By Topic

A novel key generation cryptosystem based on face features

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Lifang Wu ; Sch. of Electron. Inf. & Control Eng., Beijing Univ. of Technol., Beijing, China ; Xingsheng Liu ; Songlong Yuan ; Peng Xiao

With the development of Internet, Information security is becoming more and more important. Traditional cryptographic methods require the user to remember keys, it is not convenient. Biometrics based cryptographic key generation techniques generate cryptographic keys from biometrics directly. In this paper, we propose a biometric cryptosystem based on face biometrics. At encryption stage, a 128-dimensional principal component analysis (PCA) feature vector is firstly extracted from the face image. And a 128 bit binary vector is obtained by thresholding. Then we select the distinguishable bits to form bio-key and the optimal bit order number is saved in a look-up table. Furthermore, an error-correct-code (ECC) is generated using Reed-Solomon algorithm. The message is encrypted using symmetric DES with bio-key. In decryption phase, a 128-dimensional PCA features vector extracted from the query face image. Then a bio-key is generated using the look-up table generated at encryption stage. The final key is obtained using both bio-key and Error correct code (ECC). Finally, the symmetric DES decryption algorithm implemented to obtain message using final key. The proposed scheme is tested using ORL face database, the experimental results shows that our algorithm is effective.

Published in:

Signal Processing (ICSP), 2010 IEEE 10th International Conference on

Date of Conference:

24-28 Oct. 2010