You have requested a machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Neither SPIE nor the owners and publishers of the content make, and they explicitly disclaim, any express or implied representations or warranties of any kind, including, without limitation, representations and warranties as to the functionality of the translation feature or the accuracy or completeness of the translations.
Translations are not retained in our system. Your use of this feature and the translations is subject to all use restrictions contained in the Terms and Conditions of Use of the SPIE website.
1 April 1998Biometric Encryption using image processing
Biometric EncryptionTM is an algorithm which has been developed to securely link and retrieve a digital key using the interaction of a biometric image, such as a fingerprint, with a secure block of data, known as a BioscryptTM. The key can be used, for example, as an encryption/decryption key. The BioscryptTM comprises a filter function, which is calculated using an image processing algorithm, and other information which is required to first retrieve, and then verify the validity of, the key. The key is retrieved using information from an output pattern formed via the interaction of the biometric image with the filter function. Therefore, the filter function must be designed so that it produces a consistent output pattern (and thus, key). The filter function must also be designed to be secure (i.e. information about the fingerprint cannot be retrieved from the filter function). The consistency of the output pattern and the security of the filter function are the two topics discussed in this paper.
The alert did not successfully save. Please try again later.
Colin Soutar, Danny Roberge, Alex Stoianov, Rene Gilroy, Bhagavatula Vijaya Kumar, "Biometric Encryption using image processing," Proc. SPIE 3314, Optical Security and Counterfeit Deterrence Techniques II, (1 April 1998); https://doi.org/10.1117/12.304705