Skip to main content

Reliable and Secure Encryption Key Generation from Fingerprints

Sheng, Weiguo, Howells, Gareth, Fairhurst, Michael, Deravi, Farzin, Chen, Shengyong (2012) Reliable and Secure Encryption Key Generation from Fingerprints. Information Management & Computer Security, 20 (3). pp. 207-221. ISSN 0968-5227. (doi:10.1108/09685221211247307) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided. (Contact us about this Publication)
Official URL
http://dx.doi.org/10.1108/09685221211247307

Abstract

Purpose ? Biometric authentication, which requires storage of biometric templates and/or encryption keys, raises a matter of serious concern, since the compromise of templates or keys necessarily compromises the information secured by those keys. To address such concerns, efforts based on dynamic key generation directly from the biometrics have recently emerged. However, previous methods often have quite unacceptable authentication performance and/or small key spaces and therefore are not viable in practice. The purpose of this paper is to propose a novel method which can reliably generate long keys while requires storage of neither biometric templates nor encryption keys. Design/methodology/approach ? This proposition is achieved by devising the use of fingerprint orientation fields for key generation. Additionally, the keys produced are not permanently linked to the orientation fields, hence, allowing them to be replaced in the event of key compromise. Findings ? The evaluation demonstrates that the proposed method for dynamic key generation can offer both good reliability and security in practice, and outperforms other related methods. Originality/value ? In this paper, the authors propose a novel method which can reliably generate long keys while requires storage of neither biometric templates nor encryption keys. This is achieved by devising the use of fingerprint orientation fields for key generation. Additionally, the keys produced are not permanently linked to the orientation fields, hence, allowing them to be replaced in the event of key compromise.

Item Type: Article
DOI/Identification number: 10.1108/09685221211247307
Uncontrolled keywords: Authentication; Biometrics; Data security; Fingerprints; Privacy; Security
Subjects: T Technology
Divisions: Faculties > Sciences > School of Engineering and Digital Arts
Faculties > Sciences > School of Engineering and Digital Arts > Image and Information Engineering
Depositing User: Tina Thompson
Date Deposited: 22 Oct 2013 08:57 UTC
Last Modified: 01 Aug 2019 10:36 UTC
Resource URI: https://kar.kent.ac.uk/id/eprint/35565 (The current URI for this page, for reference purposes)
Deravi, Farzin: https://orcid.org/0000-0003-0885-437X
  • Depositors only (login required):