Open Access Open Access  Restricted Access Subscription or Fee Access

Generation of a New-Fangled Cancelable Biometric Key through Fingerprints

Sunil V.K. Gaddam, Manohar Lal


Identity theft can be effectively solved by the integration of biometrics and cryptography. Lately, researchers and experimenters have been greatly attracted by the improved performance (protection) of cryptographic keys produced from biometrics. However, there exists an eternal association between the biometric and the user, where in, alteration is not viable. Hence, a compromise of the biometric feature will consequently lead to a perpetual and possible loss of biometric for all the applications that employ it. The generation of replaceable biometric templates through cancelable biometrics has emerged as a possible solution to the aforesaid problem. In this paper, we propose an efficient approach for cryptographic key generation from fingerprint biometrics using cancelable templates. The proposed approach is composed of three phases namely: 1) Extraction of minutiae points from the fingerprint image, 2) Generation of cancelable biometric templates with added security and 3) Cryptographic key generation from the Secured cancelable template. The resultant cryptographic key thus generated is irrevocable and unique to a particular cancelable template, making the generation of new cancelable templates and cryptographic keys feasible. The experimental results portray the effectiveness of the cancelable template and the cryptographic key generated.


Biometrics, Cancelable Biometrics, Fingerprint, Minutiae points, Cryptography, Key Generation, Advanced Encryption Standard (AES).

Full Text:



John Chirillo and Scott Blaul, "Implementing Biometric Security," Wiley Red Books, ISBN: 978-0764525025, April 2003.

Anil K. Jain, Arun Ross, Salil Prabhakar, "An Introduction to Biometric Recognition", IEEE Transactions On Circuits And Systems For Video Technology, Vol. 14, No. 1, 2004.

A. Juels and M. Wattenberg, “A fuzzy commitment scheme,” In Proceedings of the 6th ACM Conference on Computer and Communication Security, pages 28–36, November 1999.

F. Monrose, M. K. Reiter, and S. Wetzel. “Password hardening based on keystroke dynamics”, In Proceedings of the 6th ACM Conference on Computer and Communications Security, pages 73–82, November 1999.

“RSA Factoring Challenge” from Factoring _Challenge.

F. Hao, C.W. Chan, “Private Key generation from on-line handwritten signatures,” Information Management & Computer Security, Issue 10, No. 2, pp. 159–164, 2002.

A. Goh, D.C.L. Ngo, “Computation of cryptographic keys from face biometrics,” International Federation for Information Processing 2003,Springer-Verlag, LNCS 2828, pp. 1–13, 2003.

Advanced encryption standard (AES), Federal information processing standards publication 197, National Institute of Standards and Technology. (2001).

W. Stallings, Cryptography and Network Security: Principles and Practices, 3rd ed. Upper Saddle River, NJ: Prentice-Hall, 2003.

D. V. Klein, “Foiling the cracker: a survey of, and improvements to, password security,” in Proc. 2nd USENIX Workshop Security, pp.5–14,1990.

U. Uludag, S. Pankanti, P. S., and A. Jain, “Biometric cryptosystems: Issues and challenges,” Proceedings of the IEEE 92, pp. 948–960, June 2004.

Andrew Beng Jin Teoh, Kar-Ann Toh and Wai Kuan Yip,”2^N Discretisation of BioPhasor in Cancelable Biometrics”, Advances in Biometrics, Springer Berlin / Heidelberg, Vol. 4642, 2007.

Nagar, A. and Chaudhury, S, "Biometrics based Asymmetric Cryptosystem Design Using Modified Fuzzy Vault Scheme," 18th International Conference on Pattern Recognition, Vol. 4, pp: 537-540,2006.

Russell Ang, Reihaneh Safavi-Naini, Luke McAven: “Cancelable Key-Based Fingerprint Templates.”, Australasian conference on information security and privacy, vol. 3574, pp. 242-252, 2005.

Y C Feng.. Pong C Yuen. and Anil K Jain., “A Hybrid Approach for Face Template Protection,” , In Proc. of SPIE Conference of Biometric Technology for Human Identification , Vol. 6944, 2008.

Nalini Ratha, Jonathan Connell, Ruud M. Bolle, Sharat Chikkerur, "Cancelable Biometrics: A Case Study in Fingerprints", International Conference on Pattern Recognition, Vol. 4, pp. 370-373, 2006.

Ratha, N.K.; Chikkerur, S.; Connell, J.H.; Bolle, R.M., "Generating Cancelable Fingerprint Templates", IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol: 29, No: 4, pp:561 - 572, 2007.

Beng, A., Jin Teoh, Kar-Ann Toh, "Secure biometric-key generation with biometric helper”, 3rd IEEE Conference on Industrial Electronics and Applications, pp: 2145-2150, 2008.

Sanaul Hoque, Michael Fairhurst, Gareth Howells "Evaluating Biometric Encryption Key Generation Using Handwritten Signatures", Bio-inspired, Learning and Intelligent Systems for Security, pp: 17-22, 2008.

Andrew B. J. Teoh, Yip Wai Kuan, Sangyoun Lee," Cancelable biometrics and annotations on BioHash ", Pattern Recognition, Vol: 41, No:6, pp: 2034-2044, 2008.

Andrew Teoh Beng Jin, Tee Conniea, "Remarks on Bio-Hashing based cancelable biometrics in verification system", Neurocomputing, Vol: 69, No: 16-18, pp:2461-2464, 2006.

Huijuan Yang, Xudong Jiang, Alex C. Kot, "Generating secure cancelable fingerprint templates using local and global features", 2nd IEEE International Conference on Computer Science and Information Technology, 2009.

B. Prasanalakshmi ,A. Kannammal, "A secure cryptosystem from palm vein biometrics", ACM International Conference Proceeding Series; Seoul, Korea , Vol. 403 , pp: 1401-1405, 2009.

H. A. Garcia-Baleon, V. Alarcon-Aquino ,O. Starostenko,

"K-Medoids-Based Random Biometric Pattern for Cryptographic Key Generation", Proceedings of the 14th Iberoamerican Conference on Pattern Recognition: Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, Vol. 5856, pp: 85 - 94, 2009.

Chang Yao-Jen, Wende Zhang, Chen Tsuhan, "Biometrics-based cryptographic key generation", IEEE International Conference on Multimedia and Expo, Vol: 3, pp: 2203- 2206, 2004.

B. Chen, V. Chandran, "Biometric Based Cryptographic Key Generation from Faces", Proceedings of the 9th Biennial Conference of the Australian Pattern Recognition Society on Digital Image Computing Techniques and Applications, pp: 394-401, 2007.

Lam, L., Seong-Whan Lee, and Ching Y. Suen, "Thinning

Methodologies-A Comprehensive Survey," IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol 14, No. 9, pp: 869-885, September 1992.

Joseph W. Goodman, Brian A. Wandell, “Image Systems Engineering Program, Stanford University”, International Conference on Image Processing (ICIP), Vol: 1, pp: 435-438, 1996.

L.C. Jain, U.Halici, I. Hayashi, S.B. Lee and S.Tsutsui., “Intelligent biometric techniques in fingerprint and face recognition”, The Crc International Series on Computational Intelligence, CRC Press, 1999.

D.Maio and D. Maltoni. “Direct gray-scale minutiae detection in fingerprints”, IEEE Trans. Pattern Anal. And Machine Intell., Vol: 19, No:1, pp: 27-40, 1997.

Amir Hussain, Stefano Squartini, and Francesco Piazza, "Novel Sub-band Adaptive systems incorporating Wiener filtering for Binaural Speech Enhancement", A ISCA tutorial research workshop on Non-Linear Speech processing, NOLISP, Barcelona, April 19-22, 2005.

Saeed V. Vaseghi, "Advanced signal processing and digital noise reduction (Paperback)", John Wiley & Sons Inc, pp: 416, July 1996.

D.Gnanadurai, and V.Sadasivam, An Efficient Adaptive Thresholding Technique for Wavelet Based Image Denoising, International Journal of Signal Processing, vol: 2, No: 2, 2005.

Yahia S. Halabi, Zaid SA”SA, Faris Hamdan, Khaled Haj Yousef, "Modeling Adaptive Degraded Document Image Binarization and Optical Character System", European Journal of Scientific Research, Vol. 28, No.1, pp.14-32, 2009.

Sunil V. K. Gaddam and Manohar Lal, "Efficient Cancelable Biometric Key Generation Scheme for Cryptography", International Journal of Network Security, Vol: 10, No: 3, pp: 223-231, 2010 [Accepted for publication]


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.