Купить СНПЧ А7 Архангельск, оперативня доставка

crosscheckdeposited

Combinando Criptografia e Biometria: Sistemas de Regeneração de Chave

DOI: http://dx.doi.org/10.12721/2237-5112.v02n02a05

http://www.rtic.com.br

downloadpdf

Danielle Paes B. de A. Camara1 & Valdemar C. da Rocha Jr.1

 

Resumo: Este artigo apresenta uma abordagem tutorial sobre soluções de segurança através do uso combinado de técnicas biométricas e criptográficas, com ênfase dada à solução denominada Regeneração de Chave, a qual envolve o uso de técnicas de correção de erro.

Palavras-chave: Biometria, multibiometria, criptografia, códigos corretores de erro, segurança

 

1 Grupo de Pesquisa em Comunicações, Departamento de Eletrônica e Sistemas, Universidade Federal de Pernambuco, Recife, PE. E-mails: dpbac@ieee.org, vcr@ufpe.br

 

Literatura Citada

[1] A. K. Jain, P. Flynn and A. A. Ross, Handbook of Biometrics, Springer, 2008. doi

[2] B. Schneier, Applied Cryptography Second Edition: Protocols, Algorithms and Source in C, Wiley Publishing, Inc., 1996. 

[3] W. Mao, Modern Cryptography - Theory & Practice, Prentice Hall PTR, 2004. 

[4] A. J. Menezes, P. C. Van Oorschot e S. A. Vanstone, Handbook of Applied Cryptography, CRC Press Series, 1996. doi

[5] “Advanced Encryption Standard (AES),” Federal Information Processing Standards Publication 197, National Institute of Standards and Technology, November 2001, http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf. 

[6] N. K. Ratha, J. H. Connell, and R. M. Bolle, “Enhancing Security and Privacy in Biometrics-based Authentication Systems,” IBM Systems Journal, Vol. 40, No.3, 2001. doi

[7] N. K. Ratha, S. Chikkerur, J. H. Connell, and R. M. Bolle, “Generating Cancelable Fingerprint Templates,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 29, no. 4, pp. 561-572, April 2007. doi

[8] T. E. Boult, W. J. Scheirer, and R. Woodworth, “Revocable Fingerprint Biotokens: Accuracy and Security Analysis,” IEEE Conference on Computer Vision and Pattern Recognition, pp. 1-8, Minneapolis, Minnesota, USA, June 2007. 

[9] A. Lumini and L. Nanni, “An Improved Biohashing for Human Authentication,” Pattern Recognition, vol. 40, no. 3, pp. 1057-1065, March 2007. doi

[10] M. Savvides, B. V. Kumar and P. Khosla, “Cancelable Biometric Filters for Face Recognition,” Proceedings of the 17th International Conference on Pattern Recognition (ICPR04), vol. 3, pp. 922-925, Cambridge, UK, August 2004. 

[11] Y. Dodis, L. Reyzin, and A. Smith, “Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data,” Proceedings of the Eurocrypt 2004, pp. 523-540, Interlaken, Switzerland, May 2004. doi

[12] F. Monrose, M.K. Reiter, and R. Wetzel, “Password Hardening Based on Keystroke Dynamics,” Proceedings of the Sixth ACM Conference on Computer and Communication Security (CCCS), pp. 73-82, Singapore, November 1999. doi

[13] F. Monrose, M.K. Reiter, Qi Li, and S. Wetzel, “Cryptographic Key Generation from Voice,” Proceedings of the IEEE Symposium on Security and Privacy, pp. 202-213, Oakland, California, USA, May 2001. 

[14] A. Goh and D. C. L. Ngo, “Computation of Cryptographic Keys from Face Biometrics,” Proceedings of the International Federation for Information Processing 2003, pp. 1-13, 2003. 

[15] A. B. J. Teoh, D. C.L. Ngo, and A. Goh, “Personalised Cryptographic Key Generation Based on Facehashing,” Computers & Security, vol. 23, pp. 606- 614, 2004. doi

[16] Y. Chang, W. Zhung, and T. Chen, “Biometrics-based Cryptographic Key Generation,” IEEE International Conference on Multimedia and Expo (ICME), vol. 3, pp. 2203-2206, Taipei, Taiwan, June 2004. 

[17] F. Hao, R. Anderson and J. Daugman, “Combining Crypto with Biometrics Effectively,” IEEE Transactions on Computers, vol. 55, No. 9, pp. 1081-1088, 2006. doi

[18] A. Juels and M.Wattenberg, “A Fuzzy Commitment Scheme,” Proceedings of the Sixth ACM Conference on Computer and Communication Security (CCCS), pp. 28-36, Singapore, November 1999. doi

[19] C. Soutar, D. Roberge, A. Stoianov, R. Gilroy, and B. V. K. Vijaya Kumar, “Biometric Encryption,” ICSA Guide to Cryptography, McGraw-Hill, 1999. http://www.bioscrypt.com/assets/documents/whitepapers/Biometric_Encryption.pdf. 

[20] T. C. Clancy, N. Kiyavash, and D. J. Lin, “Secure Smartcard-based Fingerprint Authentication,” Proceeding of ACM SIGMM Workshop on Biometrics Methods and Applications, pp. 45-52, Berkeley, CA, USA, November 2003. 

[21] A. Juels and M. Sudan, “A Fuzzy Vault Scheme,” Proc. IEEE Int. Symp. Information Theory, p. 408, IEEE Press, Lausanne, Switzerland, 2002. doi

[22] J. Bringer, H. Chabanne, G. Cohen, B. Kindarji and G. Zmor, “Theoretical and Practical Boundaries of Binary Secure Sketches,” IEEE Transactions on Information Forensics and Security, Vol. 3, No. 4, pp. 673-683, December 2008. doi

[23] S. Kanade, D. P. B. A. Camara, E. Krichen, D. Petrovska-Delacrétaz, B. Dorizzi, “Three Factor Scheme for Biometric-based Cryptographic Key Regeneration Using Iris,” The 6th Biometrics Symposium 2008 (BSYM2008), pp. 59-64, Tampa, Florida, USA, September 2008. 

[24] S. Kanade, D. P. B. A. Camara, D. Petrovska-Delacrétaz, B. Dorizzi, “Application of Biometrics to Obtain High Entropy Cryptographic Keys,” Proceedings of World Academy of Science, Engineering and Technology, Vol. 27, pp. 251 - 255, Hong Kong, China, March 2009. http://www.waset.org/journals/waset/v27/v27-43.pdf 

[25] D. P. B. A. Camara, J. Lemos Neto and V. C. da Rocha Jr., “Multiinstance Based Cryptographic Key Regeneration System,” SBrT2012 - Simpósio Brasileiro de Telecomunicações, Brasília, DF, 2012. 

[26] K. Nandakumar and A. K. Jain,“Multibiometric Template Security Using Fuzzy Vault,” IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems, Washington DC, USA, 2009. 

[27] D. Petrovska-Délacretaz, G. Cholet, B. Dorizzi, Guide to Biometric Reference Systems and Performance Evaluation, Springer, 2009. doi

[28] F. J. MacWilliams and N. J. A. Sloane, The Theory of Error-Correcting Codes, North Holland, 1988. 

[29] S. Lin, D. J. Costello, Error Control Coding (2nd Edition), Prentice Hall, 2004. 

[30] International Standards for Business, Government and Society - ISO/IEC JTC 1 /SC 37 Biometrics http://www.iso.org/iso/jtc1_sc37_home (acessado em 10 de junho de 2012). 

[31] A. K. Jain, A. Ross and S. Prabhakar, “An Introduction to Biometric Recognition,” IEEE Transactions on Circuits and Systems for Video Technology, Special Issue on Image and Video Based Biometrics, Vol. 14, No. 1, January 2004. 

[32] P. Tuyls, B. Skoric and T. Kevenaar, Security with Noisy Data - Private Biometric, Security Key Storage and Anti-Counterfeiting, Springer 2007. doi

[33] J. Daugman, “The Importance of Being Random: Statistical Principles of Iris Recognition,” Pattern Recognition, vol. 36, no. 2, pp. 279-291, February 2003. doi

[34] R. Viveros, K. Balasubramanian, N. Balakrishnan, “Binomial and Negative Binomial Analogues Under Correlated Bernoulli Trials,” The American Statistician, Vol. 48, Issue 3, pp. 243-247, 1994. 

[35] “An Introduction to Information Security,” A Certicom White Paper, 1997. http://www.certicom.com 

[36] National Institute of Science and Technology (NIST), “Iris Challenge Evaluation”, 2005, http://iris.nist.gov/ice.