A New Approach To Symmetric Key Generation Using Combination Of Biometrics Key And Cryptographic Key To Enhance Security Of Data

DOI : 10.17577/IJERTV2IS3624

Download Full-Text PDF Cite this Publication

Text Only Version

A New Approach To Symmetric Key Generation Using Combination Of Biometrics Key And Cryptographic Key To Enhance Security Of Data

Kamini H Solanki

Adhyapak Sahayak, MSc(IT) Department, ISTAR, Vallabh Vidya Nagar, S.P.University

Abstract Associating an identity with an individual is called personal identification. A wide variety of systems requires reliable personal recognition schemes to either confirm or determine the identity of an individual. The problem of resolving the identity of a person can be categorized into two fundamentally distinct types of problems with different inherent complexities: (i) Verification (authentication) and (ii) Recognition (identification). The purpose of such schemes is to ensure that the rendered services are accessed only by a legitimate user and no one else. In the absence of robust personal recognition schemes, these systems are exposed to the tricks of a fraud. Biometric recognition or, simply, biometrics refers to the automatic recognition of individuals based on their physiological and/or behavioral characteristics. With the increasing reliance on electronic information, which needs to be exchanged across the internet or stored on open networks, cryptography is becoming an increasingly important feature of computer security. A biometric key dependent cryptosystem is proposed, to ensure the security of the whole system by using fingerprint features as a key in a cryptosystem. In this paper, combine the features of the fingerprint and cryptography for related privacy concerns. Key generate from fingerprint is combine with the systems cryptographic key.

Index TermsBiometrics, Fingerprint, Minutiae points, Cryptography, Key generation.

  1. INTRODUCTION

    Fingerprint identification is one of the most important biometric technologies. A fingerprint is the pattern of ridges and valleys on the surface of a fingertip. Each individual has unique fingerprints. The uniqueness of a fingerprint is exclusively determined by the local ridge characteristics and their relationships.

    Fingerprint Acquisition

    The first challenge facing a finger scan system is to acquire a high quality image of the fingerprint. Image quality is measured by dots per inch

    (DPI)- more DPI means a high resolution image. The lowest DPI generally found is the 300 to 350 DPI range.

    Fingerprint Representation

    There is seven patterns of papillary ridge i.e. Loop, Arch, Whorl, Tented Arch, Double Loop, Central Pocked Loop and Accidental. From seven patterns of papillary ridge there are three patterns which most

    common like depicted below:

    Fig(1) ridge pattern examples

    • The human population has fingerprints in the following percentages:

      • Loop 65%

      • Whorl — 30%

      • Arch — 5%

        Fig(2) Some Fingerprint Patterns

        Fingerprint Basics (minutiae)

        Fig(3) Different minutiae

        Feature Detection for Matching

        Fig(4) Finger scan minutiae

  2. Methodology of image enhancement

    • Segmentation

    • Normalization

    • Orientation estimation

    • Ridge frequency estimation

    • Gabor filtering [12]

      1. Segmentation

        Image segmentation is the first step in the in the enhancement algorithm. Image segmentation is

        used to locate objects and boundaries like lines, curves in images. In a fingerprint image there are foreground regions and the background regions

        .The foreground regions show the ridges and valleys while the background regions are to be left out. The foreground regions have a high variance value while the background regions have low values. Segmentation separates the foreground regions from the background image for reliable extraction of minutiae.

        The image is divided into blocks. For each block the gray scale variance is calculated. If the value is lower than the global threshold it is assigned to the background else it is assigned to the foreground.

        Let V(k) be the variance for a block of size W×W. Then

        Where I(i.j ) is the grey scale value at pixel(i,j) and M(k) is the mean gray value.

        The variance threshold separates the foreground regions from the background regions. The foreground regions that are segmented are the areas having the ridge structures. The remaining regions are untouched. However the threshold must be given properly. If the threshold value is too large, foreground regions may be incorrectly assigned as background regions. Conversely, if the threshold value is too small, background regions may be assigned as part of the fingerprint foreground area. A variance threshold of around 100 has been found to give optimal results in terms of differentiating the foreground and background regions.

      2. Normalization

        It is the next step in the enhancement algorithm. Normalization is done so that the gray level values lies within a given set of values. The fingerprint image is normalized to have a predefined mean and variance. This is required as the image usually has distorted levels of gray values among the ridges and the valleys. Normalization allows to standardize the distorted levels of variation in the gray scale values. Normalization involves pixel-wise operations and does not change the ridge and valley structures.

        Normalization is a linear process. Suppose the intensity range of the image is 50 to 180 and the desired range is 0 to 255 the process entails subtracting 50 from each of pixel intensity, making the range 0 to 130. Each pixel intensity

        is multiplied by 255/130, making the range 0 to 255.

        The normalized image is given by

        Where for a pixel I(i,j) the estimated mean and variances are M and V respectively. M0 and V0 denote the desired mean and variance values.

        Histogram equalization, as normalization method, is a process to enhance the contrast of images by transforming its intensity values. Usually a fingerprint image has different gray values for every pixel. It is desirable to have the gray value around a mean value. This is achieved by histogram equalization. It increases the local contrast of images. Thus the intensities can be distributed on the histogram. This allows for areas of lower local contrast to gain a higher contrast without affecting the global contrast. Histogram equalization accomplishes this by effectively spreading out the intensity values.

        The histogram of the original image illustrates that all the intensity values lie on the right hand side of the 0255 scale, with no pixels in the left hand side. The histogram of the normalised image shows that the range of intensity values has been adjusted such that there is a more balanced distribution between the dark and light pixels. Normalising the image improves the contrast between the ridges and valleys. It does not alter the shape of the original histogram plot. The relative position of the values along the x axis is shifted.

      3. Ridge Orientation estimation

        The next step is calculation of orientation image. Orientation calculation is critical for fingerprint image enhancement and restoration in both frequency and spatial domain. The orientation image represents the local orientation of the ridges and is a matrix of direction vectors. It is important as Gabor filtering depends on the proper orientation.

        Most of the fingerprint classification and identification processes calculate the local ridge orientation of the fixed-size block instead of each pixel. The simplest and most natural approach for extracting local ridge orientation is base on computation of gradients in the fingerprint image. The gradient based approach is used to find the gradient. The gradient is perpendicular to the orientation vector.

        Suppose the image is divided in square blocks of 15×15. In each block, frequencies F[i], i = 0…7 for eight directions are calculated. The average frequency is computed. Then the difference between the frequency for each direction and average frequency is calculated. For very pixel the gradient is calculated and standard deviation for the eight directions is calculated. If standard deviation is larger than a threshold, then the direction with the maximum frequency is regarded as the dominant direction. Otherwise, weighted average direction is computed as the dominant direction. The orientation vector for each block can be found out.

        For this a block of W×W is chosen. The gradient in the horizontal and vertical directions are found and given by x(i,j) and y(i,j).

        The local orientation is given by

        The ridges are oriented in a local direction for proper Gabor Filtering. It can produce accurate orientation estimates in the presence of minimal amounts of noise, but its perform deteriorates under high levels of noise.

      4. Ridge frequency estimation

        Local ridge frequency is another important parameter used in the construction of the Gabor filter. The local ridge frequency fxy at point [x, y] is the number of ridges per unit length along a hypothetical segment centered at [x, y] and orthogonal to the local ridge orientation xy. A frequency image F, analogous to the orientation image D, can be defined if the frequency is estimated at discrete positions and arranged into a matrix.

        The first step in the frequency estimation stage is to divide the image into blocks of size W×W. The next step is to project the gray-level values of all the pixels located inside each block along a direction orthogonal to the local ridge orientation. It forms an almost sinusoidal-shape wave with the local minimum points corresponding to the ridges in the fingerprint. The ridge spacing is calculated by counting the

        number of pixels between consecutive minima points in the projected waveform.

        Let R(i,j) be the ridge spacing. For a block of size W×W, it is calculated by counting number of pixels between minutiae points. Then the ridge frequency F(i,j) is given by

        The ridge frequency values are presented in terms of ridge wavelength. The presence of noise leads to the creation of false local minima, which mask out the location of the true minimum points. These false minima can then lead to an inaccurate estimation of the ridge wavelength. Thus the noise needs to be filtered out for proper ridge frequency estimation. The image can now be applied to a Gabor filter. All fingerprints do not exhibit the same average ridge wavelength . Different ridge wavelength values may result from different fingerprints.

      5. Gabor Filtering

    Gabor filter is a linear filter used for edge detection. A Gabor filter is a linear filter whose impulse response is defined by a harmonic function multiplied by a Gaussian function

    .Gabor filter can be viewed as a sinusoidal plane of particular frequency and orientation, modulated by a Gaussian envelope.

    The Gabor filter is represented by

    where is the orientation of the Gabor filter, f is the frequency of the wave, x and y are the standard deviations of the Gaussian function and x , y denote the x and y axes of the filter respectively.

    Gabor filters have frequency-selective and orientation-selective properties which allow the filter to be tuned to give maximal response to ridges at a specific orientation and frequency in the fingerprint image. Once the ridge orientation and ridge frequency information has been determined, these parameters are used to construct the even-symmetric Gabor filter.

    The Gabor filter is applied to the fingerprint image by convoluting the filter and image. For a

    pixel (i,j), the orientation value and ridge frequency value are required.

    In fingerprint enhancement, Gabor filter can be tuned to specific frequency and orientation values. As the ridge orientation and frequency estimation has already been calculated, the Gabor filter can enhances the ridges in the direction of local orientation effectively preserving the ridge structures. The value of x determines the degree of contrast enhancement and the value of y determines the smoothing of the ridges. A large value will result in blurring of the images whereas a low value would not be effective in removing noise from the images. So a suitable value of x and y must be taken.

  3. Minutiae extraction: The process of minutiae point extraction is carried out in the enhanced fingerprint image.

    The steps involved in the extraction process are,

    • Binarization: Binarization is the process of converting a grey level image into a binary image. It improves the contrast between the ridges and valleys in a fingerprint image, and thereby facilitates the extraction of minutiae. The grey level value of each pixel in the enhanced image is examined in the binarization process. If the grey value is greater than the global threshold, then the pixel value is set to a binary value one; or else, it is set to zero. The output of binarization process is a binary image containing two levels of information, the foreground ridges and the background valleys. The minutiae extraction algorithms are good operating on binary images where there are only two levels of interest: the black pixels that denote ridges, and the white pixels that denote valleys.

    The input fingerprint image, the extracted minutiae points and the intermediate results of the

    proposed approach are shown in figure Finally, the generated 128-bit cryptographic key obtained from the proposed approach is shown in figure

    1. Input fingerprint image

    2. Histogram Equalized Image

    3. Wiener Filtered Image

    4. Segmented Image

    5. Enhanced image

    6. Morphological Processed Image (g) Fingerprint image with Minutiae points

  4. Cryptography

    Cryptography plays a very vital role in keeping the message safe as the data is in transit. It ensures that the message being sent at one end remains confidential and should be received only by the intended receiver at the other end. Cryptography converts the original message in to non readable format and sends the message over an insecure channel. The people who are unauthorized to read the message try to break the non readable message but it is hard to do it so. The authorized person has the capability to convert the non readable message to readable one. The original message or the actual message that the person wishes to communicate with the other is defined as Plain Text. The message that cannot be understood by anyone or meaningless message is what we call as Cipher Text. Encryption is the process of converting plaintext into cipher text with a key. A Key is a numeric or alpha numeric text or may be a special symbol. A decryption is a reverse process of encryption in which original message is retrieved from the cipher text. Encryption takes place at the sender end and Decryption takes place at the receiver end.

  5. Goals of Cryptography

    Cryptography provides a number of security goals to ensure the privacy of data, non alteration of data and so on. Due to the great security advantages of cryptography it is widely used today.

    Following are the various goals of cryptography.

    Confidentiality

    Information in computer is transmitted and has to be accessed only by the authorized party.

    Authentication

    The information received by any system has to check the identity of the sender that whether the information is arriving from a authorized person or a false identity.

    Integrity

    Only the authorized party is allowed to modify the transmitted information No one in between the sender and receiver are allowed to alter the given message.

    Non Repudiation

    Ensures neither the sender, nor the receiver of message can deny the transmission.

    Access Control

    Only the authorized parties are able to access the given information.

  6. Types of Cryptography Key

    • Symmetric Key Cryptography

      In symmetric Cryptography the key used for encryption is similar to the key used in decryption. Thus the key distribution has to be made prior to the transmission of information. The key plays a very important role in symmetric cryptography since their security directly depends on the nature of key i.e. the key length etc. There are various symmetric key algorithms such as DES, TRIPLE DES, AES, RC4, RC6, BLOWFISH.

    • Asymmetric Key Cryptography

    In Asymmetric Cryptography, two different keys are used for encryption and decryption- Public and Private. The public key is meant for general use so it is available to anyone on the network. Anyone who wants to encrypt the plaintext should know the Public Key of receiver. Only the authorized person can be able to decrypt the cipher text through his own private key. Private Key is kept secret from the outside world. Symmetric Encryption Algorithm runs faster as compared to Asymmetric key algorithms. Also the memory requirement of Symmetric algorithm is lesser as compared to asymmetric.

  7. Background of the problem/Issues

    • User have to remember long Password

    • Password can be easily assumed and hacked.

    • No more security of symmetric key so attackers can easily attacks on secure data.

    • If unauthorized person give authorized or copied biometric data he/she can access sensitive data.

  8. PROPOSED WORK

System generate 128 bit system key, hear in the proposed work we combine 128 bit biometric key which is from fingerprint technique and 128 bit secret key which is generated by system.

128 bit Biometric Key using fingerprint minutiae 000011111101101111111110111110101111110 011111110111110111111101111111101111111 011110111111110111010111111101111101110 10111111111

128 bit System Key generated by system

100101110101111101010111111100101011100

010101000110101110001001001100110010111

111111010101110000011010100011101010110

00110101001

256 bit secret key – Combination of both key

000011111101101111111110111110101111110

011111110111110111111101111111101111111

011110111111110111010111111101111101110

101111111111001011101011111010101111111

001010111000101010001101011100010010011

001100101111111110101011100000110101000

1110101011000110101001

  1. Features of proposed work

    • Combine feature of fingerprint and cryptography.

    • Cannot be forgotten hard to copy or forge, unfeasible to share and proffer better security than a normal eight character password

    • In most cases, the passwords used for key storage are every simple that they can be effortlessly guessed or broken by simple dictionary attacks. So more significant solution of the problem is to design cryptosystems based on biometrics, necessitating neither storage nor remembrance of passwords.

    • In proposed system, key generation from combination of secret key and biometric key. So it increases the security.

    • Long key bit key generation, so it takes long time to be broken. So long key provide better security.

    • If unauthorized person represent authorized biometrics data even though person never access authorized or sensitive data.

  2. CONCLUSION

    Biometrics-based Key Generation has been found to outperform traditional cryptographic systems, chiefly because, it is impossible for a person to lose his/ her biometrics, and also the biometrics are intricate to falsify or steal. In this paper, we have presented an efficient approach for generation of irrevocable cryptographic keys from fingerprint biometrics using minutiae extraction from biometric image. The approach has been composed of three phases namely: 1) Minutiae points extraction from the fingerprint image,

    1. system key generation for added security and

    2. Cryptographic key generation from Secured finger print minutiae and systems secret key. The resultant cryptographic combination key thus generated has been irrevocable and unique to a specific identity, providing better protection and replacement features for lost or stolen biometrics. The Proposed work have represented the effectiveness and enhance security in generating an irrevocable cryptographic key.

  3. REFERENCES

  1. C.E. Shannan, Communication Theory of Security System, Bell, System Technical Journal , vol 28,pp.656-715,1949.

  2. Nalini. N and G. Raghavendra Rao, A New Encryption and Decryption Algorithm Combining the Features of Genetic Algorithms(GA) and Cryptography

  3. H. Feistel , Cryptography and Computer Privacy, Scientific American Vol. 228 ,no. 5,pp 15-23,1973.

  4. Uttam Kr. Mondal, Frame Based Symmetric Key Cryptography , Int. J. Advanced Networking and Applications 762, Volume: 02, Issue: 04, Pages: 762-769 (2011)

  5. K. Hassanain1 ,M. Shaarawy, E. Hesham2, A Proposal for a Biometric Key Dependent Cryptosystem , Global Journal of Computer Science and Technology , Vol. 10 Issue 11 (Ver. 1.0) October 2010.

  6. Dr.R.Seshadri , T.Raghu Trivedi,Efficient Cryptographic Key Generation using Biometrics , Int. J. Comp. Tech. Appl., Vol 2 (1), 183-187, ISSN: 2229-6093

  7. Sunil V. K. Gaddam 1 and Manohar Lal 2, Efficient Cancellable Biometric Key Generation Scheme for Cryptography ,International Journal of Network Security, Vol.11, No.2, PP.61{69, Sept. 2010

P.Arul, Dr.A.Shanmugam Generate a Key For AES Using Biometric For VOIP Network Security Journal of Theoretical and Applied Information Technology 2009.107-112. [8]Principles of fingerprint (http://www.biometricnewsportal.com/fingerprin t_biometrics.asp)

[9]. Umut Uludag, Sharath Pankanti, Salil Prabhakar, Anil K.Jain Biometric Cryptosystems Issues and ChallengesProceedings of the IEEE 2004.

  1. Sunil V. K. Gaddam 1 and Manohar Lal 2,Effecient Cancellable Biometric Key Generation Scheme for Cryptography International Journal of Network Security, Vol.11, No.2, Sep. 2010.

  2. A Brief Introduction to Skeleton-Based Fingerprint Minutiae Extraction

    Feng Zhao School of Computer Engineering, Nanyang Technological University, Singapore 639798, E-mail: fzhaowoods@yahoo.com.

  3. FINGERPRINT RECOGNITION: A Thesis Report Submitted in partial fulfillment of the requirement for the degree of Bachelor of Technology in Electronics and Communication Engineering by SHOUGAIJAM DEBAJIT SINGH (10607020)

SHIBA PRASAD MAJHI (10607025) on image

enhancement and minutiae extraction.

Leave a Reply