Document Type : Review Article

Authors

Islamic Azad University, Bardsir Branch

Abstract

Enterprises are now global, virtual and dependent on dynamic information access. Naturally, digital information is constant throughout its lifecycle. In this shifting landscape, the battlefront in security is rapidly changing from securing the perimeter to protecting the information itself. The primary advantage of public-key cryptography is increased security and convenience: private keys never need to be transmitted or revealed to anyone, but loss of a private key may cause the loss of valuable data. In this paper, we proposed a new method of using iris biometric instead of private keys, so that the iris cannot be lost, stolen or even misused. The two first stages of iris recognition are implemented as the preliminary result. Our approach is feasible to produce an iris template for using as a private key in identity identification and biometric watermarking applications.  

Keywords

[1] Anderson R.J.; “Security Engineering: A Guide to Building Dependable Distributed Systems”. New York: Wiley, (2001)
[2] Barros, J, French, J and Martin, W.; “Indexing Multi-Spectral Images for Content-Based Retrieval”, University of Virginia Technical Report, CS-94-40, (1994)
[3] Barros, J., French, J. et al.; “System for Indexing Multi-Spectral Satellite Images for Efficient Content-Based Retrieval”, Storage and Retrieval for Image and Video database, SPIE Vol. 2420, pp. 228-237, (1995)
[4] Barry C. and Ritter N.; Database of 120 Grayscale Eye Images. Lions Eye Institute, Perth Western Australia.
[5] Anoop Ms; “Public key Cryptography-applications Algorithms and Mathematical Explanations”. India: Tata Elxsi, (2007)
[6] Boles W. and Boashash B. “A Human Identification Technique Using Images of the Iris and Wavelet Transform”, IEEE Transactions on Signal Processing, Vol. 46, No. 4, (1998)
[7] Burt P. and Adelson E. “The Laplacian Pyramid as A Compact Image Code”. IEEE Transactions on Communications, Vol. 31, No. 4, (2004)
[8] C. Soutar, D. Roberge, A. Stoianov, R. Gilroy, and B. V. Kumar; “Biometric Encryption Using Image Processing”, in Proc. SPIE Optical Security and Counterfeit Deterrence Techniques II, R. L. van Renesse, Ed., Vol. 3314, No. 1, (2006)
[9] Noh S., Pae K., Lee C. and Kim J. “Multiresolution Independent Component Analysis for Iris Identification”,. International Technical Conference on Circuits/Systems, Computers and Communications, Phuket, Thailand, (2002)
[10] Clancy T., Kiyavash N., and Lin D. “Secure Smartcard-based Fingerprint Authentication,” in Proceedings ACM Multimedia 2003 Workshop on Biometric Methods and Applications, Berkeley, USA, (2003)
[11] Clancy T.C., Kiyavash N., and Lin D.J., “Secure Smart Card-Based Fingerprint Authentication”, ACM SIGMM Workshop Biometrics Methods and Application (WBMA), (2003)
[12] Connie T., Teoh A., Goh M., and Ngo D. “Palmhashing: A Novel Approach for Cancelable Biometrics”, Information Processing Letters, Vol. 93, No. 1, (2005)
[13] Duagman J., Anderson R. and Hao F. “Combining Crypto with Biometrics Effectively’’ IEEE Transactions on Computers, Vol. 55, No. 9, (2006)
[14] Ferguson N., Schneier B. “Practical Cryptography’’. Wiley. ISBN 0-471-22357-3, (2003)
[15] Field D.; “Relations between The Statistics of Natural Images And The Response Properties of Cortical Cells”. Journal of the Optical Society of America, (2005)
[16] Goh A. and Ngo C.; “Computation of Cryptographic Keys” Lecture Notes in Computer Science, Vol. 2828, (2003)
[17] Goh A. and Ngo D.C. L.; “Computation of Cryptographic Keys from Face Biometrics”, Proc. Int’l Federation for Information Processing 2003, pp. 1-13, (2003)
[18] Hao F. and Chan C.W.; “Private Key Generation from On-Line Handwritten Signatures”, Information Management & Computer Security, Vol. 10, No. 2, pp. 159-164, (2002)
[19] Hao F., Anderson R., and Daugman J. “Combining Cryptography with Biometrics Effectively”, University of Cambridge Computer Laboratory, Tech. Rep, (2005)
[20] Juels A. and Sudan M. “A Fuzzy Vault Scheme”, Proc. IEEE Int’l Symp. Information Theory, (2002)
[21] Kass M., Witkin A., Terzopoulos D. “Snakes: Active Contour Models”, International Journal of Computer Vision, (2005)
[22] Katz J., Lindell Y.; Introduction to Modern Cryptography, CRC Press. ISBN 1-58488-551-3, (2007)
[23] Lee T. “Image Representation Using 2d Gabor Wavelets”. IEEE Transactions of Pattern Analysis and Machine Intelligence, Vol. 18, No. 10, (2006)
[24] Lim S., Lee K., Byeon O. and Kim T. “Efficient Iris Recognition through Improvement of Feature Vector and Classifier”. ETRI Journal, Vol. 23, No. 2, Korea, (2001)
[25] Ma L., Wang Y. and Tan T. “Iris Recognition Using Circular Symmetric Filters”. National Laboratory of Pattern Recognition, Institute of Automation, Chinese Academy of Sciences, (2002)
[26] Chinese Academy of Sciences–Institute of Automation. Database of 756 Grayscale Eye Images. http://www.sinobiometrics.com Version 1.0, (2003)
[27] O'Gorman L., “Seven Issues with Human Authentication Technologies”, AutoID, (2002)
[28] CASIA iris image database, in http://www.sinobiometrics.com, Chinese Academy of Sciences Institute of Automation.
[29] MMU iris image database, in http://pesona.mmu.edu.my/~ccteo, Multimedia University.
[30] Prabhakar S. , Pankanti S., Jain A. K. “Biometric Recognition: Security and Privacy Verification Competition” in Proc. Int. Conf. Pattern Recognition (ICPR), Quebec City, QC, Canada, pp. 744-747, (2003)
[31] Soutar C., Roberge D., Stoianov A., Gilroy R., and Vijaya Kumar B.V.K. “Biometric Encryption”, ICSA Guide to Cryptography, McGraw-Hill, (1999)
[32] Soutar C., Roberge D., Stoianov A., Gilroy R., and Kumar B. V. “Biometric Encryption Using Image Processing”, in Proc. SPIE Optical Security and Counterfeit Deterrence Techniques II, R. L. van Renesse,Ed., Vol. 3314, No. 1. SPIE, pp. 178–188, (1998)