Personalised cryptographic key generation based on FaceHashing

Andrew B.J. Teoh, David C.L. Ngo, Alwyn Goh

Research output: Contribution to journalArticle

88 Citations (Scopus)

Abstract

Among the various computer security techniques practice today, cryptography has been identified as one of the most important solutions in the integrated digital security system. Cryptographic techniques such as encryption can provide very long passwords that are not required to be remembered but are in turn protected by simple password, hence defecting their purpose. In this paper, we proposed a novel two-stage technique to generate personalized cryptographic keys from the face biometric, which offers the inextricably link to its owner. At the first stage, integral transform of biometric input is to discretise to produce a set of bit representation with a set of tokenised pseudo random number, coined as FaceHash. In the second stage, FaceHash is then securely reduced to a single cryptographic key via Shamir secret-sharing. Tokenised FaceHashing is rigorously protective of the face data, with security comparable to cryptographic hashing of token and knowledge key-factor. The key is constructed to resist cryptanalysis even against an adversary who captures the user device or the feature descriptor.

Original languageEnglish
Pages (from-to)606-614
Number of pages9
JournalComputers and Security
Volume23
Issue number7
DOIs
Publication statusPublished - 2004 Oct 1

Fingerprint

Biometrics
Cryptography
Security of data
Security systems
biometrics

All Science Journal Classification (ASJC) codes

  • Computer Science(all)
  • Law

Cite this

Teoh, Andrew B.J. ; Ngo, David C.L. ; Goh, Alwyn. / Personalised cryptographic key generation based on FaceHashing. In: Computers and Security. 2004 ; Vol. 23, No. 7. pp. 606-614.
@article{6beb27295cd44c2090a9fdcc442b78ad,
title = "Personalised cryptographic key generation based on FaceHashing",
abstract = "Among the various computer security techniques practice today, cryptography has been identified as one of the most important solutions in the integrated digital security system. Cryptographic techniques such as encryption can provide very long passwords that are not required to be remembered but are in turn protected by simple password, hence defecting their purpose. In this paper, we proposed a novel two-stage technique to generate personalized cryptographic keys from the face biometric, which offers the inextricably link to its owner. At the first stage, integral transform of biometric input is to discretise to produce a set of bit representation with a set of tokenised pseudo random number, coined as FaceHash. In the second stage, FaceHash is then securely reduced to a single cryptographic key via Shamir secret-sharing. Tokenised FaceHashing is rigorously protective of the face data, with security comparable to cryptographic hashing of token and knowledge key-factor. The key is constructed to resist cryptanalysis even against an adversary who captures the user device or the feature descriptor.",
author = "Teoh, {Andrew B.J.} and Ngo, {David C.L.} and Alwyn Goh",
year = "2004",
month = "10",
day = "1",
doi = "10.1016/j.cose.2004.06.002",
language = "English",
volume = "23",
pages = "606--614",
journal = "Computers and Security",
issn = "0167-4048",
publisher = "Elsevier Limited",
number = "7",

}

Personalised cryptographic key generation based on FaceHashing. / Teoh, Andrew B.J.; Ngo, David C.L.; Goh, Alwyn.

In: Computers and Security, Vol. 23, No. 7, 01.10.2004, p. 606-614.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Personalised cryptographic key generation based on FaceHashing

AU - Teoh, Andrew B.J.

AU - Ngo, David C.L.

AU - Goh, Alwyn

PY - 2004/10/1

Y1 - 2004/10/1

N2 - Among the various computer security techniques practice today, cryptography has been identified as one of the most important solutions in the integrated digital security system. Cryptographic techniques such as encryption can provide very long passwords that are not required to be remembered but are in turn protected by simple password, hence defecting their purpose. In this paper, we proposed a novel two-stage technique to generate personalized cryptographic keys from the face biometric, which offers the inextricably link to its owner. At the first stage, integral transform of biometric input is to discretise to produce a set of bit representation with a set of tokenised pseudo random number, coined as FaceHash. In the second stage, FaceHash is then securely reduced to a single cryptographic key via Shamir secret-sharing. Tokenised FaceHashing is rigorously protective of the face data, with security comparable to cryptographic hashing of token and knowledge key-factor. The key is constructed to resist cryptanalysis even against an adversary who captures the user device or the feature descriptor.

AB - Among the various computer security techniques practice today, cryptography has been identified as one of the most important solutions in the integrated digital security system. Cryptographic techniques such as encryption can provide very long passwords that are not required to be remembered but are in turn protected by simple password, hence defecting their purpose. In this paper, we proposed a novel two-stage technique to generate personalized cryptographic keys from the face biometric, which offers the inextricably link to its owner. At the first stage, integral transform of biometric input is to discretise to produce a set of bit representation with a set of tokenised pseudo random number, coined as FaceHash. In the second stage, FaceHash is then securely reduced to a single cryptographic key via Shamir secret-sharing. Tokenised FaceHashing is rigorously protective of the face data, with security comparable to cryptographic hashing of token and knowledge key-factor. The key is constructed to resist cryptanalysis even against an adversary who captures the user device or the feature descriptor.

UR - http://www.scopus.com/inward/record.url?scp=8344273612&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=8344273612&partnerID=8YFLogxK

U2 - 10.1016/j.cose.2004.06.002

DO - 10.1016/j.cose.2004.06.002

M3 - Article

AN - SCOPUS:8344273612

VL - 23

SP - 606

EP - 614

JO - Computers and Security

JF - Computers and Security

SN - 0167-4048

IS - 7

ER -