Computer Science and Information Technologies, Computer Science and Information Technologies 2006

Font Size: 
Voice Password Based Biometrical Cryptosystem
L. K. Babenko, E. P. Tumoian, V. A. Gronin

Last modified: 2020-12-26


In this work we are researching some aspects of biometrical cryptosystem cryptographic key generation based on human biometric features. We also offer a method of biometric key generation by voice password. According to the author's experiments, obtained estimations allow us to consider the proposed method to be secure enough for most practical applications


Voice Password; Biometrical Cryptosystem; cryptographic key generation


1. Anil J. Kain, Bolle Ruud and Pankanti Sharath "BIOMETRIC: Personal identification in networked society". Kluwer Academic Publichers, 1999.

2. Soutar C. , Roberge D. , Stojanov S.A., Gilroy R. and Kumar Vijaya B.V.K. "Biometric encryption using image processing". In: Proc. of SPIE, Optical Security and Counterfeit Deterrence Techniques 11, Vol. 3314, 1998, pp. 178-188.

3. Davida G.l., Frankel Y. and Matt B.J. "On enabling secure applications through off-line biometric identification", In: Proc. of Symp Privacy and Security IEEE, 1998, pp. 148-157.

4. Davida G.I., Frankel Y., Matt B.J. and Peralta R. "On the relation of error correction and cryptography to an offline biometric based identification scheme". In: Proc. of Workshop Coding and Cryptography (wcc'99), 1999, pp. 129-138.

5. Monrose F. , Reiter M.K. and Wetzel S. "Password hardening based on keystroke dynamics". In: Proc. of 6th ACM Conf Computer and Communications Security, 1999, pp. 73-82.

6. Verbitskiy F„., Tuyls P., Denteneer D. and Linnartz J.P. "Reliable biometric authentication with privacy protection". In: SPIE Biometric Technology for Human Identification Conference, Orlando, FL, USA, 2004.

7. Juels A. and Wattenberg M. , ''A fuzzy commitment scheme". In: Proc. 6th ACM Conf Computer and Communications Security, G. Tsudik, Ed., 1999, pp. 28-36.

8. McCulloch W.S., Pitts W.A. ''A logical calculus of the ideas immanent in nervous activity". Bull. Math. Biophys, 1943; 5: 115-133.

9. Pitts W.A., McCulloch W.S. "How we know universals: The perception of auditory and visual forms". Bull. Math. Biophys, 1947; 9: 127.

10 . Haykin S. "Neural Networks: A Comprehensive Foundation. Prentice Hall", 2nd edition. Upper Saddle River, New Jersey, 1999.

l l . Poggio T. and Girosi F. "Networks and the best approximation property". Biological Cybernetics, 1990; 63: 169-176.

12. Hornik K. , Stinchcombe M. and White H. "Universal approximation of an unknown mapping and its derivatives using multilayer feedforward networks". Neural Networks, 1990; 3: 551-560.

13. Stone M.H. "Applications of the Theory of Boolean Rings to General Topology". Transactions of the American Mathematical Society, 1943; 41(3): 375-481.

14. Stone M.H. "The Generalized Weierstrass Approximation Theorem". Mathematics Magazine, 1948; 21(4): 167-184 and 21(5): 237-254.

15. Gorban A.N. "The generalized Stone-Weierstrass approximation theorem and approximation of continuous functions of several variables by an arbitrary non-linear function of one variable, linear functions and their superpositions". Advances in Modelling and Analysis, Vol. 35, 1999; I: 7-13.

16, Uludag U, Pankanti S., Prabhakar S„ Jain A.K. "Biometric Cryptosystems: issues and challenges". In: Proc. ofThe IEEE, Vol. 92, 2004, pp. 948-960.

17.  Monrose Reiter M.K„ Qi Li, Wetzel S. "Cryptographic Key Generation from Voice". In: Proc. of IEEE Symposium on Security and Privacy, 2001.—fabian/papers/oakland.pdñ

18.  Riedmiller M. and Braun H. "A direct adaptive method for faster backpropagation learning: The RPROP algorithm". In: Proc. of the IEEE International Conference on Neural Networks, 1993.

19.  Ferguson N. , Kelsey L, Lucks S., Schneier B. , Stay M. , Wagner D. and Whiting D. "Improved Cryptanalysis of Rijndael Seventh Fast Software Encryption Workshop". Springer-Verlag, 2000.

Full Text: PDF