Paper
1 April 1998 Biometric Encryption using image processing
Colin Soutar, Danny Roberge, Alex Stoianov, Rene Gilroy, Bhagavatula Vijaya Kumar
Author Affiliations +
Proceedings Volume 3314, Optical Security and Counterfeit Deterrence Techniques II; (1998) https://doi.org/10.1117/12.304705
Event: Photonics West '98 Electronic Imaging, 1998, San Jose, CA, United States
Abstract
Biometric EncryptionTM is an algorithm which has been developed to securely link and retrieve a digital key using the interaction of a biometric image, such as a fingerprint, with a secure block of data, known as a BioscryptTM. The key can be used, for example, as an encryption/decryption key. The BioscryptTM comprises a filter function, which is calculated using an image processing algorithm, and other information which is required to first retrieve, and then verify the validity of, the key. The key is retrieved using information from an output pattern formed via the interaction of the biometric image with the filter function. Therefore, the filter function must be designed so that it produces a consistent output pattern (and thus, key). The filter function must also be designed to be secure (i.e. information about the fingerprint cannot be retrieved from the filter function). The consistency of the output pattern and the security of the filter function are the two topics discussed in this paper.
© (1998) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Colin Soutar, Danny Roberge, Alex Stoianov, Rene Gilroy, and Bhagavatula Vijaya Kumar "Biometric Encryption using image processing", Proc. SPIE 3314, Optical Security and Counterfeit Deterrence Techniques II, (1 April 1998); https://doi.org/10.1117/12.304705
Lens.org Logo
CITATIONS
Cited by 192 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Image filtering

Biometrics

Distortion

Image encryption

Computer security

Tolerancing

Image processing

Back to Top