Efficient Cryptographic Key Generation Using Biometrics

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

ISSN: 2229-6093

Dr.R.Seshadri,T.Raghu Trivedi, Int. J. Comp. Tech. Appl., Vol 2 (1), 183-187

Efficient Cryptographic Key Generation using Biometrics

1. Dr.R.Seshadri 2. T.Raghu Trivedi


Director Research Scholar,
University Computer Center Sri Venkateswara University, Tirupati.
Sri Venkateswara University,Tirupati Email: Tamirisa_t1@yahoo.com
Email: ravalaseshadri@gmail.com

Abstract

Biometrics gives a lot of methods in high-secure applications while using natural, user-friendly and fast
authentication. Cryptography is intended to ensure the secrecy and authenticity of message. The cryptographic
key will be long, so it is difficult to remember, protecting the confidentiality of the cryptographic keys is one of
the significant issues to be deal with. This can be efficiently solved by the integration of biometrics with
cryptography. Conventional techniques depend on biometric features like face, fingerprint, hand geometry, iris,
signature, keystroke, voice and the like for the extraction of key. Instead of storing key we will generate the key
dynamically with the help of biometrics. Here we will use Finger print to generate key, which is safe and fast.
This key can be used for any type of cryptography.
Key words: Cryptography, Minutiae points, ROI, Morphological operation, Histogram Equalization

1. Introduction

Progress of communication technologies in applications; Cryptography and biometrics are


contemporary times has resulted in huge quantities of merged in biometric cryptosystem [5]. Biometric key
digital data in the publicly shared media. This leads system can be used broadly in two distinct ways
to the drastic development of cryptographic 1.biometric based key generation 2.Biometric
techniques. Cryptography is considered to be one of matching.
the fundamental building blocks of computer security
[1]. Data can be encoded with the aid of Biometrics comprises methods for uniquely
cryptographic techniques in order to ensure that it recognizing humans based upon one or more intrinsic
appears unintelligible to the public or third party and physical or behavioral traits. In computer science, in
particular, biometrics is used as a form of identity
access management and access control. It is also used
coherent only to the intended receivers of it i.e. data to identify individuals in groups that are under
confidentiality. The widely used cryptographic surveillance [6]. Biometric characteristics can be
techniques are DES, AES [2, 3] and public key divided in two main classes
architectures such as RSA [4] . It is nearly
impossible to keep the cryptographic keys in mind
 Physiological are related to the shape of the
because the length of pseudo-random keys is large.
body. Examples include, but are not limited
Typically we write down and store keys in an
to fingerprint, face recognition, DNA, Palm
insecure Place; this makes the work of an attacker
print, hand geometry, iris recognition.
easy. It is possible to solve this problem with the help
 Behavioral are related to the behavior of a
person. Examples include, but are not
of biometric. A biometric system is a standard limited to typing rhythm, and voice. Some
method for identify and verification of a human researchers have coined the term
being based on the personal or physical identification behaviometrics for this class of biometrics.
of characteristics. In recent years there is a rapid
growth in use of biometrics for user authentication

183
Dr.R.Seshadri,T.Raghu Trivedi, Int. J. Comp. Tech. Appl., Vol 2 (1), 183-187

To generate cryptographic key we are using fields. In such systems, while cryptography provides
biometric finger print. The uses are Easy to use high and adjustable security levels, biometrics brings
,Cheap ,Small size, Low power, Non-intrusive in non-repudiation and eliminates the need to
,Large database already available.Biometric remember passwords or to carry tokens etc. In
cryptosystems can operate in one of the biometric cryptosystems, a cryptographic key is
following three modes, (i) key release, (ii)key generated from the biometric template of a user
binding and (iii) key generation [7]. stored in the database in such a way that the key
cannot be revealed without a successful biometric
In the key release mode, the biometric template authentication.
and the key are stored as separate entities and the We are using fingerprint patterns because it is stable
key is released only if the biometric matching is throughout person‟s life time.
successful.
Principals of finger print biometrics
In the key binding mode, the key and
the template are monolithically bound within a A fingerprint is made of a number of ridges and
cryptographic frame work . It is computationally valleys on the surface of the finger. Ridges are the
infeasible to decode the key or the template upper skin layer segments of the finger and valleys
without any knowledge of the user‟s biometric are the lower segments. The ridges form so-called
data. A crypto- biometric matching algorithm is minutia points: ridge endings (where a ridge end) and
used to perform authentication and key release in ridge bifurcations (where a ridge splits in two). Many
a single step. types of minutiae exist, including dots (very small
ridges), islands (ridges slightly longer than dots,
Here we are using Key generation mode, in which occupying a middle space between two temporarily
key is derived directly from the biometric data and is divergent ridges), ponds or lakes (empty spaces
not store in the database. between two temporarily divergent ridges), spurs (a
It is easy to implement a biometric cryptosystem in notch protruding from a ridge), bridges (small ridges
the key release mode, such a system is not joining two longer adjacent ridges), and crossovers
appropriate for high security applications because it (two ridges which cross each other)[8].
has two major vulnerabilities. Firstly, the biometric
template is not secure. Template security is a critical
issue in biometric systems because stolen templates
cannot be revoked. Secondly, since authentication
and key release are decoupled, it is possible to
override the biometric matcher using a Trojan horse
program. Biometric cryptosystems that work in the
key binding/generation modes are more secure but
difficult to implement due to large intra-class
variations in biometric data, i.e., samples of the same
biometric trait of a user obtained over a period of Fig1.finger print image
time can differ substantially.
3. Cryptographic key generation from
2. Bio cryptosystem finger print

A biometrics system considers the personal or We have selected fingerprint as the


physical identification of characteristics for the biometrics feature for generating cryptographic key.
identity, verification of a human being. The functions We have extracted minutiae points from the
of biometric systems are determining, measuring and fingerprint and used that point set for generating
codification of the unique characteristics of cryptographic key.
individuals with one already recorded. In recent
years there has been rapid growth in the use of
biometrics for user authentication applications
Finger Print
because biometric based Authentication provides
several benefits over knowledge and possession- Image preprocessing
based methods. General biometric systems are as
shown above. Uniqueness in human‟s biometric is a
scale of the variations or differences in the biometric
model among the worldwide population. Minutiae point
Biometric cryptosystems [9] combine cryptography
and biometrics to benefit from the strengths of both
Key Generation
Extraction
Fig2: Steps in Key generation
184
Dr.R.Seshadri,T.Raghu Trivedi, Int. J. Comp. Tech. Appl., Vol 2 (1), 183-187

3.1 Image preprocessing


For image preprocessing Histogram Equalization and
Filters are used to enhance the image. Binarisation is
applied on fingerprint image. Then Morphological
operation is used to extract Region of Interest.
(a)Histogram equalization: Fig4: Finger print before and after binarization
Histogram equalization increases the contrast of
images, especially when usable data of the image
represented by close contrast values. Perceptional
information of the image is increased through (b)Morphological Operation
Histogram equalization. It permits pixel value to
expand. The used Fingerprint image use bimodal While point and neighborhood operations are
type. Histogram equalization converts range from 0 generally designed to alter the look or appearance of
to 255 which will enhance visualization effect [11]. an image for visual considerations, morphological
operations are used to understand the structure or
form of an image. This usually means identifying
objects or boundaries within an image. There are
three primary morphological functions: erosion,
dilation, and hit-or-miss. Others are special cases of
these primary operations or are cascaded applications
of them. Morphological operations are usually
performed on binary images where the pixel values
Fig3: Sample Finger Print before and After are either 0 or 1. For simplicity, we will refer to
Histogram Equalization pixels as 0 or 1, and will show a value of zero as
black and a value of 1 as white. While most
Median Filter is non linear, digital filter methodology morphological operations focus on binary images
employed to eliminate noise from image or other
signals. The values present in window are arranged The result of this approach is tightly bounded region
into numeric order the median value, the sample in just containing the bounded inner area. Binary
the center of the window is chosen as output. Oldest morphological operators are applied on binarised
sample is abandoned, new sample is obtained and fingerprint image. The unnecessary spurs, bridges,
calculations are redone. line breaks are removed by these operators. Different
operators applied are clean, HBreak, Spur [8].
3.2 Region of Interest Thinning process is performed to reduce thickness of
lines.
The steps in this are Binarization and
Morphological operation Thinning is a morphological operation that is used to
remove selected foreground pixels from binary
(a)Binarization images, somewhat like erosion or opening. It can be
used for several applications, but is particularly
All minutiae extraction algorithms function on binary useful for skeletonisation. In this mode it is
images where there are only two levels of interest: commonly used to tidy up the output of edge
the black pixels that denote ridges, and the white detectors by reducing all lines to single pixel
pixels that denote valleys. Binarization is the process thickness. Thinning is normally only applied to
that translates a grey level image into a binary image. binary images, and produces another binary image as
This enhances the contrast between the ridges and output.
valleys in a fingerprint image, and consequently
makes it possible the extraction of minutiae. Hence
Binarization process involves analyzing grey level
values of each pixel, if values is greater than the
global threshold set binary value as 1 else 0.

185
Dr.R.Seshadri,T.Raghu Trivedi, Int. J. Comp. Tech. Appl., Vol 2 (1), 183-187

Step4: Sort the Minutiae points and Store in an array


A

Step5: value= KL / Np

Vector=KL % Np

Step6: For i=1 to value

For j=1 to Sp

Read point X from Array A and Check the point


whether it is above or bellow the line L.
Fig5:
Morphological operation If it is above the line or on the line put value as
„0‟ else value is „1‟.Store them in array K.
3.3. Minutiae Points Extraction
Thinning eliminates the redundant pixels of ridges Final key=Append the key vector of length vector to
till the ridges are just one pixel wide. Ridge value of K
thinning algorithm is applied and in each scan of
full fingerprint image, the algorithm marks down 4. Conclusion
redundant pixels in each small window and finally
removes all those marked pixels after several Progress of communication technologies has resulted
scans. After fingerprint ridge thinning minutiae transfer of the digital data in huge quantities in the
points are marked easily. publicly shared media. Cryptography provides
security to that data. We need Cryptographic key for
this purpose. Cryptographic keys are long so it is
difficult to remember them, storing them in a data
base may be insecure. Hence we proposed a method
for generation of cryptographic key which is
generated using biometrics. Here we used fingerprint
patterns, which are stable through out person‟s
lifetime. The key is derived directly from the
biometric data and is not stored in the database.
Since it creates more complexity to crack or guess
the crypto keys. This approach has reduced the
complicated sequence of the operation to generate
crypto keys as in the traditional cryptography system.

References
Fig6: Minutiae point extraction 1]. Sunil V. K. Gaddam 1 and Manohar Lal
2,”Effecient Cancellable Biometric Key Generation
Matrix & key generation: Scheme for Cryptography” International Journal of
Network Security, Vol.11, No.2, PP.57{65, Sep.
The key generation algorithm is as follows 2010
Extracted minutiae points co-ordinates are [2].Advanced Encryption Standard.
maintained in a vector (http://en.wikipedia.org/wiki/Advanced Encryption
Mp- Minutiae points set Standard)
Sp - Size of Mp [3].AES Encryption information.
KL=key length (http://www.bitzipper.com/aes-encryption.html)
Kv -Key Vector [4] A. J. Menezes, P. C. V. Oorschot, and S.
Lk -Length of key vector A.Vanstone, Handbook of Applied Cryptography,
Z - (X, Y) co-ordinate of a minutiae point CRCPress, pp. 180, 1997
Step1: Read the Minutiae points [5]. U. Uludag, S. Pankanti, S. Prabhakar, and A.
K.Jain, \Biometric cryptosystems: Issues and
Step2: Find the point H with highest x+y challenges," Proceedings of the IEEE, vol. 92, pp.
948-960, 2004.
Step3: Draw a line from origin (0, 0) to the H and [6]Biometrics
call it as L (http://en.wikipedia.org/wiki/Biometrics#cite_note-
6)

186
Dr.R.Seshadri,T.Raghu Trivedi, Int. J. Comp. Tech. Appl., Vol 2 (1), 183-187

[7] P.Arul, Dr.A.Shanmugam “Generate a Key For


AES Using Biometric For VOIP Network Security”
Journal of Theoretical and Applied Information
Technology 2009.107-112.

[8] Principles of fingerprint (


http://www.biometricnewsportal.com/fingerprint_bio
metrics.asp)

[9]. Umut Uludag, Sharath Pankanti, Salil


Prabhakar, Anil K.Jain “Biometric Cryptosystems
Issues and Challenges”Proceedings of the IEEE
2004.

[10]. Jain, A.K.; Prabhakar, S.; Hong, L.; Pankanti,


S., "Filterbank-based fingerprint matching",IEEE
Transactions on Image Processing, vol. 9, no. 5, pp:
846-859, May 2000, Doi:10.1109/83.841531.

Authors Profile

Dr.R.Seshadri was born in


Andhra Pradesh, India, in 1959.
He received his B.Tech degree
from Nagarjuna University in
1981. He completed his Masters
degree in Control System
Engineering from PSG College of
Technology, Coimbatore in 1984. He was awarded
with PhD from Sri Venkateswara University, Tirupati
in 1998. He is currently Director, Computer Center,
S.V.University,Tirupati, India. He published number
of papers in national and international journals.

Mr.T.RaghuTrivedi received
MCA degree from Andhra
University,Vizag He received his
M.Tech in Computer Science
from Nagarjuna University.He is
a research scholar in
S.V.University,Tirupathi, Andhra
Pradesh.

187

You might also like