Computation of cryptographic keys from face biometrics
We outline cryptographic key-computation from biometric data based on error-tolerant transformation of continuous-valued face eigenprojections to zero-error bitstrings suitable for cryptographic applicability. Biohashing is based on iterated inner-products between pseudorandom and user-specific eige...
| Main Authors: | , |
|---|---|
| Format: | Article |
| Published: |
2003
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/2599/ |
| _version_ | 1848790099315130368 |
|---|---|
| author | Goh,, A Ngo,, DCL |
| author_facet | Goh,, A Ngo,, DCL |
| author_sort | Goh,, A |
| building | MMU Institutional Repository |
| collection | Online Access |
| description | We outline cryptographic key-computation from biometric data based on error-tolerant transformation of continuous-valued face eigenprojections to zero-error bitstrings suitable for cryptographic applicability. Biohashing is based on iterated inner-products between pseudorandom and user-specific eigenprojections, each of which extracts a single-bit from the face data. This discretisation is highly tolerant of data capture offsets, with same-user face data resulting in highly correlated bitstrings. The resultant user identification in terms of a small bitstring-set is then securely reduced to a single cryptographic key via Shamir secret-sharing. Generation of the pseudorandom eigenprojection sequence can be securely parameterised via incorporation of physical tokens. Tokenised bio-hashing is rigorously protective of the face data, with security comparable to cryptographic hashing of token and knowledge key-factors. Our methodology has several major advantages over conventional biometric analysis ie elimination of false accepts (FA) without unacceptable compromise in terms of more probable false rejects (FR), straightforward key-management, and cryptographically rigorous commitment of biometric data in conjunction with verification thereof. |
| first_indexed | 2025-11-14T18:07:14Z |
| format | Article |
| id | mmu-2599 |
| institution | Multimedia University |
| institution_category | Local University |
| last_indexed | 2025-11-14T18:07:14Z |
| publishDate | 2003 |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | mmu-25992011-08-24T00:09:24Z http://shdl.mmu.edu.my/2599/ Computation of cryptographic keys from face biometrics Goh,, A Ngo,, DCL QA75.5-76.95 Electronic computers. Computer science We outline cryptographic key-computation from biometric data based on error-tolerant transformation of continuous-valued face eigenprojections to zero-error bitstrings suitable for cryptographic applicability. Biohashing is based on iterated inner-products between pseudorandom and user-specific eigenprojections, each of which extracts a single-bit from the face data. This discretisation is highly tolerant of data capture offsets, with same-user face data resulting in highly correlated bitstrings. The resultant user identification in terms of a small bitstring-set is then securely reduced to a single cryptographic key via Shamir secret-sharing. Generation of the pseudorandom eigenprojection sequence can be securely parameterised via incorporation of physical tokens. Tokenised bio-hashing is rigorously protective of the face data, with security comparable to cryptographic hashing of token and knowledge key-factors. Our methodology has several major advantages over conventional biometric analysis ie elimination of false accepts (FA) without unacceptable compromise in terms of more probable false rejects (FR), straightforward key-management, and cryptographically rigorous commitment of biometric data in conjunction with verification thereof. 2003 Article NonPeerReviewed Goh,, A and Ngo,, DCL (2003) Computation of cryptographic keys from face biometrics. COMMUNICATIONS AND MULTIMEDIA SECURITY, 2828 . pp. 1-13. ISSN 0302-9743 |
| spellingShingle | QA75.5-76.95 Electronic computers. Computer science Goh,, A Ngo,, DCL Computation of cryptographic keys from face biometrics |
| title | Computation of cryptographic keys from face biometrics |
| title_full | Computation of cryptographic keys from face biometrics |
| title_fullStr | Computation of cryptographic keys from face biometrics |
| title_full_unstemmed | Computation of cryptographic keys from face biometrics |
| title_short | Computation of cryptographic keys from face biometrics |
| title_sort | computation of cryptographic keys from face biometrics |
| topic | QA75.5-76.95 Electronic computers. Computer science |
| url | http://shdl.mmu.edu.my/2599/ |