Abstract
This chapter delves into bio-cryptography, the convergence of biometrics and cryptography. It begins with basic concepts and explains how biometric data strengthens security protocols. Theoretical foundations, applications, and assessments of bio-cryptographic methods are provided. The chapter concludes with discussions on potential vulnerabilities, ethical considerations, and the trade-offs between accuracy, privacy, and security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Bibliography
K. **, J. Hu, Bio-cryptography, in Handbook of Information and Communication Security (Springer, Berlin), pp. 129–157 (2010)
A. Ometov, S. Bezzateev, N. Mäkitalo, S. Andreev, T. Mikkonen, Y. Koucheryavy, Multi-factor authentication: a survey 2(1), 1 (2018)
K. **, T. Ahmad, F. Han, J. Hu, A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment 4(5), 487–499 (2011)
W. Yang, J. Hu, S. Wang, M. Stojmenovic, An alignment-free fingerprint bio-cryptosystem based on modified voronoi neighbor structures 47(3), 1309–1320 (2014)
P. Phillips, A. Martin, C. Wilson, M. Przybocki, An introduction evaluating biometric systems 33(2), 56–63 (2000)
J.L. Wayman, A.K. Jain, D. Maltoni, D. Maio, Biometric Systems: Technology, Design and Performance Evaluation (Springer Science & Business Media) (2005)
R. de Luis-Garciá, C. Alberola-López, O. Aghzout, J. Ruiz-Alzola, Biometric identification systems 83(12), 2539–2557 (2003)
A. Jain, L. Hong, S. Pankanti, Biometric identification 43(2), 90–98 (2000)
U. Uludag, A.K. Jain, Attacks on biometric systems: a case study in fingerprints, in SPIE Proceedings, ed. by E.J.D. III, P.W. Wong (SPIE), pp. 622–633 (2004)
T. Ignatenko, F. Willems, Biometric systems: privacy and secrecy aspects 4(4), 956–973 (2009)
A. Jain, A. Ross, S. Prabhakar, An introduction to biometric recognition 14(1), 4–20 (2004)
J. Wayman, A. Jain, D. Maltoni, D. Maio, An introduction to biometric authentication systems, in Biometric Systems: Technology, Design and Performance Evaluation (Springer), pp. 1–20 (2005)
A. Rattani, B. Freni, G. L. Marcialis, F. Roli, Template update methods in adaptive biometric systems: a critical review, in Advances in Biometrics: Third International Conference, ICB 2009, Alghero, Italy, June 2-5, 2009. Proceedings 3 (Springer), pp. 847–856 (2009)
R. Saini, N. Rana, Comparison of various biometric methods 2(1), 24–30 (2014)
S. Liu, M. Silverman, A practical guide to biometric security technology 3(1), 27–32 (2001)
T. Dunstone, N. Yager, Biometric System and Data Analysis: Design, Evaluation, and Data Mining (Springer) (2009)
W. Zhao, R. Chellappa, P.J. Phillips, A. Rosenfeld, Face recognition: a literature survey 35(4), 399–458 (2003)
X. He, S. Yan, Y. Hu, P. Niyogi, H.-J. Zhang, Face recognition using laplacianfaces 27(3), 328–340 (2005)
V. Bruce, A. Young, Understanding face recognition 77(3), 305–327 (1986)
V.A. Mann, R. Diamond, S. Carey, Development of voice recognition: parallels with face recognition 27(1), 153–165 (1979)
S.J. Simon, D. Paper, User acceptance of voice recognition technology, in End-User Computing (IGI Global), pp. 965–985 (2008)
J. Daugman, New methods in iris recognition 37(5), 1167–1175 (2007)
R. Wildes, Iris recognition: an emerging biometric technology 85(9), 1348–1363 (1997)
L. Ma, T. Tan, Y. Wang, D. Zhang, Efficient iris recognition by characterizing key local variations 13(6), 739–750 (2004)
U. G. Barron, G. Corkery, B. Barry, F. Butler, K. McDonnell, S. Ward, Assessment of retinal recognition technology as a biometric method for sheep identification 60(2), 156–166 (2008)
G.P. Van Galen, H.-L. Teulings, The independent monitoring of form and scale factors in handwriting 54(1-3), 9–22 (1983)
C. Soutar, D. Roberge, A. Stoianov, R. Gilroy, B.V. Kumar, Biometric encryption using image processing, in Optical Security and Counterfeit Deterrence Techniques II, vol. 3314 (SPIE), pp. 178–188 (1998)
A. Adler, Vulnerabilities in biometric encryption systems, in Lecture Notes in Computer Science (Springer, Berlin), pp. 1100–1109 (2005)
W.J. Scheirer, T.E. Boult, Cracking fuzzy vaults and biometric encryption, in 2007 Biometrics Symposium (IEEE) (2007)
C. Soutar, D. Roberge, A. Stoianov, R. Gilroy, B.V. Kumar, Biometric encryption: enrollment and verification procedures, in Optical Pattern Recognition IX, vol. 3386 (SPIE), pp. 24–35 (1998)
A. Stoianov, T. Kevenaar, M. Van der Veen, Security issues of biometric encryption, in 2009 IEEE Toronto International Conference Science and Technology for Humanity (TIC-STH) (IEEE), pp. 34–39 (2009)
K. Simoens, P. Tuyls, B. Preneel, Privacy weaknesses in biometric sketches, in 2009 30th IEEE Symposium on Security and Privacy (IEEE), pp. 188–203 (2009)
M. Ao, S.Z. Li, Near infrared face based biometric key binding, in Advances in Biometrics (Springer, Berlin), pp. 376–385 (2009)
A. Stoianov, Cryptographically secure biometrics, in SPIE Proceedings, ed. by B.V.K.V. Kumar, S. Prabhakar, A.A. Ross (SPIE) (2010)
A.C. Weaver, Biometric authentication 39(2), 96–97 (2006)
J. Yang, Biometrics verification techniques combing with digital signature for multimodal biometrics payment system, in 2010 International Conference on Management of e-Commerce and e-Government (IEEE), pp. 405–410 (2010)
G. Hachez, J.-J. Quisquater, F. Koeune, Biometrics, access control, smart cards: a not so simple combination, in Smart Card Research and Advanced Applications: IFIP TC8/WG8. 8 Fourth Working Conference on Smart Card Research and Advanced Applications September 20–22, 2000, Bristol, United Kingdom (Springer), pp. 273–288 (2000)
R.N. Rodrigues, G.F.G. Yared, C.R.d.N. Costa, J.B.T. Yabu-Uti, F. Violaro, L.L. Ling, Biometric access control through numerical keyboards based on keystroke dynamics, in Advances in Biometrics (Springer, Berlin), pp. 640–646 (2005)
X. Hei, X. Du, Biometric-based two-level secure access control for implantable medical devices during emergencies, in 2011 Proceedings IEEE INFOCOM (IEEE) (2011)
H.-J. Kim, Biometrics, is it a viable proposition for identity authentication and access control? 14(3), 205–214 (1995)
C. Wan, L. Wang, V.V. Phoha, A survey on gait recognition 51(5), 1–35 (2018)
K. Bashir, T. **ang, S. Gong, Gait recognition without subject cooperation 31(13), 2052–2060 (2010)
L. Wang, T. Tan, H. Ning, W. Hu, Silhouette analysis-based gait recognition for human identification 25(12), 1505–1518 (2003)
S. Sprager, M. Juric, Inertial sensor-based gait recognition: a review 15(9), 22089–22127 (2015)
Ž. Emeršič, V. Štruc, P. Peer, Ear recognition: more than a survey 255, 26–39 (2017)
H. Chen, B. Bhanu, Human ear recognition in 3D 29(4), 718–737 (2007)
M. Saini, A.K. Kapoor, Biometrics in forensic identification: applications and challenges 1(2) (2016)
I. Van der Ploeg, D. Lyon, Biometrics and the body as information 57–73 (2003)
B. Schneier, The uses and abuses of biometrics 42(8), 136–136 (1999)
M. Gomez-Barrero, E. Maiorana, J. Galbally, P. Campisi, J. Fierrez, Multi-biometric template protection based on homomorphic encryption 67, 149–163 (2017)
M. Barni, T. Bianchi, D. Catalano, M.D. Raimondo, R.D. Labati, P. Failla, D. Fiore, R. Lazzeretti, V. Piuri, A. Piva, F. Scotti, A privacy-compliant fingerprint recognition system based on homomorphic encryption and fingercode templates, in 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS) (IEEE) (2010)
R. Cramer, I.B. Damgård, et al., Secure Multiparty Computation (Cambridge University Press) (2015)
I. Damgård, V. Pastro, N. Smart, S. Zakarias, Multiparty computation from somewhat homomorphic encryption, in Lecture Notes in Computer Science (Springer, Berlin), pp. 643–662 (2012)
Y. Lindell, Secure multiparty computation (MPC) (2020)
C. Fontaine, F. Galand, A survey of homomorphic encryption for nonspecialists 2007, 1–10 (2007)
X. Yi, R. Paulet, E. Bertino, Homomorphic encryption, in Homomorphic Encryption and Applications (Springer International Publishing), pp. 27–46 (2014)
M. Naehrig, K. Lauter, V. Vaikuntanathan, Can homomorphic encryption be practical?, in Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop (ACM) (2011)
C. Gentry, Fully homomorphic encryption using ideal lattices, in Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing (ACM) (2009)
R. Jain, C. Kant, Attacks on biometric systems: an overview 1(7), 283 (2015)
C. Roberts, Biometric attack vectors and defences 26(1), 14–25 (2007)
A.K. Jain, A. Ross, U. Uludag, Biometric template security: Challenges and solutions, in 2005 13th European Signal Processing Conference (IEEE), pp. 1–4 (2005)
S. Prabhakar, S. Pankanti, A.K. Jain, Biometric recognition: security and privacy concerns 1(2), 33–42 (2003)
F. Hao et al., Combining crypto with biometrics effectively 55, 1081–1088 (2006)
M. Gorman et al., Nonlinear dynamics of a convection loop: a quantitative comparison of experiment with theory 19, 255–267 (1986)
H. Haken, Analogy between higher instabilities in fluids and lasers 53, 77–78 (1975)
J. Daugman, How iris recognition works 14(1), 21–30 (2004)
A. Cavoukian, A. Stoianov, Biometric encryption 15(3), 11 (2007)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Shandilya, S.K., Datta, A., Nagar, A.K. (2023). Biometric and Bio-Cryptography. In: A Nature-Inspired Approach to Cryptology. Studies in Computational Intelligence, vol 1122. Springer, Singapore. https://doi.org/10.1007/978-981-99-7081-0_5
Download citation
DOI: https://doi.org/10.1007/978-981-99-7081-0_5
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-7080-3
Online ISBN: 978-981-99-7081-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)