Biometric and Bio-Cryptography

  • Chapter
  • First Online:
A Nature-Inspired Approach to Cryptology

Part of the book series: Studies in Computational Intelligence ((SCI,volume 1122))

  • 114 Accesses

Abstract

This chapter delves into bio-cryptography, the convergence of biometrics and cryptography. It begins with basic concepts and explains how biometric data strengthens security protocols. Theoretical foundations, applications, and assessments of bio-cryptographic methods are provided. The chapter concludes with discussions on potential vulnerabilities, ethical considerations, and the trade-offs between accuracy, privacy, and security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (Germany)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 117.69
Price includes VAT (Germany)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
EUR 160.49
Price includes VAT (Germany)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Bibliography

  1. K. **, J. Hu, Bio-cryptography, in Handbook of Information and Communication Security (Springer, Berlin), pp. 129–157 (2010)

    Google Scholar 

  2. A. Ometov, S. Bezzateev, N. Mäkitalo, S. Andreev, T. Mikkonen, Y. Koucheryavy, Multi-factor authentication: a survey 2(1), 1 (2018)

    Google Scholar 

  3. K. **, T. Ahmad, F. Han, J. Hu, A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment 4(5), 487–499 (2011)

    Google Scholar 

  4. W. Yang, J. Hu, S. Wang, M. Stojmenovic, An alignment-free fingerprint bio-cryptosystem based on modified voronoi neighbor structures 47(3), 1309–1320 (2014)

    Google Scholar 

  5. P. Phillips, A. Martin, C. Wilson, M. Przybocki, An introduction evaluating biometric systems 33(2), 56–63 (2000)

    Google Scholar 

  6. J.L. Wayman, A.K. Jain, D. Maltoni, D. Maio, Biometric Systems: Technology, Design and Performance Evaluation (Springer Science & Business Media) (2005)

    Google Scholar 

  7. R. de Luis-Garciá, C. Alberola-López, O. Aghzout, J. Ruiz-Alzola, Biometric identification systems 83(12), 2539–2557 (2003)

    Google Scholar 

  8. A. Jain, L. Hong, S. Pankanti, Biometric identification 43(2), 90–98 (2000)

    Google Scholar 

  9. U. Uludag, A.K. Jain, Attacks on biometric systems: a case study in fingerprints, in SPIE Proceedings, ed. by E.J.D. III, P.W. Wong (SPIE), pp. 622–633 (2004)

    Google Scholar 

  10. T. Ignatenko, F. Willems, Biometric systems: privacy and secrecy aspects 4(4), 956–973 (2009)

    Google Scholar 

  11. A. Jain, A. Ross, S. Prabhakar, An introduction to biometric recognition 14(1), 4–20 (2004)

    Google Scholar 

  12. J. Wayman, A. Jain, D. Maltoni, D. Maio, An introduction to biometric authentication systems, in Biometric Systems: Technology, Design and Performance Evaluation (Springer), pp. 1–20 (2005)

    Google Scholar 

  13. A. Rattani, B. Freni, G. L. Marcialis, F. Roli, Template update methods in adaptive biometric systems: a critical review, in Advances in Biometrics: Third International Conference, ICB 2009, Alghero, Italy, June 2-5, 2009. Proceedings 3 (Springer), pp. 847–856 (2009)

    Google Scholar 

  14. R. Saini, N. Rana, Comparison of various biometric methods 2(1), 24–30 (2014)

    Google Scholar 

  15. S. Liu, M. Silverman, A practical guide to biometric security technology 3(1), 27–32 (2001)

    Google Scholar 

  16. T. Dunstone, N. Yager, Biometric System and Data Analysis: Design, Evaluation, and Data Mining (Springer) (2009)

    Google Scholar 

  17. W. Zhao, R. Chellappa, P.J. Phillips, A. Rosenfeld, Face recognition: a literature survey 35(4), 399–458 (2003)

    Google Scholar 

  18. X. He, S. Yan, Y. Hu, P. Niyogi, H.-J. Zhang, Face recognition using laplacianfaces 27(3), 328–340 (2005)

    Google Scholar 

  19. V. Bruce, A. Young, Understanding face recognition 77(3), 305–327 (1986)

    Google Scholar 

  20. V.A. Mann, R. Diamond, S. Carey, Development of voice recognition: parallels with face recognition 27(1), 153–165 (1979)

    Google Scholar 

  21. S.J. Simon, D. Paper, User acceptance of voice recognition technology, in End-User Computing (IGI Global), pp. 965–985 (2008)

    Google Scholar 

  22. J. Daugman, New methods in iris recognition 37(5), 1167–1175 (2007)

    Google Scholar 

  23. R. Wildes, Iris recognition: an emerging biometric technology 85(9), 1348–1363 (1997)

    Google Scholar 

  24. L. Ma, T. Tan, Y. Wang, D. Zhang, Efficient iris recognition by characterizing key local variations 13(6), 739–750 (2004)

    Google Scholar 

  25. U. G. Barron, G. Corkery, B. Barry, F. Butler, K. McDonnell, S. Ward, Assessment of retinal recognition technology as a biometric method for sheep identification 60(2), 156–166 (2008)

    Google Scholar 

  26. G.P. Van Galen, H.-L. Teulings, The independent monitoring of form and scale factors in handwriting 54(1-3), 9–22 (1983)

    Google Scholar 

  27. C. Soutar, D. Roberge, A. Stoianov, R. Gilroy, B.V. Kumar, Biometric encryption using image processing, in Optical Security and Counterfeit Deterrence Techniques II, vol. 3314 (SPIE), pp. 178–188 (1998)

    Google Scholar 

  28. A. Adler, Vulnerabilities in biometric encryption systems, in Lecture Notes in Computer Science (Springer, Berlin), pp. 1100–1109 (2005)

    Google Scholar 

  29. W.J. Scheirer, T.E. Boult, Cracking fuzzy vaults and biometric encryption, in 2007 Biometrics Symposium (IEEE) (2007)

    Google Scholar 

  30. C. Soutar, D. Roberge, A. Stoianov, R. Gilroy, B.V. Kumar, Biometric encryption: enrollment and verification procedures, in Optical Pattern Recognition IX, vol. 3386 (SPIE), pp. 24–35 (1998)

    Google Scholar 

  31. A. Stoianov, T. Kevenaar, M. Van der Veen, Security issues of biometric encryption, in 2009 IEEE Toronto International Conference Science and Technology for Humanity (TIC-STH) (IEEE), pp. 34–39 (2009)

    Google Scholar 

  32. K. Simoens, P. Tuyls, B. Preneel, Privacy weaknesses in biometric sketches, in 2009 30th IEEE Symposium on Security and Privacy (IEEE), pp. 188–203 (2009)

    Google Scholar 

  33. M. Ao, S.Z. Li, Near infrared face based biometric key binding, in Advances in Biometrics (Springer, Berlin), pp. 376–385 (2009)

    Google Scholar 

  34. A. Stoianov, Cryptographically secure biometrics, in SPIE Proceedings, ed. by B.V.K.V. Kumar, S. Prabhakar, A.A. Ross (SPIE) (2010)

    Google Scholar 

  35. A.C. Weaver, Biometric authentication 39(2), 96–97 (2006)

    Google Scholar 

  36. J. Yang, Biometrics verification techniques combing with digital signature for multimodal biometrics payment system, in 2010 International Conference on Management of e-Commerce and e-Government (IEEE), pp. 405–410 (2010)

    Google Scholar 

  37. G. Hachez, J.-J. Quisquater, F. Koeune, Biometrics, access control, smart cards: a not so simple combination, in Smart Card Research and Advanced Applications: IFIP TC8/WG8. 8 Fourth Working Conference on Smart Card Research and Advanced Applications September 20–22, 2000, Bristol, United Kingdom (Springer), pp. 273–288 (2000)

    Google Scholar 

  38. R.N. Rodrigues, G.F.G. Yared, C.R.d.N. Costa, J.B.T. Yabu-Uti, F. Violaro, L.L. Ling, Biometric access control through numerical keyboards based on keystroke dynamics, in Advances in Biometrics (Springer, Berlin), pp. 640–646 (2005)

    Google Scholar 

  39. X. Hei, X. Du, Biometric-based two-level secure access control for implantable medical devices during emergencies, in 2011 Proceedings IEEE INFOCOM (IEEE) (2011)

    Google Scholar 

  40. H.-J. Kim, Biometrics, is it a viable proposition for identity authentication and access control? 14(3), 205–214 (1995)

    Google Scholar 

  41. C. Wan, L. Wang, V.V. Phoha, A survey on gait recognition 51(5), 1–35 (2018)

    Google Scholar 

  42. K. Bashir, T. **ang, S. Gong, Gait recognition without subject cooperation 31(13), 2052–2060 (2010)

    Google Scholar 

  43. L. Wang, T. Tan, H. Ning, W. Hu, Silhouette analysis-based gait recognition for human identification 25(12), 1505–1518 (2003)

    Google Scholar 

  44. S. Sprager, M. Juric, Inertial sensor-based gait recognition: a review 15(9), 22089–22127 (2015)

    Google Scholar 

  45. Ž. Emeršič, V. Štruc, P. Peer, Ear recognition: more than a survey 255, 26–39 (2017)

    Google Scholar 

  46. H. Chen, B. Bhanu, Human ear recognition in 3D 29(4), 718–737 (2007)

    Google Scholar 

  47. M. Saini, A.K. Kapoor, Biometrics in forensic identification: applications and challenges 1(2) (2016)

    Google Scholar 

  48. I. Van der Ploeg, D. Lyon, Biometrics and the body as information 57–73 (2003)

    Google Scholar 

  49. B. Schneier, The uses and abuses of biometrics 42(8), 136–136 (1999)

    Google Scholar 

  50. M. Gomez-Barrero, E. Maiorana, J. Galbally, P. Campisi, J. Fierrez, Multi-biometric template protection based on homomorphic encryption 67, 149–163 (2017)

    Google Scholar 

  51. M. Barni, T. Bianchi, D. Catalano, M.D. Raimondo, R.D. Labati, P. Failla, D. Fiore, R. Lazzeretti, V. Piuri, A. Piva, F. Scotti, A privacy-compliant fingerprint recognition system based on homomorphic encryption and fingercode templates, in 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS) (IEEE) (2010)

    Google Scholar 

  52. R. Cramer, I.B. Damgård, et al., Secure Multiparty Computation (Cambridge University Press) (2015)

    Google Scholar 

  53. I. Damgård, V. Pastro, N. Smart, S. Zakarias, Multiparty computation from somewhat homomorphic encryption, in Lecture Notes in Computer Science (Springer, Berlin), pp. 643–662 (2012)

    Google Scholar 

  54. Y. Lindell, Secure multiparty computation (MPC) (2020)

    Google Scholar 

  55. C. Fontaine, F. Galand, A survey of homomorphic encryption for nonspecialists 2007, 1–10 (2007)

    Google Scholar 

  56. X. Yi, R. Paulet, E. Bertino, Homomorphic encryption, in Homomorphic Encryption and Applications (Springer International Publishing), pp. 27–46 (2014)

    Google Scholar 

  57. M. Naehrig, K. Lauter, V. Vaikuntanathan, Can homomorphic encryption be practical?, in Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop (ACM) (2011)

    Google Scholar 

  58. C. Gentry, Fully homomorphic encryption using ideal lattices, in Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing (ACM) (2009)

    Google Scholar 

  59. R. Jain, C. Kant, Attacks on biometric systems: an overview 1(7), 283 (2015)

    Google Scholar 

  60. C. Roberts, Biometric attack vectors and defences 26(1), 14–25 (2007)

    Google Scholar 

  61. A.K. Jain, A. Ross, U. Uludag, Biometric template security: Challenges and solutions, in 2005 13th European Signal Processing Conference (IEEE), pp. 1–4 (2005)

    Google Scholar 

  62. S. Prabhakar, S. Pankanti, A.K. Jain, Biometric recognition: security and privacy concerns 1(2), 33–42 (2003)

    Google Scholar 

  63. F. Hao et al., Combining crypto with biometrics effectively 55, 1081–1088 (2006)

    Google Scholar 

  64. M. Gorman et al., Nonlinear dynamics of a convection loop: a quantitative comparison of experiment with theory 19, 255–267 (1986)

    Google Scholar 

  65. H. Haken, Analogy between higher instabilities in fluids and lasers 53, 77–78 (1975)

    Google Scholar 

  66. J. Daugman, How iris recognition works 14(1), 21–30 (2004)

    Google Scholar 

  67. A. Cavoukian, A. Stoianov, Biometric encryption 15(3), 11 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shishir Kumar Shandilya .

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Shandilya, S.K., Datta, A., Nagar, A.K. (2023). Biometric and Bio-Cryptography. In: A Nature-Inspired Approach to Cryptology. Studies in Computational Intelligence, vol 1122. Springer, Singapore. https://doi.org/10.1007/978-981-99-7081-0_5

Download citation

Publish with us

Policies and ethics

Navigation