Browse > Article
http://dx.doi.org/10.3837/tiis.2020.07.011

PCA-CIA Ensemble-based Feature Extraction for Bio-Key Generation  

Kim, Aeyoung (Research Institute of Engineering & Technology, Hanyang University Erica)
Wang, Changda (School of Computer Science and Communication Engineering, Jiangsu University)
Seo, Seung-Hyun (Devision of Electrical Engineering, Hanyang University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.14, no.7, 2020 , pp. 2919-2937 More about this Journal
Abstract
Post-Quantum Cryptography (PQC) is rapidly developing as a stable and reliable quantum-resistant form of cryptography, throughout the industry. Similarly to existing cryptography, however, it does not prevent a third-party from using the secret key when third party obtains the secret key by deception, unauthorized sharing, or unauthorized proxying. The most effective alternative to preventing such illegal use is the utilization of biometrics during the generation of the secret key. In this paper, we propose a biometric-based secret key generation scheme for multivariate quadratic signature schemes, such as Rainbow. This prevents the secret key from being used by an unauthorized third party through biometric recognition. It also generates a shorter secret key by applying Principal Component Analysis (PCA)-based Confidence Interval Analysis (CIA) as a feature extraction method. This scheme's optimized implementation performed well at high speeds.
Keywords
Face Image-based Seed; Feature Extraction Ensemble; Bio-Key Generation; Biometric Cryptography; Multivariate Quadratic-based Post-Quantum Cryptography;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Li Da Xu, Wu He, and Shancang Li, "Internet of things in industries: A survey," IEEE Transactions on industrial informatics, vol. 10, no. 4, pp. 2233-2243, January, 2014.   DOI
2 Dustin Moody, "Let's Get Ready to Rumble. The NIST PQC "Competition"," in Proc. of First PQC Standardization Conference, April 11-13, 2018.
3 Cheol-Min Park, Aeyoung Kim, Namhun Koo, and Kyung-Ah Shim, "High Speed MQ Signature: HiMQ3," in Proc. of First PQC Standardization Conf., April 11-13, 2018.
4 Jintai Ding and Dieter Schmidt, "Rainbow, a new multivariable polynomial signature scheme," in Proc. of Int. Conf. on Applied Cryptography and Network Security, pp. 164-175, Jun 2005.
5 Kyung-Ah Shim, Cheol-Min Park, and Namhun Koo, "An existential unforgeable signature scheme based on multivariate quadratic equations," in Proc. of Int. Conf. on the Theory and Application of Cryptology and Information Security, pp. 37-64. December 3, 2017.
6 Christian Rathgeb and Andreas Uhl, "A survey on biometric cryptosystems and cancelable biometrics," EURASIP Journal on Information Security, vol. 2011, no. 1, pp. 3, December, 2011.   DOI
7 K. Xi and H. Jiankun, Bio-Cryptography in Handbook of Information and Communication Security, Peter Stavroulakis, Mark Stamp (Eds.), Springer Berlin Heidelberg, 2010.
8 S. P. Venkatachalam, P. M. Kannan, V. Palanisamy, "Combining Cryptography with Biometrics for Enhanced Security," in Proc. of Int. Conf. on Control, Automation, Communication and Energy Conservation, pp. 1-6, June 4, 2009.
9 Claude Crepeau, Rafael Dowsley, and Anderson CA Nascimento, "On the commitment capacity of unfair noisy channels," IEEE Transactions on Information Theory, vol. 66, no. 6, pp. 3745-3752, 2020.   DOI
10 Yevgeniy Dodis, Rafail Ostrovsky, Leonid Reyzin, and Adam Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," SIAM journal on computing, vol. 38, no. 1, pp. 97-139, March, 2008.   DOI
11 Fuchun Guo, Willy Susilo, and Yi Mu, "Distance-based encryption: How to embed fuzziness in biometric-based encryption," IEEE Transactions on Information Forensics and Security, vol. 11, no. 2, pp. 247-257, October, 2015.   DOI
12 Jung Hee Cheon, Jinhyuck Jeong, Dongwoo Kim, and Jongchan Lee, "A Reusable Fuzzy Extractor with Practical Storage Size: Modifying Canetti et al.'s Construction," in Proc. of Australasian Conf. on Information Security and Privacy, pp. 28-44, July 11, 2018.
13 Fuller Benjamin, Xianrui Meng, and Leonid Reyzin, "Computational Fuzzy Extractors," in Proc. of Int. Conf. on the Theory and Application of Cryptology and Information Security, pp. 174-193, December 1, 2013.
14 Canetti Ran, Benjamin Fuller, Omer Paneth, Leonid Reyzin, and Adam Smith, "Reusable Fuzzy Extractors for Low-entropy Distributions," in Proc. of Annual Int. Conf. on the Theory and Applications of Cryptographic Techniques, pp. 117-146, May 8-12, 2016.
15 Minhye Seo, Jong Hwan Park, Youngsam Kim, Sangrae Cho, Dong Hoon Lee, and Jung Yeon Hwang, "Construction of a New Biometric-Based Key Derivation Function and Its Application," Security and Communication Networks, vol. 2018, 2018.
16 Wen Yunhua, and Shengli Liu, "Reusable Fuzzy Extractor from LWE," in Proc. of Australasian Conf. on Information Security and Privacy, pp. 13-27, July 11-13, 2018.
17 Conti Vincenzo, Salvatore Vitabile, and Filippo Sorbello, "Fingerprint Traits and RSA Algorithm Fusion Technique," in Proc. of 2012 Sixth Int. Conf. on Complex, Intelligent and Software Intensive Systems, pp. 351-356, July 4-6, 2012.
18 Evgeny A. Verbitskiy, Pim Tuyls, Chibuzo Obi, Berry Schoenmakers, and Boris Skoric, "Key extraction from general nondiscrete signals," IEEE Transactions on Information Forensics and Security, vol. 5, no. 2, pp. 269-279, March, 2010.   DOI
19 P. Y. Safnitha and K. S. Kurian, "Enhancing security with fingerprint combination using RSA algorithm," International Journal of Advanced Trends in Computer Science and Engineering, vol. 3, no. 4, pp. 61-65, 2014.
20 M. Marimuthu and A. Kannammal, "Dual Fingerprints Fusion for Cryptographic Key Generation," International Journal of Computer Applications, vol. 122, no. 23, pp. 20-25, January, 2015.   DOI
21 A. H. Sulaiman, I. F. T. Al-Shaikhli, M. R. Wahiddin, S. Houri, Norziana Jamil, and A. F. Ismail, "A novel secret key generation based on image link," International Journal of Engineering and Technology (UAE), vol. 7, no. 2, pp. 23-26, January, 2018.
22 Pragati Mahale, Sonali Alwani, Vaishnavi Borade, Shreya Dhanbar, and Pooja Suvarna Khandi, "Securing System using Lossless Computational Fuzzy Extractor for IOT," International Journal of SRCSEIT, pp.28-31, 2018.
23 Kenji Yasunaga and Kosuke Yuzawa, "On the Limitations of Computational Fuzzy Extractors," Cryptology ePrint Archive, vol. 3, no. 1, pp. 7-9, March, 2018.
24 Benjamin Fuller and Lowen Peng, "When are Continuous-Source Fuzzy Extractors Possible?," IACR Cryptology ePrint Archive, vol. 2018, no. 461, pp.1-21, September, 2018.
25 Albrecht Petzoldt and Stanislav Bulygin, "Linear Recurring Sequences for the UOV Key Generation Revisited," in Proc. of Int. Conf. on Information Security and Cryptology, pp.441-455, November 28, 2012.
26 Albrecht Petzoldt, Stanislav Bulygin, and Johannes Buchmann, "CyclicRainbow-a multivariate signature scheme with a partially cyclic public key," in Proc. of Int. Conf. on Cryptology in India, pp. 33-48, December 12, 2010.
27 Zhiniang Peng and Shaohua Tang, "Circulant rainbow: A new rainbow variant with shorter private key and faster signature generation," IEEE Access, vol. 5, pp. 11877-11886, June, 2017.   DOI
28 J. Ding and D. Schmidt, "Rainbow, A New Multivariable Polynomial Signature Scheme," in Proc. of Int. Conf. on Applied Cryptography and Network Security, pp. 164-175, June 7, 2005.
29 Petzoldt Albrecht, Stanislav Bulygin, and Johannes Buchmann, "Selecting Parameters for the Rainbow Signature Scheme," in Proc. of Int. Workshop on Post-Quantum Cryptography, pp. 218-240, May 25, 2010.
30 A. Petzoldt, Selecting and Reducing Key Sizes for Multivariate Cryptography, Doctoral Dissertation, tuprints, 2013.
31 Nova Hadi Lestriandoko, Luuk Spreeuwers, and Raymond Veldhuis, "The Behavior of Principal Component Analysis and Linear Discriminant Analysis (PCA-LDA) for Face Recognition," in Proc. of 2018 Symposium on Information Theory and Signal Processing in the Benelux, pp. 133-148, May 31-1, 2018.
32 Beijing Chen, Jianhao Yang, Byeungwoo Jeon, and Xinpeng Zhang, "Kernel quaternion principal component analysis and its application in RGB-D object recognition," Neurocomputing, vol. 266, pp. 293-303, November, 2017.   DOI
33 Matthew Turk and Alex Pentland, "Eigenfaces for recognition," Journal of cognitive neuroscience, vol. 3, no. 1, pp. 71-86, January, 1991.   DOI
34 Panos P. Markopoulos, Sandipan Kundu, Shubham Chamadia, and Dimitris A. Pados, "Efficient L1-norm principal-component analysis via bit flipping," IEEE Transactions on Signal Processing, vol. 65, no. 16, pp. 4252-4264, May, 2017.   DOI
35 Tai-Xiang Jiang, Ting-Zhu Huang, Xi-Le Zhao, and Tian-Hui Ma, "Patch-based principal component analysis for face recognition," Computational intelligence and neuroscience, vol. 2017, 2017.
36 Shuisheng Zhou and Danqing Zhang, "Bilateral Angle 2DPCA for Face Recognition," IEEE Signal Processing Letters, vol. 26, no. 2, pp. 317-321, December, 2018.   DOI
37 Mrutyunjanya Sahani, Subhashree Subudhi, and Mihir Narayan Mohanty, "Design of Face Recognition based Embedded Home Security System," KSII Transactions on Internet & Information Systems, vol. 10, no. 4, April, 2016.
38 Lawrence Sirovich and Michael Kirby, "Low-dimensional procedure for the characterization of human faces," Josa a, vol. 4, no. 3, pp. 519-524, March, 1987.   DOI
39 Kyungnam Kim, "Face recognition using Principal component analysis," in Proc. of Int. Conf. on Computer Vision and Pattern Recognition, vol. 586, pp. 591, 1996.
40 Marijeta Slavkovic and Dubravka Jevtic, "Face recognition using eigenface approach," Serbian Journal of electrical engineering, vol. 9, no. 1, pp.121-130, 2012.   DOI
41 K. B. Raja, "Fingerprint recognition using minutia score matching," International Journal of Engineering Science and Technology, vol. 1(2), pp.35-42, 2009.
42 Emily J. Huang, Ethan X. Fang, Daniel F. Hanley, and Michael Rosenblum, "Constructing a confidence interval for the fraction who benefit from treatment, using randomized trial data," Biometrics, vol. 75, no. 4, pp. 1228-1239, 2019.   DOI
43 Soojeong Lee and Gaseong Lee, "Ensemble Methodology for Confidence Interval in Oscillometric Blood Pressure Measurements," Journal of Medical Systems, vol. 44, no. 5 pp. 1-9, 2020.   DOI
44 Aeyoung Kim and Sang-Ho Lee, "A scheme for predicting recognition performance by using confidence intervals," IEICE Electronics Express, vol. 9, no. 3, pp.133-139, February 2012.   DOI
45 George I. Davida, Yair Frankel, and Brian J. Matt, "On Enabling Secure Applications through Off-line Biometric Identification," in Proc of 1998 IEEE Symp. on Security and Privacy, pp. 148-157, May 6, 1998.
46 Li Qiming, Muchuan Guo, and Ee-Chien Chang, "Fuzzy Extractors for Asymmetric Biometric Representations," in Proc. of IEEE Computer Society Conf. on Computer Vision and Pattern Recognition Workshops, pp. 1-6, June 23, 2008.
47 Kim-Kwang Raymond Choo, Stefanos Gritzalis, and Jong Hyuk Park, "Cryptographic solutions for industrial Internet-of-Things: Research challenges and opportunities," IEEE Transactions on Industrial Informatics, vol. 14, no. 8, pp. 3567-3569, May, 2018.   DOI
48 Dylan Yaga, Peter Mell, Nik Roby, and Karen Scarfone, "Blockchain technology overview," NISTIR 8202, 2018.
49 Hao Feng and Chan Choong Wah, "Private key generation from on-line handwritten signatures," Information Management & Computer Security, vol. 10, no. 4, pp. 159-164, October, 2002.   DOI
50 Yagiz Sutcu, Qiming Li, and Nasir Memon, "Protecting biometric templates with sketch: Theory and practice," IEEE Transactions on Information Forensics and Security, vol. 2, no. 3, pp. 503-512, August, 2007.   DOI
51 Christian Rathgeb and Andreas Uhl, "An Iris-based Interval-mapping Scheme for Biometric Key Generation," in Proc. of the 6th Int. Symp. on Image and Signal Processing and Analysis, pp. 511-516, September 16, 2009.
52 L. Chen, S. Jordan, Y.-K. Liu, D. Moody, R. Peralta, R. Perlner, and D. S. Tone, Report on Post-Quantum Cryptography, US Department of Commerce, National Institute of Standards and Technology, IR8105, 2016.
53 A. K. Jain and S. Z. Li, Handbook of Face Recognition, Springer-Verlag, New York, 2011.
54 Kyung-Ah Shim, Cheol-Min Park, and Namhun Koo, "An existential unforgeable signature scheme based on multivariate quadratic equations," in Proc. of International Conference on the Theory and Application of Cryptology and Information Security, pp. 37-64, 2017.
55 T. Ramu and T. Arivoli, "Biometric Template Security: An Overview," in Proc. of Int. Conf. on Electronics, vol. 65, November 2, 2012.