From Iris Image to Embedded Code: System of Methods
Passwords are ubiquitous in today’s world, as are forgetting and stealing them. Biometric signs are harder to steal and impossible to forget. This paper presents a complete system of methods that takes a secret key and the iris image of the owner as input and generates a public key, suitable for sto...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2023-02-01
|
Series: | Algorithms |
Subjects: | |
Online Access: | https://www.mdpi.com/1999-4893/16/2/87 |
_version_ | 1797622848132481024 |
---|---|
author | Ivan Matveev Ilia Safonov |
author_facet | Ivan Matveev Ilia Safonov |
author_sort | Ivan Matveev |
collection | DOAJ |
description | Passwords are ubiquitous in today’s world, as are forgetting and stealing them. Biometric signs are harder to steal and impossible to forget. This paper presents a complete system of methods that takes a secret key and the iris image of the owner as input and generates a public key, suitable for storing insecurely. It is impossible to obtain source data (i.e., secret key or biometric traits) from the public key without the iris image of the owner, the irises of other persons will not help. At the same time, when the iris image of the same person is presented the secret key is restored. The system has been tested on several iris image databases from public sources. It allows storing 65 bits of the secret key, with zero possibility to unlock it with the impostor’s iris and <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mn>10.4</mn><mo>%</mo></mrow></semantics></math></inline-formula> probability to reject the owner in one attempt. |
first_indexed | 2024-03-11T09:16:05Z |
format | Article |
id | doaj.art-778e3a9882b9401fa5bac5971753b808 |
institution | Directory Open Access Journal |
issn | 1999-4893 |
language | English |
last_indexed | 2024-03-11T09:16:05Z |
publishDate | 2023-02-01 |
publisher | MDPI AG |
record_format | Article |
series | Algorithms |
spelling | doaj.art-778e3a9882b9401fa5bac5971753b8082023-11-16T18:37:34ZengMDPI AGAlgorithms1999-48932023-02-011628710.3390/a16020087From Iris Image to Embedded Code: System of MethodsIvan Matveev0Ilia Safonov1Federal Research Center “Computer Science and Control” of the Russian Academy of Sciences, Vavilov Street, 44/2, 119333 Moscow, RussiaComputer Science and Control Systems Department, National Research Nuclear University MEPhI, Kashirskoye Highway, 31, 115409 Moscow, RussiaPasswords are ubiquitous in today’s world, as are forgetting and stealing them. Biometric signs are harder to steal and impossible to forget. This paper presents a complete system of methods that takes a secret key and the iris image of the owner as input and generates a public key, suitable for storing insecurely. It is impossible to obtain source data (i.e., secret key or biometric traits) from the public key without the iris image of the owner, the irises of other persons will not help. At the same time, when the iris image of the same person is presented the secret key is restored. The system has been tested on several iris image databases from public sources. It allows storing 65 bits of the secret key, with zero possibility to unlock it with the impostor’s iris and <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mn>10.4</mn><mo>%</mo></mrow></semantics></math></inline-formula> probability to reject the owner in one attempt.https://www.mdpi.com/1999-4893/16/2/87biometric cryptosystemiris identificationerror-correcting codes |
spellingShingle | Ivan Matveev Ilia Safonov From Iris Image to Embedded Code: System of Methods Algorithms biometric cryptosystem iris identification error-correcting codes |
title | From Iris Image to Embedded Code: System of Methods |
title_full | From Iris Image to Embedded Code: System of Methods |
title_fullStr | From Iris Image to Embedded Code: System of Methods |
title_full_unstemmed | From Iris Image to Embedded Code: System of Methods |
title_short | From Iris Image to Embedded Code: System of Methods |
title_sort | from iris image to embedded code system of methods |
topic | biometric cryptosystem iris identification error-correcting codes |
url | https://www.mdpi.com/1999-4893/16/2/87 |
work_keys_str_mv | AT ivanmatveev fromirisimagetoembeddedcodesystemofmethods AT iliasafonov fromirisimagetoembeddedcodesystemofmethods |