A METHOD FOR CALCULATING CRYPTOGRAPHIC KEYS FROM A PERSON'S BIOMETRIC DATA BASED ON STABLE TRANSFORMATIONS
Abstract
This article discusses the task of converting a person's biometric data into cryptographic keys that provide a high level of security. Biometric data, although unique, does not have sufficient randomness to create strong cryptographic keys. In addition, key storage issues arise: an attacker can steal the template, and the slightest change in the input data (different lighting, facial expressions) creates a risk of inconsistency, which leads to a high frequency of false rejections. As a solution, a cryptographic key generation method is proposed that combines several key technologies to ensure the efficiency and security of the key creation process. The main stages of the method are described, including obtaining a face image, image processing, image analysis with the extraction of necessary features using a convolutional neural network, image transformation (feature vector) into a binary string, and stable transformations. Sustainable transformations are called upon as techniques that are aimed at protecting biometric data: the use of Reed-Solomon correction codes, the generation of a biometrically dependent key, followed by its distribution into parts according to the classical Shamir scheme, encryption. The advantages of this approach have been theoretically justified in the context of reducing the likelihood of false tolerances and false deviations. The results of experiments based on public datasets are presented. It is shown that compared with classical methods simple sampling and some existing schemes (Bio-Hashing without error correction), the proposed solution provides higher accuracy. The presented method provides significant security advantages, making cryptographic systems more suitable for high-security applications
References
1. Prikaz ot 24 oktyabrya 2022 g. № 524 «Ob utverzhdenii trebovaniy o zashchite informatsii, soderzhash-cheysya v gosudarstvennykh informatsionnykh sistemakh, s ispol'zovaniem shifroval'nykh (kripto-graficheskikh) sredstv» [Order No. 524 of October 24, 2022, "On Approval of Requirements for the Protection of Information Contained in State Information Systems Using Encryption (Cryptographic) Means"].
2. Volkhonskiy V.V. Sistemy televizionnogo nablyudeniya: osnovy proektirovaniya i primeneniya: ucheb. posobie [Television surveillance systems: design and application fundamentals: a tutorial]. Moscow: Goryachaya liniya – Telekom, 2022, 390 p.
3. GOST R 34.12-2015. «Informatsionnaya tekhnologiya. Kriptograficheskaya zashchita informatsii. Blochnye shifry» [GOST R 34.12-2015 «Information technology. Cryptographic data security. Block ciphers»].
4. Soutar C., Roberge D., Stoianov A., Gilroy R., Kumar B. V. K. Biometric Encryption™.
5. Brown T. et al. Large-scale Fingerprint Data Breach: Analysis and Consequences, Proc. Security Conf., 2019.
6. Goh A., Ngo D.C.L. Computation of Cryptographic Keys from Face Biometrics, Proc. CMS 2003, LNCS 2828.
7. Ratha S., Connell J., Bolle R. Enhancing Security and Privacy in Biometrics-Based Authentication Sys-tems, IBM Systems Journal, 2001.
8. Yasuda M., Shimoyama T., Abe N., Yamada S., Shinzaki T., Koshiba T. Privacy-Preserving Fuzzy Commitment for Biometrics via Layered Error-Correcting Codes,Garcia-Alfaro J., Kranakis E., Bonfante G. (ed.). FPS 2015. LNCS, Vol. 9482. Springer, Cham, 2016.
9. Juels A., Sudan M. A Fuzzy Vault Scheme, Designs, Codes and Cryptography, 2002, Vol. 38, pp. 237-257.
10. Chitaliya N., Trivedi A.I. Feature Extraction Using Wavelet-PCA and Neural Network for Application of Object Classification & Face Recognition, 2nd Int. Conf. on Computer Engineering and Applications, 2010, Vol. 1, pp. 510-514.
11. King D.E. Max-Margin Object Detection, ArXiv:1502.00046, 2015.
12. GOST R ISO/MEK 19794-5-2013 «Informatsionnye tekhnologii. Biometriya. Formaty obmena bio-metricheskimi dannymi. Ch. 5. Dannye izobrazheniya litsa» (utv. prikazom Rosstandarta ot 6 sentyabrya 2013 g. № 987-st) (s izm. i dop.) [GOST R ISO/IEC 19794-5-2013 "Information technology. Biomet-rics. Biometric data exchange formats. Part 5. Facial image data" (approved by order of Rosstandart dat-ed September 6, 2013 No. 987-st) (as amended and supplemented)].
13. Kol'tsov P.P. Otsenka razmytiya izobrazheniya [Image blur assessment], Komp'yuternaya optika [Com-puter Optics], 2011, No. 1.
14. Lazarev K.V., Kaliberda I.V., Kostoglotov A.A., Saryev M.M. Metod biometricheskoy dvukhfaktornoy autentifikatsii s ispol'zovaniem opredeleniya zhiznesposobnosti [A Method of Biometric Two-Factor Authentication Using Liveness Determination], AISMA-2024: Konspekt lektsiy [AISMA-2024: Lecture notes], Vol. 863. Springer, 2024.
15. Kononykhin I.A., Ezhov F.V., Martynyuk R.A. i dr. Realizatsiya sistemy raspoznavaniya i otslezhivaniya lits [Implementation of a face recognition and tracking system], Molodoy uchenyy [Young Scientist], 2020, No. 28 (318), pp. 8-12. Available at: https://moluch.ru/archive/318/72492//.
16. Schroff, F., Kalenichenko, D., & Philbin, J. FaceNet: A Unified Embedding for Face Recognition and Clustering, arXiv.org, 2015. Available at: https://arxiv.org/abs/1503.03832 (accessed 30 June 2025).
17. Druzhinin V.I., Kuz'min O.V. Kody Rida-Solomona v sistemakh obnaruzheniya i ispravleniya oshibok pri peredache dannykh [Reed-Solomon codes in error detection and correction systems for data trans-mission], Sovremennye tekhnologii. Sistemnyy analiz. Modelirovanie [Modern technologies. Systems analysis. Modeling], 2015, No. 1 (45).
18. Dremov I.S., Girina A.N. Ispol'zovanie algoritma SHA-256 dlya kheshirovaniya dannykh [Using the SHA-256 algorithm for data hashing], Tendentsii razvitiya nauki i obrazovaniya [Trends in the Devel-opment of Science and Education], 2022, No. 86-1, pp. 57-61. DOI 10.18411/trnio-06-2022-19. EDN ZIKXGD.
19. Hall J. L., Hertzog Y., Loewy M. et al. Manifesting Unobtainable Secrets: Threshold Elliptic Curve Key Generation using Nested Shamir Secret Sharing, arXiv preprint, 2023. Available at: https://arxiv.org/abs/2309.00915 (accessed 20 June 2025).
20. Spacek L. Faces94 Database. University of Essex [Electronic resource].
21. Huang G.B., Ramesh M., Berg T., Learned-Miller E. Labeled Faces in the Wild: A Database for Study-ing Face Recognition in Unconstrained Environments, 2007.
22. NIST Special Publication 800-63B. Digital Identity Guidelines: Authentication and Lifecycle Manage-ment. National Institute of Standards and Technology, Gaithersburg, MD, USA, 2017. Available at: https://pages.nist.gov/800-63-3/sp800-63b.html.
23. ISO/IEC 19792:2009. Information technology – Security techniques – Security evaluation of biometrics. International Organization for Standardization, Geneva, 2009, 37 p. Available at: https://www.iso.org/standard/42136.html.
24. IEEE P2410. Standard for Biometric Open Protocol Standard (BOPS). – IEEE Standards Association, 2023. Available at:https://standards.ieee.org/ieee/2410/6314/.
25. Dodis Y., Ostrovsky R., Reyzin L., Smith A. Fuzzy extractors: How to generate strong keys from biomet-rics and other noisy data, SIAM Journal on Computing, 2008, Vol. 38, No. 1, pp. 97-139.








