2020
DOI: 10.3837/tiis.2020.07.011
|View full text |Cite
|
Sign up to set email alerts
|

PCA-CIA Ensemble-based Feature Extraction for Bio-Key Generation

Abstract: Post-Quantum Cryptography (PQC) is rapidly developing as a stable and reliable quantum-resistant form of cryptography, throughout the industry. Similarly to existing cryptography, however, it does not prevent a third-party from using the secret key when third party obtains the secret key by deception, unauthorized sharing, or unauthorized proxying. The most effective alternative to preventing such illegal use is the utilization of biometrics during the generation of the secret key. In this paper, we propose a … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 36 publications
0
4
0
Order By: Relevance
“…Approaches for generating cryptographic key from biometrics have considered various biometric traits, such as fingerprint [12][13][14][15][16][17] finger vein [18], iris [19], face [20,21], voice [22], handwritten signature [23], gait [24][25][26][27], ECG [28,29], retina [30] and multi-modal [31][32][33].…”
Section: Fig 1 Generation Of Cryptographic Keys From Biometricsmentioning
confidence: 99%
See 1 more Smart Citation
“…Approaches for generating cryptographic key from biometrics have considered various biometric traits, such as fingerprint [12][13][14][15][16][17] finger vein [18], iris [19], face [20,21], voice [22], handwritten signature [23], gait [24][25][26][27], ECG [28,29], retina [30] and multi-modal [31][32][33].…”
Section: Fig 1 Generation Of Cryptographic Keys From Biometricsmentioning
confidence: 99%
“…In the majority of the above approaches, cryptographic key (or part of it) is obtained by the binary encoding of decimal values (e.g., principal component [20], length and angle ratio [14], the Euclidean distances [15,16]). In binary codebased approaches, small variations in these values have the maximum effects on the generated key bit strings.…”
Section: Fig 1 Generation Of Cryptographic Keys From Biometricsmentioning
confidence: 99%
“…1.Building group category in real-time QoS matrix data. User group category and service group category are obtained by Principal Component Analysis (PCA) [24] and K-means algorithm. And the information of group category is used to modeling a new regularization term in matrix factorization model.…”
Section: Introductionmentioning
confidence: 99%
“…Aeyoung Kim et al [33] proposed a secret key prevention technique for any third party using multivariate biometric key functions. A short key is generated for a specific use only with principal component analysis and confidence interval analysis techniques.…”
mentioning
confidence: 99%