{"title":"A Robust Multimodal Biometric Security System Using the Polynomial Curve Technique within Shamir's Secret Sharing Algorithm","authors":"Saad Aldosary, G. Howells","doi":"10.1109/EST.2012.9","DOIUrl":null,"url":null,"abstract":"This paper investigates the application of secret sharing technology to allow an encryption key to be derived from multimodal biometric samples. Within the proposed scheme, individual points on a parabolic curve are indirectly derived from individual biometric samples taken from an individual, and Shamir's Secret Sharing algorithm is applied in order to derive the required key. The proposal is robust, in that a pre-defined subset of modalities is required in order to derive the key, rendering the system able to accommodate exception handling for given modalities. The current paper reports preliminary work on how secret sharing techniques may be employed to integrate arbitrary points that may be derived from the actual biometric data.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"47 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Third International Conference on Emerging Security Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EST.2012.9","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
This paper investigates the application of secret sharing technology to allow an encryption key to be derived from multimodal biometric samples. Within the proposed scheme, individual points on a parabolic curve are indirectly derived from individual biometric samples taken from an individual, and Shamir's Secret Sharing algorithm is applied in order to derive the required key. The proposal is robust, in that a pre-defined subset of modalities is required in order to derive the key, rendering the system able to accommodate exception handling for given modalities. The current paper reports preliminary work on how secret sharing techniques may be employed to integrate arbitrary points that may be derived from the actual biometric data.