Combining cryptography with biometrics effectively

@inproceedings{Hao2005CombiningCW,
  title={Combining cryptography with biometrics effectively},
  author={Feng Hao and Ross Anderson and John Daugman Computer and F. Hao and Ross. Anderson and J. G. Daugman},
  year={2005}
}
We propose the first practical and secure way to integrate the iris biometric into cryptographic applications. A repeatable binary string, which we call a biometric key, is generated reliably from genuine iris codes. A well-known difficulty has been how to cope with the 10 to 20% of error bits within an iris code and derive an errorfree key. To solve this problem, we carefully studied the error patterns within iris codes, and devised a two-layer error correction technique that combines Hadamard… CONTINUE READING
Highly Influential
This paper has highly influenced 30 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 193 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 122 extracted citations

Measuring privacy and security of iris fuzzy commitment

2012 IEEE International Carnahan Conference on Security Technology (ICCST) • 2012
View 8 Excerpts
Highly Influenced

Retrieving secrets from iris fuzzy commitment

2012 5th IAPR International Conference on Biometrics (ICB) • 2012
View 7 Excerpts
Highly Influenced

Robust Biometric Based Key Agreement and Remote Mutual Authentication

2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications • 2012
View 10 Excerpts
Highly Influenced

Security evaluation of biometric keys

Computers & Security • 2012
View 10 Excerpts
Highly Influenced

193 Citations

0102030'07'10'13'16'19
Citations per Year
Semantic Scholar estimates that this publication has 193 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 21 references

The importance of being random: statistical principles of iris recognition

Pattern Recognition • 2003
View 6 Excerpts
Highly Influenced

Private key generation from on-line handwritten signatures

Inf. Manag. Comput. Security • 2002
View 7 Excerpts
Highly Influenced

Cryptographic Key Generation from Voice

IEEE Symposium on Security and Privacy • 2001
View 7 Excerpts
Highly Influenced

Biometric cryptosystems: issues and challenges

Proceedings of the IEEE • 2004
View 3 Excerpts
Highly Influenced

Computation of Cryptographic Keys from Face Biometrics

Communications and Multimedia Security • 2003
View 6 Excerpts
Highly Influenced

Password hardening based on keystroke dynamics

International Journal of Information Security • 2002
View 5 Excerpts
Highly Influenced

Biometric Encryption

C. Soutar, D. Roberge, A. Stoianov, R. Gilroy, B.V.K. Vijaya Kumar
ICSA Guide to Cryptography, McGrow-Hill, 1999, also available at http://www.bioscrypt.com/assets/Biometric_Encryption.pdf • 1999
View 4 Excerpts
Highly Influenced

Hadamard Matrix and Their Applications, LNM

S. S. Agaian
1985
View 3 Excerpts
Highly Influenced

Similar Papers

Loading similar papers…