CFP last date
16 December 2024
Call for Paper
January Edition
IJAIS solicits high quality original research papers for the upcoming January edition of the journal. The last date of research paper submission is 16 December 2024

Submit your paper
Know more
Reseach Article

A Novel Biometric Cryptosystem using LDPC and SHA based Iris Recognition

by K. Seetharaman, R. Ragupathy
International Journal of Applied Information Systems
Foundation of Computer Science (FCS), NY, USA
Volume 4 - Number 1
Year of Publication: 2012
Authors: K. Seetharaman, R. Ragupathy
10.5120/ijais12-450632

K. Seetharaman, R. Ragupathy . A Novel Biometric Cryptosystem using LDPC and SHA based Iris Recognition. International Journal of Applied Information Systems. 4, 1 ( September 2012), 41-47. DOI=10.5120/ijais12-450632

@article{ 10.5120/ijais12-450632,
author = { K. Seetharaman, R. Ragupathy },
title = { A Novel Biometric Cryptosystem using LDPC and SHA based Iris Recognition },
journal = { International Journal of Applied Information Systems },
issue_date = { September 2012 },
volume = { 4 },
number = { 1 },
month = { September },
year = { 2012 },
issn = { 2249-0868 },
pages = { 41-47 },
numpages = {9},
url = { https://www.ijais.org/archives/volume4/number1/267-0632/ },
doi = { 10.5120/ijais12-450632 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-07-05T10:46:51.764463+05:30
%A K. Seetharaman
%A R. Ragupathy
%T A Novel Biometric Cryptosystem using LDPC and SHA based Iris Recognition
%J International Journal of Applied Information Systems
%@ 2249-0868
%V 4
%N 1
%P 41-47
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

We use Low Density Parity Check (LDPC) error correction code to solve fuzziness i. e. , the variability and noise in iris code generated from Iris Recognition System (IRS) and Secure Hash Algorithm (SHA-512) to transform unique iris code into hash string to make them as a Cancellable Biometric. SHA-512 hash string is used as a key for 512 bits Advanced Encryption Standard (AES) encryption process. In the decryption process, Hash comparison is made between new hash generated by SHA-512 from error corrected iris code and hash stored in smart card. If authentic, 512 bits AES decryption is accomplished. Experiments indicate that, use of LDPC code results in better separation between genuine and impostor users which improves the performance of this novel cryptosystem. Security of this system is very high, which is 2256 under birthday attack. AES algorithm is enhanced by using 512 bits key andincreasingthe number of rounds.

References
  1. J. Daugman and C. Downing , "Epigenetic randomness, complexity, and singularity of human iris patterns", Proc. of the Royal Society, Biological Sciences, pp. 1737 – 1740, 2001.
  2. Ajay Kumar, Arun Passi, "Comparison and combination of iris matchers for reliable personal authentication", Pattern Recognition, vol. 43, pp. 1016–1026, 2010.
  3. S. Sanderson, J. Erbetta, "Authentication for secure environments based on iris scanning technology", IEE Colloquium on Visual Biometrics, 2000
  4. Y. Sutcu, S. Rane, J. S. Yedidia, S. C. Draper, A. Vetro, "Feature Extraction for a Slepian-Wolf Biometric System using LDPC Codes", IEEE International Symposium on Information Theory (ISIT), pp. 2297- 2301, July 2008.
  5. A. Nagar, S. Rane, A. Vetro, "Privacy and Security of Features Extracted from Minutiae Aggregates", IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP), pp. 1826-1829, March 2010.
  6. X. Wu, N. Qi, K. Wang, D. Zhang, "A Novel Cryptosystem Based on Iris Key Generation", Fourth International Conference on Natural Computation (ICNC), vol. 4, pp. 53-56, October 2008.
  7. X. Wu, K. Wang, D. Zhang, "A Cryptosystem Based on Palmprint Feature", 19th International Conference on Pattern Recognition (ICPR), pp. 1-4, December 2008.
  8. J. Daugman, "Biometric personal identification system based on iris analysis", Patent no. 5291560, 1994.
  9. K. Seetharaman, R. Ragupathy, "Iris Recognition for Personal Identification System", Procedia Engineering, Elsevier, Accepted, 2012.
  10. Chinese Academy of Sciences' Institute of Automation (CASIA), Iris image database CASIA-Iris-V3, Available online: http://www. cbsr. ia. ac. cn/IrisDatabase. htm.
  11. National Institute of Standards and Technology, "Secure hash standard", Federal Information Processing Standards Publications FIPS PUB 180, May. 1993.
  12. National Institute of Standards and Technology, "Secure hash standard", Federal Information Processing Standards Publications FIPS PUB 180-1, 1995.
  13. National Institute of Standards and Technology, "Secure hash standard", Federal Information Processing Standards Publications FIPS PUB 180-2, 2001.
  14. National Institute of Standards and Technology, "Advanced Encryption Standard", Federal Information Processing Standards Publications FIPS PUB 197, pp. 1-51, November 2001.
  15. J. Daemen and V. Rijmen, "The Design of Rijndael: AES - The Advanced Encryption Standard", Springer-Verlag, Berlin Heidelberg, 2002.
  16. J. Daemen and V. Rijmen, "The Block Cipher Rijndael", Lecture Notes in Computer Science, vol. 1820, pp. 277-284, Berlin: Springer-Verlag, 2000.
  17. E. Biham, O. Dunkelman, and N. Keller, "Related-Key Boomerang and Rectangle Attacks", Lecture Notes in Computer Science, vol. 3494, pp. 507-525, Berlin: Springer-Verlag, 2005.
  18. N. Ferguson, J. Kelsey, S. Luckset al. "Improved cryptanalysis of Rijndael", Lecture Notes in Computer Science, vol. 1978, pp. 213-230, Berlin:Springer-Verlag, 2001.
  19. Mohammed A. M. Abdullah, F. H. A. Al-Dulaimi, Waleed Al-Nuaimy, Ali Al-Ataby, "Smart card with iris recognition for high security access environment", IEEE, pp. 382-385, 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Error Correction Code Low Density Parity Check Secure Hash Algorithm Advanced Encryption Standard Iris Recognition System