Personalised cryptographic key generation based on FaceHashing

Among the various computer security techniques practice today, cryptography has been identified as one of the most important solutions in the integrated digital security system. Cryptographic techniques such as encryption can provide very Long passwords that are not required to be remembered but are...

Full description

Bibliographic Details
Main Author: TEOH, A
Format: Article
Language:English
Published: 2004
Subjects:
Online Access:http://shdl.mmu.edu.my/2438/
http://shdl.mmu.edu.my/2438/1/1710.pdf
_version_ 1848790056450392064
author TEOH, A
author_facet TEOH, A
author_sort TEOH, A
building MMU Institutional Repository
collection Online Access
description Among the various computer security techniques practice today, cryptography has been identified as one of the most important solutions in the integrated digital security system. Cryptographic techniques such as encryption can provide very Long passwords that are not required to be remembered but are in turn protected by simple password, hence defecting their purpose. In this,paper, we proposed a novel two-stage technique to generate personalized cryptographic keys from the face biometric, which offers the inextricably link to its owner. At the first stage, integral transform of biometric input is to discretise to produce a set of bit representation with a set of tokenised pseudo random number, coined as FaceHash. In the second stage, FaceHash is then securely reduced to a single cryptographic key via Shamir secret-sharing. Tokenised FaceHashing is rigorously protective of the face data, with security comparable to cryptographic hashing of token and knowledge key-factor. The key is constructed to resist cryptanalysis even against an adversary who captures the user device or the feature descriptor. (C) 2004 Elsevier Ltd. All rights reserved.
first_indexed 2025-11-14T18:06:33Z
format Article
id mmu-2438
institution Multimedia University
institution_category Local University
language English
last_indexed 2025-11-14T18:06:33Z
publishDate 2004
recordtype eprints
repository_type Digital Repository
spelling mmu-24382011-08-22T01:54:47Z http://shdl.mmu.edu.my/2438/ Personalised cryptographic key generation based on FaceHashing TEOH, A QA75.5-76.95 Electronic computers. Computer science Among the various computer security techniques practice today, cryptography has been identified as one of the most important solutions in the integrated digital security system. Cryptographic techniques such as encryption can provide very Long passwords that are not required to be remembered but are in turn protected by simple password, hence defecting their purpose. In this,paper, we proposed a novel two-stage technique to generate personalized cryptographic keys from the face biometric, which offers the inextricably link to its owner. At the first stage, integral transform of biometric input is to discretise to produce a set of bit representation with a set of tokenised pseudo random number, coined as FaceHash. In the second stage, FaceHash is then securely reduced to a single cryptographic key via Shamir secret-sharing. Tokenised FaceHashing is rigorously protective of the face data, with security comparable to cryptographic hashing of token and knowledge key-factor. The key is constructed to resist cryptanalysis even against an adversary who captures the user device or the feature descriptor. (C) 2004 Elsevier Ltd. All rights reserved. 2004-10 Article NonPeerReviewed application/pdf en http://shdl.mmu.edu.my/2438/1/1710.pdf TEOH, A (2004) Personalised cryptographic key generation based on FaceHashing. Computers & Security, 23 (7). pp. 606-614. ISSN 01674048 http://dx.doi.org/10.1016/j.cose.2004.06.002 doi:10.1016/j.cose.2004.06.002 doi:10.1016/j.cose.2004.06.002
spellingShingle QA75.5-76.95 Electronic computers. Computer science
TEOH, A
Personalised cryptographic key generation based on FaceHashing
title Personalised cryptographic key generation based on FaceHashing
title_full Personalised cryptographic key generation based on FaceHashing
title_fullStr Personalised cryptographic key generation based on FaceHashing
title_full_unstemmed Personalised cryptographic key generation based on FaceHashing
title_short Personalised cryptographic key generation based on FaceHashing
title_sort personalised cryptographic key generation based on facehashing
topic QA75.5-76.95 Electronic computers. Computer science
url http://shdl.mmu.edu.my/2438/
http://shdl.mmu.edu.my/2438/
http://shdl.mmu.edu.my/2438/
http://shdl.mmu.edu.my/2438/1/1710.pdf