{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:45:15Z","timestamp":1762004715885,"version":"3.41.0"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2015,4,3]],"date-time":"2015-04-03T00:00:00Z","timestamp":1428019200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/2.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["EURASIP J. on Info. Security"],"published-print":{"date-parts":[[2015,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>To ensure the secure transmission of data, cryptography is treated as the most effective solution. Cryptographic key is an important entity in this process. In general, randomly generated cryptographic key (of 256 bits) is difficult to remember. However, such a key needs to be stored in a protected place or transported through a shared communication line which, in fact, poses another threat to security. As an alternative to this, researchers advocate the generation of cryptographic key using the biometric traits of both sender and receiver during the sessions of communication, thus avoiding key storing and at the same time without compromising the strength in security. Nevertheless, the biometric-based cryptographic key generation has some difficulties: privacy of biometrics, sharing of biometric data between both communicating parties (i.e., sender and receiver), and generating revocable key from irrevocable biometric. This work addresses the above-mentioned concerns. We propose an approach to generate cryptographic key from cancelable fingerprint template of both communicating parties. Cancelable fingerprint templates of both sender and receiver are securely transmitted to each other using a key-based steganography. Both templates are combined with concatenation based feature level fusion technique and generate a combined template. Elements of combined template are shuffled using shuffle key and hash of the shuffled template generates a unique session key. In this approach, revocable key for symmetric cryptography is generated from irrevocable fingerprint and privacy of the fingerprints is protected by the cancelable transformation of fingerprint template. Our experimental results show that minimum, average, and maximum Hamming distances between genuine key and impostor\u2019s key are 80, 128, and 168 bits, respectively, with 256-bit cryptographic key. This fingerprint-based cryptographic key can be applied in symmetric cryptography where session based unique key is required.<\/jats:p>","DOI":"10.1186\/s13635-015-0020-1","type":"journal-article","created":{"date-parts":[[2015,4,2]],"date-time":"2015-04-02T17:16:55Z","timestamp":1427995015000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["Fingerprint-based crypto-biometric system for network security"],"prefix":"10.1186","volume":"2015","author":[{"given":"Subhas","family":"Barman","sequence":"first","affiliation":[]},{"given":"Debasis","family":"Samanta","sequence":"additional","affiliation":[]},{"given":"Samiran","family":"Chattopadhyay","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,4,3]]},"reference":[{"unstructured":"W Stallings, Cryptography and Network Security: Principles and Practice, 5e (Prentice Hall, 2010).","key":"20_CR1"},{"unstructured":"Advance Encryption Standard (AES), Federal Information Processing Standards Publication 197 (United States National Institute of Standards and Technology (NIST), November 26, 2001).","key":"20_CR2"},{"key":"20_CR3","volume-title":"The Art of Deception: Controlling the Human Element of Security","author":"K Mitnick","year":"2002","unstructured":"K Mitnick, W Simon, S Wozniak, The Art of Deception: Controlling the Human Element of Security (Wiley, New York, 2002)."},{"unstructured":"DV Klein, in Proceedings of the 2nd USENIX Security Workshop (Portland). Foiling the cracker: A survey of, and improvements to, password security, (1990), pp. 5\u201314.","key":"20_CR4"},{"issue":"9","key":"20_CR5","doi-asserted-by":"publisher","first-page":"1081","DOI":"10.1109\/TC.2006.138","volume":"55","author":"F Hao","year":"2006","unstructured":"F Hao, R Anderson, J Daugman, Combining Crypto with Biometrics Effectively. IEEE Trans. Comput. 55(9), 1081\u20131088 (2006).","journal-title":"IEEE Trans. Comput"},{"issue":"6","key":"20_CR6","doi-asserted-by":"publisher","first-page":"948","DOI":"10.1109\/JPROC.2004.827372","volume":"92","author":"U Uludag","year":"2004","unstructured":"U Uludag, S Pankanti, S Prabhakar, AK Jain, Biometric Cryptosystems: Issues and Challenges. Proc. IEEE. 92(6), 948\u2013960 (2004).","journal-title":"Proc. IEEE"},{"key":"20_CR7","volume-title":"Handbook of Fingerprint Recognition","author":"D Maltoni","year":"2003","unstructured":"D Maltoni, D Maio, AK Jain, S Prabhakar, Handbook of Fingerprint Recognition (Springer- Verlag, New York, 2003)."},{"issue":"4","key":"20_CR8","doi-asserted-by":"publisher","first-page":"744","DOI":"10.1109\/TIFS.2007.908165","volume":"2","author":"K Nandakumar","year":"2007","unstructured":"K Nandakumar, A Jain, S Pankanti, Fingerprint-based fuzzy vault: Implementation and performance. IEEE Trans. Inf. Forensics Secur. 2(4), 744\u2013757 (2007).","journal-title":"IEEE Trans. Inf. Forensics Secur"},{"key":"20_CR9","first-page":"45","volume-title":"Proceedings of the 2003 ACM SIGMM workshop on Biometrics methods and applications","author":"N CT Charles","year":"2003","unstructured":"N CT Charles, DJ Kiyavash, in Proceedings of the 2003 ACM SIGMM workshop on Biometrics methods and applications. Lin, Secure smartcardbased fingerprint authentication (ACMNew York, NY, USA, 2003), pp. 45\u201352."},{"key":"20_CR10","first-page":"v\/609","volume-title":"Proceedings (ICASSP\u201905). IEEE International Conference on Acoustics, Speech, and Signal Processing, Vol. 5","author":"S Yang","year":"2005","unstructured":"S Yang, I Verbauwhede, in Proceedings (ICASSP\u201905). IEEE International Conference on Acoustics, Speech, and Signal Processing, Vol. 5. Automatic secure fingerprint verification system based on fuzzy vault scheme (IEEEPhiladelphia, Pennsylvania, USA, 2005), pp. v\/609\u2013v\/612."},{"key":"20_CR11","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1007\/978-3-540-88458-3_4","volume-title":"Proc. Adv. Concepts Intell. Vis. Syst., LNCS 5259","author":"S Dutta","year":"2008","unstructured":"S Dutta, A Kar, BN Chatterji, NC Mahanti, in Proc. Adv. Concepts Intell. Vis. Syst., LNCS 5259. Network Security Using Biometric And Cryptography (Springer BerlinHeidelberg, 2008), pp. 38\u201344."},{"issue":"2","key":"20_CR12","first-page":"28","volume":"7","author":"A Jagadeesan","year":"2010","unstructured":"A Jagadeesan, K Duraiswamy, Secured Cryptographic Key Generation from Multimodal Biometrics: Feature Level Fusion of Fingerprint and Iris. Int. J. Comput. Sci. Inform. Secur. 7(2), 28\u201337 (2010).","journal-title":"Int. J. Comput. Sci. Inform. Secur"},{"issue":"6","key":"20_CR13","first-page":"16","volume":"2","author":"A Jagadeesan","year":"2010","unstructured":"A Jagadeesan, T Thillaikkarasi, K Duraiswamy, Cryptographic Key Generation from Multiple Biometrics Modalities: Fusing Minutiae with Iris Feature. Int. J. Comput. Appl. 2(6), 16\u201326 (2010).","journal-title":"Int. J. Comput. Appl"},{"key":"20_CR14","first-page":"202","volume-title":"Proceedings of IEEE Symposium on Security and Privacy","author":"F Monrose","year":"2001","unstructured":"F Monrose, MK Reiter, Q Li, S Wetzel, in Proceedings of IEEE Symposium on Security and Privacy. Cryptographic key generation from voice (IEEE Computer SocietyWashington, DC USA, 2001), pp. 202\u2013213."},{"issue":"4","key":"20_CR15","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1108\/09685220210436949","volume":"10","author":"H Feng","year":"2002","unstructured":"H Feng, CC Wah, Private key generation from on-line handwritten signatures. Inform Manag. Comput. Secur. 10(4), 159\u2013164 (2002).","journal-title":"Inform Manag. Comput. Secur"},{"key":"20_CR16","first-page":"394","volume-title":"Proceedings of 9th Biennial Conference of the Australian Pattern Recognition Society on Digital Image Computing Techniques and Applications","author":"B Chen","year":"2007","unstructured":"B Chen, V Chandran, in Proceedings of 9th Biennial Conference of the Australian Pattern Recognition Society on Digital Image Computing Techniques and Applications. Biometric Based Cryptographic Key Generation from Faces (GlenelgAustralia, 2007), pp. 394\u2013401."},{"issue":"2","key":"20_CR17","first-page":"57","volume":"11","author":"SVK Gaddam","year":"2010","unstructured":"SVK Gaddam, M Lal, Efficient Cancellable Biometric Key Generation Scheme for Cryptography. Int. J. Netw. Secur. 11(2), 57\u201365 (2010).","journal-title":"Int. J. Netw. Secur"},{"doi-asserted-by":"crossref","unstructured":"AK Jain, K Nandakumar, A Nagar, in Security and privacy in biometrics. Fingerprint Template Protection: From Theory to Practice (Springer London, 2013), pp. 187\u2013214.","key":"20_CR18","DOI":"10.1007\/978-1-4471-5230-9_8"},{"issue":"4","key":"20_CR19","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1109\/TPAMI.2007.1004","volume":"29","author":"NK Ratha","year":"2007","unstructured":"NK Ratha, S Chikkerur, JH Connell, RM Bolle, Generating Cancellable Fingerprint Templates. IEEE Trans. Pattern Anal. Mach. Intell. 29(4), 561\u2013572 (2007).","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell"},{"key":"20_CR20","doi-asserted-by":"publisher","first-page":"2115","DOI":"10.1016\/S0167-8655(03)00079-5","volume":"24","author":"A Ross","year":"2003","unstructured":"A Ross, AK Jain, Information fusion in biometrics. Pattern Recognit. Lett. 24, 2115\u20132125 (2003).","journal-title":"Pattern Recognit. Lett"},{"unstructured":"A Bodo, Method for Producing a Digital Signature with Aid of Biometric Feature. German Patent DE 4243908A1 (1994).","key":"20_CR21"},{"key":"20_CR22","volume-title":"Senior, Guide to Biometrics","author":"JH RM Bolle","year":"2003","unstructured":"JH RM Bolle, S Connell, NK Pankanti, AW Ratha, Senior, Guide to Biometrics (Springer-Verlag, New York, 2003)."},{"issue":"3","key":"20_CR23","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1147\/sj.403.0614","volume":"40","author":"NK Ratha","year":"2001","unstructured":"NK Ratha, JH Connell, R Bolle, Enhancing Security and Privacy in Biometric-Based Authentication System. IBM Syst. J. 40(3), 614\u2013634 (2001).","journal-title":"IBM Syst. J"},{"doi-asserted-by":"crossref","unstructured":"S Kanade, D Camara, E Krichen, D Petrovska-Delacre~taz, B Dorizzi, Evry F, in Proceedings of 6th Biometrics Symposium (BSYM 2008). Three Factor Scheme for Biometric-Based Cryptographic Key Regeneration Using Iris (Tampa, Florida, USA, 2008), pp. 59\u201364.","key":"20_CR24","DOI":"10.1109\/BSYM.2008.4655523"},{"doi-asserted-by":"crossref","unstructured":"S Kanade, D Petrovska-Delacre~taz, B Dorizzi, in Proceedings of Fourth IEEE International Conference on Biometrics: Theory Applications and Systems (BTAS), Washington, DC, USA, 2010. Generating and sharing biometrics based session keys for secure cryptographic applications, (2010), pp. 1\u20137.","key":"20_CR25","DOI":"10.1109\/BTAS.2010.5634545"},{"unstructured":"A Jain, U Uludag, Hiding Fingerprint Minutiae in Images. in Proceedings of Third Workshop on Automatic Identification Advanced Technologies (AutoID), (Tarrytown, New York. USA, 97\u2013102 (2002).","key":"20_CR26"},{"doi-asserted-by":"crossref","unstructured":"A Jain, U Uludag, in Proceedings of 16th International Conference on Pattern Recognition, vol. 3. Hiding a Face in a Fingerprint Image (Canada, 2002), pp. 756\u2013759.","key":"20_CR27","DOI":"10.1109\/ICPR.2002.1048100"},{"key":"20_CR28","doi-asserted-by":"publisher","first-page":"1494","DOI":"10.1109\/TPAMI.2003.1240122","volume":"25","author":"A Jain","year":"2003","unstructured":"A Jain, U Uludag, Hiding Biometric Data. IEEE Trans. Pattern Anal. Mach. Intell. 25, 1494\u20131498 (2003).","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell"},{"doi-asserted-by":"crossref","unstructured":"N Agrawal, M Savvides, in Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition. Biometric data hiding: A 3 factor authentication approach to verify identity with a single image using steganography, encryption and matching (Miami Beach Florida, 2009), pp. 85\u201392.","key":"20_CR29","DOI":"10.1109\/CVPRW.2009.5204308"},{"doi-asserted-by":"crossref","unstructured":"A Juels, M Wattenberg, in Proc. 6th ACM Conf. Computer and Communications Security, ed. by G Tsudik. A fuzzy commitment scheme (ACMNew York, NY, USA, 1999), pp. 28\u201336.","key":"20_CR30","DOI":"10.1145\/319709.319714"},{"issue":"6","key":"20_CR31","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1049\/iet-cvi.2010.0176","volume":"5","author":"C Rathgeb","year":"2011","unstructured":"C Rathgeb, A Uhl.Context-based biometric key generation for Iris. IET Comput. Vis. 5(6), 389\u2013397 (2011).","journal-title":"IET Comput. Vis"},{"unstructured":"C Yao-Jen, W Zhang, T Chen, in Proceedings of IEEE International Conference on Multimedia and Expo (ICME\u201904), Taipei, 2004, Vol. 3. Biometrics-based cryptographic key generation (IEEE, 2004), pp. 2203\u2013 2206.","key":"20_CR32"},{"doi-asserted-by":"crossref","unstructured":"N Lalithamani, KP Soman, in The 2nd International Conference on Computer Science and Information Technology. Towards Generating Irrevocable Key for Cryptography from Cancelable Fingerprints (Beijing China, 2009), pp. 563\u2013568.","key":"20_CR33","DOI":"10.1109\/ICCSIT.2009.5234801"},{"issue":"3","key":"20_CR34","first-page":"372","volume":"31","author":"N Lalithamani","year":"2009","unstructured":"N Lalithamani, KP Soman, Irrevocable Cryptographic Key Generation from Cancelable Fingerprint Templates: An Enhanced and Effective Scheme. Eur. J. Sci. Res. 31(3), 372\u2013387 (2009).","journal-title":"Eur. J. Sci. Res"},{"issue":"05","key":"20_CR35","first-page":"868","volume":"02","author":"V Lokeswara Reddy","year":"2011","unstructured":"V Lokeswara Reddy, A Subramanyam, P Chenna Reddy, Implementation of LSB Steganography and its Evaluation for Various File Formats. Int. J. Adv. Netw. Appl. 02(05), 868\u2013872 (2011).","journal-title":"Int. J. Adv. Netw. Appl"},{"key":"20_CR36","volume-title":"Handbook of Multibiometrics","author":"A Ross","year":"2006","unstructured":"A Ross, K Nandakumar, AK Jain, Handbook of Multibiometrics (Springer-Verlag, Berlin, Germany, 2006)."},{"unstructured":"Fingerprint Verification Competition FVC2000, [Online]. Available: http:\/\/bias.csr.unibo.it\/fvc2000.","key":"20_CR37"},{"unstructured":"Fingerprint Verification Competition FVC2002, [Online]. Available: http:\/\/bias.csr.unibo.it\/fvc2002.","key":"20_CR38"},{"unstructured":"Fingerprint Verification Competition FVC2004, [Online]. Available: http:\/\/biometrics.cse.msu.edu\/fvc04db\/index.html.","key":"20_CR39"},{"unstructured":"R Cappelli, A Erol, D Maio, D Maltoni, in Proceedings of 15th International Conference on Pattern Recognition, 2000, vol. 3. Synthetic Fingerprint Image Generation, (2000), pp. 475\u2013478.","key":"20_CR40"},{"doi-asserted-by":"crossref","unstructured":"C Watson, M Garris, E Tabassi, C Wilson, M McCabe, S Janet, Ko K, User\u2019s Guide to NIST Biometric Image Software (NBIS) (National Institute of Standards and Technology, Gaithersburg, MD, 2007).","key":"20_CR41","DOI":"10.6028\/NIST.IR.7392"},{"issue":"4","key":"20_CR42","doi-asserted-by":"publisher","first-page":"26:1","DOI":"10.1145\/1978802.1978805","volume":"43","author":"A Rocha","year":"2011","unstructured":"A Rocha, W Scheirer, T Boult, S Goldenstein, Vision of the unseen: Current trends and challenges in digital image and video forensics. ACM Comput. Surv. 43(4), 26:1\u201326:42 (2011).","journal-title":"ACM Comput. Surv"},{"doi-asserted-by":"crossref","unstructured":"A Westfeld, A Pfitzmann, in Proc. Information Hiding, 3rd Int\u2019,l Workshop. Attacks on Steganographic Systems (Springer Verlag, 1999), pp. 61\u201376.","key":"20_CR43","DOI":"10.1007\/10719724_5"},{"doi-asserted-by":"crossref","unstructured":"S Dumitrescu, Wu Xiaolin, N Memon, in International Conference on Image Processing, (ICIP 2002), vol.3, no., 24-28. On steganalysis of random LSB embedding in continuous-tone images (Rochester, New York, USA, 2002), pp. 641\u2013644.","key":"20_CR44","DOI":"10.1109\/ICIP.2002.1039052"},{"issue":"4","key":"20_CR45","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/93.959097","volume":"8","author":"J Fridrich","year":"2001","unstructured":"J Fridrich, M Goljan, Du Rui, Detecting LSB steganography in color, and gray-scale images. MultiMedia IEEE. 8(4), 22\u201328 (2001).","journal-title":"MultiMedia IEEE"}],"container-title":["EURASIP Journal on Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13635-015-0020-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13635-015-0020-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13635-015-0020-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13635-015-0020-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T20:54:50Z","timestamp":1747860890000},"score":1,"resource":{"primary":{"URL":"https:\/\/jis-eurasipjournals.springeropen.com\/articles\/10.1186\/s13635-015-0020-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4,3]]},"references-count":45,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,12]]}},"alternative-id":["20"],"URL":"https:\/\/doi.org\/10.1186\/s13635-015-0020-1","relation":{},"ISSN":["1687-417X"],"issn-type":[{"type":"electronic","value":"1687-417X"}],"subject":[],"published":{"date-parts":[[2015,4,3]]},"assertion":[{"value":"15 May 2014","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 March 2015","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 April 2015","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"3"}}