Priyabrata Dash , Debasis Samanta , Monalisa Sarma , Ashok Kumar Das , Athanasios V. Vasilakos
{"title":"Privacy preserving unique robust and revocable passcode generation from fingerprint data","authors":"Priyabrata Dash , Debasis Samanta , Monalisa Sarma , Ashok Kumar Das , Athanasios V. Vasilakos","doi":"10.1016/j.cose.2025.104698","DOIUrl":null,"url":null,"abstract":"<div><div>This research explores generating passcodes from fingerprint images. The investigation unfolds through a three-step process: (a) fixed length feature vector generation from minutia features, (b) stable binary feature vector generation from the fixed length feature vector, and (c) passcode generation from the stable binary feature vector. The main research objectives of this work are: (1) how a unique and robust binary pattern can be generated from a fingerprint image, (2) from this binary bit pattern, how a passcode can be generated satisfying non-linkable and revocable properties, and (3) how an attacker cannot guess the source biometric given a passcode thus preserving the privacy of the fingerprint data. The generated passcode can be applied in many applications, such as unique identity generation for authentication without enrollment, encryption key generation for network security, remote authentication protocol or distributed systems, data storage security, digital wallet, etc. The proposed approach has been validated with FVC2002 and FVC2004, and results show impressive genuine acceptance rates of 99.31% and 99.25%, with 0% false acceptance rates. Further, the generated passcodes pass NIST and Diehard randomness tests, substantiating the potential key generation technique with high intra-similarity and low inter-similarity.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"159 ","pages":"Article 104698"},"PeriodicalIF":5.4000,"publicationDate":"2025-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Security","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0167404825003876","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
This research explores generating passcodes from fingerprint images. The investigation unfolds through a three-step process: (a) fixed length feature vector generation from minutia features, (b) stable binary feature vector generation from the fixed length feature vector, and (c) passcode generation from the stable binary feature vector. The main research objectives of this work are: (1) how a unique and robust binary pattern can be generated from a fingerprint image, (2) from this binary bit pattern, how a passcode can be generated satisfying non-linkable and revocable properties, and (3) how an attacker cannot guess the source biometric given a passcode thus preserving the privacy of the fingerprint data. The generated passcode can be applied in many applications, such as unique identity generation for authentication without enrollment, encryption key generation for network security, remote authentication protocol or distributed systems, data storage security, digital wallet, etc. The proposed approach has been validated with FVC2002 and FVC2004, and results show impressive genuine acceptance rates of 99.31% and 99.25%, with 0% false acceptance rates. Further, the generated passcodes pass NIST and Diehard randomness tests, substantiating the potential key generation technique with high intra-similarity and low inter-similarity.
期刊介绍:
Computers & Security is the most respected technical journal in the IT security field. With its high-profile editorial board and informative regular features and columns, the journal is essential reading for IT security professionals around the world.
Computers & Security provides you with a unique blend of leading edge research and sound practical management advice. It is aimed at the professional involved with computer security, audit, control and data integrity in all sectors - industry, commerce and academia. Recognized worldwide as THE primary source of reference for applied research and technical expertise it is your first step to fully secure systems.