter computation: Where represents filter order and is standard deviation of modulated filter which is in this case modulated by Gaussian envelope Mathematical representation of reference point (RP) detecting algorithm.

applying Conditional/ Crossing Number (CN) concept, CN extracts the ridge points from the skeleton image. Reference Point Detection Minutiae Extraction Where is the pixel belonging to the neighbourhood of Extracted minutiae points contain: Where is the x-coordinate position, is the y-coordinate position, is the type and distance of a particular minutiae.

Slicing Window Construction Reference Point Detection Minutiae Extraction SW<=MA S YES RP and minutiae points distance determined by Euclidean distance form: Where is the reference point coordination and is the minutiae point coordination. xytd For i=1: T; // T is template size Window size=64x64 Do minutiae counting entire window; Vector generating; // number of minutiae by window size Next windows; // 128… 256, till end of template size End Minutiae point coordination's and slicing window algorithm

Slicing Window Construction Reference Point Detection Minutiae Extraction SW<=MA S YES Window construction on base of template information.

Slicing Window Construction Reference Point Detection Minutiae Extraction Key Generation SW<=MA S YES NO vector generation:  V=slicing window size * minutiae points’ quantity  V={Header locker key and Encryption provider key }  Header locker key (HLK) will be produced by V1, V3 concatenating.  Encryption provider key (EPK) by V2, V4 concatenating. Example of generated Vector HLK EPK

Experimental Analyses Test environment is: 400 fingerprints images database (TIFF, format, 300x300 sizes, and 500 dpi resolutions).  Tests show that generated key length is depend on: extracted minutiae points and their positions in slicing windows.  Test shows 100% uniqueness of generated keys. Resistance brute force attacks of our approach is increased by:  Entropy of applicable system feed by HLK and EPK.  Two secure circles, cipher header closing and plain text encoding.

Conclusion Our approach takes advantage of fingerprint template extracted information and standard encryption algorithms to provide a novel way of generating cipher keys without having to remember complicated sequences which might be lost, stolen, or even guessed.

References A. Burnett, F. Byrne, T. Dowling, and A. Duffy, “A Biometric Identity Based Signature Scheme” Cryptology ePrint Archive, Report 2004/176, 2004 U.Uludag, S. Pankanti, S. Prabhakar, A. Jain, "Biometric Cryptosystems: Issues and Challenges." Proceedings of the IEEE 92(6): , 2004 C. Soutar, D. Roberge, S.A. Stojanov, R. Gilroy, and B. Vijaya Kumar "Biometric encryption using image processing." Proceedings of the SPIE -Optical Security and Counterfeit Deterrence Techniques II 3314: , T.Clancy, N. Kiyavash and D.J. Lin. "Secure smartcard-based fingerprint authentication." Proceedings ACM SIGMM 2003 Multimedia, Biometrics Methods and Workshop: 45-52, F. Monrose, M. Reiter, Q. Li and W. Susanne, “Cryptographic Key Generation from Voice. IEEE Symposium on Security and Privacy A. Juels, a. M. Sudan, “A fuzzy vault scheme”, Proceedings IEEE International Symposium on Information Theory M. A. Dabbah, W. L. Woo, and S. S. Dlay, “Computation Efficiency for Core-Based Fingerprint Recognition Algorithm”, WSEAS Trans. on Communications, Issue 12, Volume 4, December K. Nilsson and J. Bigun, “Localization of corresponding points in fingerprints by complex filtering,” Pattern Recognition Letters, Vol.24,pp , Biometrics Explained, International Biometric Group

Thank You