You are on page 1of 5

Enhancing Security Of Biocrypto System Using Palmprint and

Error Correction Codes

Er. R.N.Verma Department Of IT, B.I.E.T, Jhanshi,India


Asst. Prof. Mrs. Ritu Agarwal, Dept. Of IT, Delhi Technological University, New Delhi,India, ritu.jeea@gmail.com
Vijay Kumar,Department Of IT, Delhi Technological Universsity,New Delhi,India,vijay04it@gmail.com
Devendra Kumar, Department Of IT, B.I.E.T, Jhanshi,India

Abtract:
Information exchange across the Internet, and the the secret or private key, respectively. Because of the
storage of sensitive data on open networks, large size of a cryptographically strong key, it would
cryptography is becoming an increasingly clearly not be feasible to require the user to
important feature of computer security. Existing remember .This encrypted key can be stored on a
asymmetric encryption algorithms require the computer’s hard drive. To retrieve the cryptographic
storage of the secret private key. Stored keys are key, the user is prompted to enter the passcode,
often protected by poorly selected user passwords which will then be used to decrypt the key. There are
that can either be guessed or obtained through two main problems with the method of passcode
brute force attacks. Combining biometrics with security. First, the security of the cryptographickey,
cryptography is seen as a Possible solution. and hence the cipher system, is now only as good as
Biometric cryptography is a technique using the passcode. Due to practical problems of
biometric features to encrypt data This technique remembering various passcodes, some users tend to
proves to be more secure . This paper proposes choose simple words, phrases, or easily remembered
cryptosystem based on palmprints.Here personal data, while others resort to writing the
encryption/decryption of data is directly passcode down on an accessible document to avoid
performed by using the palmprint as a key.Due to data loss. Obviously these methods pose potential
complexity of palmprint information it is not security risks. The second problem concerns the lack
possible, to crack the system. In the encrypting of direct connection between the passcode and the
phase, a 1024 bits binary string is extracted from user. Because a passcode is not tied to a user, the
the palmprints using differential operations.Here system running the cryptographic algorithm is unable
the string is translated to a 128 bits encrypting key to differentiate between the legitimate user and an
using a Hash function, Hance at the same time, an attacker who fraudulently acquires the passcode of a
error-correct-code (ECC) is generated. generaly legitimate user.
encryption algorithms use the 128 bits encrypting In order to overcome this problem, some biometric
key to encrypt the data. In decrypting phase, the feature-based encrypting/decrypting algorithms have
1024 bits binary string extracted from the input been developed. The palmprint is a relatively new
palmprint is first corrected using the ECC. Again by biometric feature [8, 9, 10, 11, 12, 13] and has several
the using of same hash function corrected string is advantages compared with other currently available
translated to decrypting key.The data is finally features [14] palmprints contain more information
decrypted by using the decrypting key than fingerprint, so they are more distinctive;
corresponding general decryption algorithms. palmprint capture devices are much cheaper than iris
devices; palmprints also contain additional distinctive
Keywords: EEC,Hash function, Cryptography, features such as principal lines and wrinkles, which
Encryption/Decryption. can be extracted from low-resolution images; a highly
accurate biometrics system can be built by combining
1 Introduction all features of palms, such as palm geometry, ridge
and valley features, and principal lines and wrinkles,
With the proliferation of information exchange across etc. Therefore, it is suitable to use palmprints to
the Internet, and the storage of sensitive data on open implement a cryptosystem. Up to now, we failed to
networks, cryptography is becoming an increasingly find any literature to discuss palmprint encryption. In
important feature of computer security. Many this paper, we will use error-correcting theory to
cryptographic algorithms are available for securing design a palmprint cryptosystem.When palmprints
information [2]. In general, data will be secured using are captured, the position and direction of a palm may
a symmetric cipher system, while public key systems vary so that even palmprints fromthe same palmmay
will be used for digital signatures and for secure key have a little rotation and translation. Furthermore,
exchange between users. However, regardless of palms differ in size. Hence palmprint images should
whether a user deploys a symmetric or a public key be orientated and normalized before feature
system, the security is dependent on the secrecy of extraction and matching.
Thus,if an attacker could determine the bit locations
that specify the key, then the attacker could
reconstruct the embedded key from any of the other
users’ templates. If an attacker had access to the
enrollment program then he could determine the
locations of the key by, for example, enrolling several
people in the system using identical keys for each
enrollment. The attacker then needs only to locate
those bit locations with common information across
Fig. 1. An example of the palmprint and the normalized the templates. A third method is to use data derived
image. directly from a biometric image.
In this paper, we use the preprocessing technique 2 Feature Extraction and Matching
described in [13] to align and normalize the 2.1 DiffCode Extraction
palmprints. After preprocessing, the central part of Let I denote a palmprint image and Gσ denote a 2D
the image, which is 128×128, is cropped to represent Gaussian filter with the variance σ. The palmprint is
the whole palmprint. Fig. 1 shows a palmprint and the first filtered by Gσ as below:
normalized image. The rest of this paper is organized If = I * Gσ
as follows. Section 2 describes the feature extraction where * is the convolution operator.Then the
and matching. Section 3 presents the palmprint difference of If in the horizontal direction is computed
cryptosystem. Section 4 contains some experimental as following:
results and analysis. And Section 5 provides some D = If *b
conclusions.to passcode protection, biometric b = [−1, 1]
authentication offers a new mechanism for key where * is the convolution operator. Finally, the
security by using a biometric to secure the palmprint is encoded according to the sign of each
cryptographic key. Instead of entering a passcode to pixel of D:
access the cryptographic key, the use of this key is
guarded by biometric authentication. When a user
wishes to access a secured key, he or she will be
prompted to allow for the capture of a biometric
sample. If this verification sample matches the C is called DiffCode of the palmprint I. The size of the
enrollment template, then the key is released and can preprocessed palmprint is 128×128. Extra
be used to encrypt or decrypt the desired data. Thus, experiments shows that the image with 32×32 is
biometric authentication can replace the use of enough for the DiffCode extraction and matching.
passcodes to secure a key. This offers both Therefore, before compute the DiffCode, we resize the
convenience, as the user no longer has to remember a image from 128×128 to 32×32. Hence the size of the
passcode, and secure identity confirmation, since only DiffCode is 32×32. Fig. 2 shows some examples of
the valid user can release the key. There are various DiffCode. From this figure, the DiffCode preserves the
methods that can be deployed to secure a key with a structure information of the lines on a palm.
biometric. One method involves remote template
matching and key storage[9]. The biometric image is
captured and the corresponding template is sent to a
secure location for template comparison. If the user is
verified, then the key is released from the secure
location. This provides a convenient mechanism for
the user, as they no longer need to remember a
passcode. This method would work well in a physical
access application where the templates and keys may
be stored in asecure location physically separated
from the image capture device. In this scenario, the
communication line must also be secured to avoid
eavesdropper attacks.
However, for personal computer use, the keys would
likely be stored in the clear on a user’s hard drive,
which is not secure. A second method involves hiding Fig. 2. Some examples of DiffCodes. (a) and (b) are two
the cryptographic key within the enrollment template palmprint samples from a palm; (c) and (d) are two
itself via a trusted (secret) bit-replacement palmprint samples from another palm; (e)(h) are the
algorithm[6]. Upon successful authentication by DiffCodes of (a)-(d), respectively.
the user, this trusted algorithm would simply 2.2 Similarity Measurement of DiffCode
Because all DiffCodes have the same length, we can
extract the key bits from the appropriate
use Hamming distance to define their similarity. Let
locations and release the key into the system. C1, C2 be two DiffCodes, their Hamming distance
Unfortunately, this implies that the (H(C1, C2)) is defined as the number of the places
cryptographic key will be retrieved from the where the corresponding values of C1 and C2 are
same location in a template each time a different different. That is,
user is authenticated by the system.
To overcome the translation problem, we can get the
144 × 144 central part of the palmprint in the
preprocessing of decryption phase, and then resize it
to 36 × 36 to compute DiffCode. That is, in decryption
where ⊗ is the logical XOR operation. The phase, we get a DiffCode
matching distance of two DiffCodes C1 and C2 is
defined as the normalized Hamming distance:

Actually, D(C1, C2) is the percentage of the places


where C1 and C2 have different values. Obviously,
D(C1, C2) is between 0 and 1 and the smaller the (a ) Encryption Phase
matching distance, the greater the similarity between
C1 and C2. The matching score of a perfect match is 0.
Because of imperfect preprocessing, there may still be
a little translation between the palmprints captured
from the same palm at different times. To overcome
this problem, we vertically and horizontally translate
C1 a few points to get the translated ,and then, at
each translated position, compute the matching
distance between and C2. Finally, the final
matching distance is taken to be the minimum
matching distance of all the translated positions.

3 Palmprint Cryptosystem
In general, the palmprints captured from the same
hand at different time are not exactly same. However, .
they are similar enough to distinguish that they are (b) Decryption phase
from the same hand. That is, when the matching
distance between the DiffCodes C1 and C2 is less than with 36×36 size. From this larger DiffCode, we can get
a threshold T , they should be regarded as being 25 DiffCodes with 32×32, which are used one by one
computed from the same hand, and C2 should be able for decryption until success. This process is
to decrypt the information which is encrypted using equivalent to the translation the DiffCode vertically
C1. However, in general symmetric cryptosystems
and horizontally from −2 to +2 points.
(eg.AES), it is impossible to successfully finish the
decryption if the encrypting key and the decrypting
key are not exactly same. To overcome this problem, 4 Experimental Results andAnalysis
we must transform C2 to C1 before using it for We employed the PolyU PalmprintDatabase [15] to
decryption. Since both C1 and C2 are binary strings test our system. This database contains 7, 752
with the same length, we can use the error-correct- grayscale images captured from 386 different palms
coding theory to encode C1 and get its error- by a CCDbased device. These palmprints were taken
correcting code, which can correct less than T ×1024 from people of different ages and both sexes and were
errors, and then use this error-correcting code to captured twice, at an interval of around twomonths,
correct C2. If the matching distance between C1 and each time taking about 10 images from each palm.
C2 is less than T , which means that C1 and C2 are Therefore, This database contains about 20 images of
from the same hand, C2 can be exactly transformed to each palm. The size of the images in the database is
C1 using the error-correcting code. And then the 384 × 284. In our experiments, all images were
corrected C2 can be used for decryption. The preprocessed using the preprocessing technique
principle of the palmprint cryptosystem is shown in described in [13] and the central 128×128 part of the
Fig. 3. In the encrypting phase, the 32×32 = 1024 bits image was cropped to represent the whole palmprint.
DiffCode is extracted from the palmprints. Then the In the system, the Hash, error-correcting and
DiffCode is encoded to a fix length palmprint key (HC) encrypting algorithms are respectively selected as
using a Hash function (eg. MD5), and at the same MD5, BCH and AES. For a (n, k, t) BCH code, n, k and t
time, an error-correct-code (ECC) of the DiffCode is respectively mean the length of the code, the length of
generated using an existed algorithm (eg. BCH). Some the information and the number of the errors which
general encryption algorithms (eg. AES) use this can be corrected by this code. For our system, t can be
palmprint key to encrypt the secret information S. In computed using its distance threshold T as following:
decrypting phase, the 1024 bits DiffCode extracted t = 1024 × T
from the input palmprint is first corrected using the
ECC. Then the corrected string is encoded to a And k should satisfy the following conditions
palmprint key (HC) using the same Hash function. k ≥ 1024
Finally, the corresponding general decryption If k > 1024, we can append (k − 1024) zeros to the
algorithms use this key to decrypt theinformation (S). 1024 bits DiffCode to get the message with length k
and then encode it using BCH encoding. Therefore, to Table 1. Typical FAR, FRR, corespoding thresholds and
error-correcting encoding, we should know the number of error bits
distance threshold of the system, which is dependent
on the application. To investigate the relationship
between the threshold and accuracy, each sample in
the database is matched against the other palmprints
in the same database. The matching between
palmprints which were captured from the same palm
is defined as a genuine matching. Otherwise, the
matching is defined as an impostor matching. A total
of 30, 042, 876 (7, 752 × 7, 751/2) matchings have
been performed, in which 74, 086 matchings are
genuine matchings. The FAR and FRR at different
thresholds are plotted in Fig. 4. Some typical FARs,
FRRs, the corresponding thresholds and the numbers
of the error bits are listed in Table 1. We can select a
threshold according to the requirement of the
applications. In our experiments, we choose the
distance threshold as 0.2949. According to Table 1,
the corresponding FAR, FRR and the number of errors
which should be corrected are 0.0012% , 3.0169%,
and 302. According to the theory of BCH error-
correcting-code, (4095, 1412, 302) BCH code can be
used in our system. Now we analyze the attacks to
this system.If the attack happens at Point A (See Fig. 5 Conclusions
3), that is, the attacker uses some palmprints to attack This paper proposed a almprint cryptosystem. This
the system. In this case, the possibility to successfully system extracted binary DiffCode feature from
decrypt the message is about 0.0012% ≈ , which palmprint and used the error-correcting theory to
means that to decrypt the message, a cracker has to remove the difference between the DiffCodes from
find about different palmprints to try, which is the same palms. The system can effectively encrypt
very difficult to get so many palmprints in a short and decrypt messages and it is almost impossible to
time. If the attack happens at Point B (See Fig. 3), that crack it.
is, the cracker attacks the system by directly
generating the DiffCode for the error-correcting. The References
possibility to successfully decrypt the message in this 1. Uludag, U., Pankant, S., Prabhakar, S., Jain, A.K.:
way is p: Biometric cryptosystems: issues and challenges.
Proceedings of the IEEE 92, 948–960 (2004)
2. Freire-Santos, M., Fierrez-Aguilar, J., Ortega-Garcia,
If the attack happens at Point C (See Fig. 3), that is, the : Cryptographic key generation using handwritten
cracker generates the corrected DiffCode to attack the signature. In: Proc. of SPIE, Biometric Technologies
for Human Identificatin III (2006)
system, the possibility to success is . If the
3. Uludag, U., Pankant, S., Jain, A.K.: Fuzzy vault for
attack happens at Point D (See Fig. 3), that is, the
fingerprints. In: Kanade, T., Jain, A., Ratha, N.K. (eds.)
cracker generates the hashed code to attack the
AVBPA 2005. LNCS, vol. 3546, pp. 310–319. Springer,
system, the possibility to success is . Heidelberg (2005)
4. Monrose, F., Reiter, M.K., Li, Q.,Wetzel, S.: Using
voice to generate cryptographic keys.
In:ASpeakerOdyssey,TheSpeakerRecognitionWorksh
op, pp. 202–213 (2001)
5. Juels, A., Sudan, M.: A fuzzy vault scheme. In: Proc.
IEEE International Symposium on Information
Theory, IEEE Computer Society Press, Los Alamitos
(2002)
6. Soutar, C., Roberge, D., Stojanov, S.A., Gilroy, R.,
Kumar, B.V.K.V.: Biometric encryption. ICSA Guide to
Cryptography (1999)
7. Monrose, F., Reiter, M.K., Li, Q., Lopresti, D.P., Shih,
C.: Towards speechgenerated cryptographic keys on
resource constrained devices. In: Proc. 11th USENIX
Security Symposium, pp. 283–296 (2002)
8. Zhang, D.: Palmprint Authentication. Kluwer
Academic Publishers, Dordrecht (2004)
9. Wu, X., Zhang, D., Wang, K.: Palmprint Recognition.
Fig. 4. The FAR and FRR at Different Threshold
Scientific Publishers, China (2006)
10. Wu, X., Wang, K., Zhang, D.: Fisherpalms based
palmprint recognition. Patter Recognition Letters 24,
2829–2838 (2003)
11. Duta, N., Jain, A., Mardia, K.: Matching of
palmprint. Pattern Recognition Letters 23, 477–485
(2001)
12. Han, C., Chen, H., Lin, C., Fan, K.: Personal
authentication using palm-print features. Pattern
Recognition 36, 371–381 (2003)
13. Zhang, D., Kong, W., You, J., Wong, M.: Online
palmprint identification. IEEE Transactions on
Pattern Analysis and Machine Intelligence 25, 1041–
1050 (2003)
14. Jain, A., Ross, A., Prabhakar, S.: An introduction to
biometric recognition. IEEE Transactions on Circuits
and Systems for Video Technology 14, 4–20 (2004)
15. PolyU Palmprint Palmprint Database
(http://www.comp.polyu.edu.hk/biometrics/)

You might also like