Volume 17 , Issue 2 , PP: 260-277, 2025 | Cite this article as | XML | Html | PDF | Full Length Article
Nahla Abdulnabee Sameer 1 * , Bashar M. Nema 2
Doi: https://doi.org/10.54216/JISIoT.170217
The generation of cryptographic keys from biometric traits offers a secure alternative to password-based authentication, but is hindered by challenges related to entropy, reproducibility, and adversarial resistance. This work presents a dual-path framework in which a Continuous Thinking Machine Model (CTMM) extracts multimodal embeddings from iris and fingerprint data. Feature vectors undergo projection through principal component analysis and graph-based distance encoding, followed by chaotic sequence modeling with Lorenz-like dynamics and an error-correcting routine to stabilize bitstreams. A secure mixing function consolidates the outputs, while SHA3-512 ensures deterministic expansion. Final passkeys are generated using the Kyber512 post-quantum key encapsulation mechanism (KEM), with neuro-symbolic reasoning applied as a validation layer to enforce entropy, avalanche properties, and inter-user separation. Evaluation confirmed compliance with NIST statistical tests, including monobit, runs, and longest-run assessments, while the system maintained a near-zero false acceptance rate. The originality of this work lies in combining CTMM-driven multimodal feature extraction with a quantum-safe cryptographic pipeline, augmented by neuro-symbolic validation, to establish a reproducible and secure method for biometric passkey generation in high-assurance authentication contexts.
Biometric authentication , Passkey generation , Continuous thinking machine model (CTMM) , Quantum-safe cryptography , Kyber512 , Neuro-symbolic reasoning
[1] F. Corella, "Overcoming the UX Challenges Faced by FIDO Credentials in the Consumer Space," in Lecture Notes in Computer Science, 2023, pp. 1–15, doi: 10.1007/978-3-031-35822-7_30.
[2] J. M. - and G. B. K. -, "Detection of Fake Biometrics - Assessment of Image Quality in Face, Fingerprint," International Journal for Multidisciplinary Research, vol. 6, no. 1, 2024, doi: 10.36948/ijfmr.2024.v06i01.12063.
[3] K. Yasunaga and K. Yuzawa, "On the Limitations of Computational Fuzzy Extractors," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. E106-A, no. 3, pp. 518–528, 2023, doi: 10.1587/transfun.2022CIL0001.
[4] Mehmood, A. Shafique, M. Alawida, and A. N. Khan, "Advances and Vulnerabilities in Modern Cryptographic Techniques: A Comprehensive Survey on Cybersecurity in the Domain of Machine/Deep Learning and Quantum Techniques," IEEE Access, vol. 12, pp. 23456–23489, 2024, doi: 10.1109/ACCESS.2024.3367232.
[5] S. A. El-Rahman and A. S. Alluhaidan, "Enhanced multimodal biometric recognition systems based on deep learning and traditional methods in smart environments," PLoS One, vol. 19, no. 2, p. e0291084, Feb. 2024, doi: 10.1371/journal.pone.0291084.
[6] P. Dash, F. Pandey, M. Sarma, and D. Samanta, "Efficient private key generation from iris data for privacy and security applications," Journal of Information Security and Applications, vol. 75, p. 103506, 2023, doi: 10.1016/j.jisa.2023.103506.
[7] A. AbdulRaheeM and S. A. Hasso, "Generate And Evaluate Encryption Keys Obtained From Iris Biometric Data," in *2024 21st International Multi-Conference on Systems, Signals & Devices (SSD)*, Istanbul, Turkey, Apr. 2024, pp. 321–328, doi: 10.1109/SSD61670.2024.10548985.
[8] L. Chao, T. Nazaré, and E. Nepomuceno, "Key Generation from Fingerprint Biometric," in 2023 15th IEEE International Conference on Industry Applications (INDUSCON), São Paulo, Brazil, Nov. 2023, pp. 611–612, doi: 10.1109/INDUSCON58041.2023.10374712.
[9] P. Dash, M. Sarma, and D. Samanta, "Fractal-Based Approach to Secure Key Generation from Fingerprint and Iris Biometrics," in Intelligent Systems Design and Applications, Cham, Switzerland: Springer, 2024, pp. 99–111, doi: 10.1007/978-3-031-58181-6_9.
[10] R. Sridevi and P. Shobana, "Multimodal Security of Iris and Fingerprint with Bloom Filters," International Journal of Computer Applications, vol. 186, no. 25, pp. 1–8, Jun. 2024.
[11] D. K. Vallabhadas and M. Sandhya, "Cancelable bimodal shell using fingerprint and iris," Journal of Electronic Imaging, vol. 32, no. 6, p. 063027, Dec. 2023, doi: 10.1117/1.JEI.32.6.063027.
[12] K. N. Singh, N. Baranwal, O. P. Singh, and A. K. Singh, "DeepENC: Deep Learning-Based ROI Selection for Encryption of Medical Images Through Key Generation With Multimodal Information Fusion," IEEE Transactions on Consumer Electronics, vol. 70, no. 3, pp. 6149–6156, Aug. 2024, doi: 10.1109/TCE.2024.3406963.
[13] B. Wang et al., "A multiple-image encryption method based on bimodal biometric keys," Optics Communications, vol. 565, p. 130651, Aug. 2024, doi: 10.1016/j.optcom.2024.130651.
[14] B. Wang et al., "High-security dual-image encryption based on fingerprint key with strong robustness," Optik, vol. 288, p. 171245, Oct. 2023, doi: 10.1016/j.ijleo.2023.171245.
[15] Z. I. A. Al-Rifaee, T. Z. Ismaeel, and S. I. Abood, "Cryptography based on Fingerprint Bio Metrics," Journal of Internet Services and Information Security, vol. 14, no. 4, pp. 401–417, Nov. 2024, doi: 10.58346/JISIS.2024.I4.025.
[16] L. Darlow, C. Regan, S. Risi, J. Seely, and L. Jones, "Continuous Thought Machines," arXiv, 2025, Art. no. arXiv:2501.12345.
[17] T. Kumar, S. Bhushan, and S. Jangra, "Ann trained and WOA optimized feature-level fusion of iris and fingerprint," Materials Today: Proceedings, vol. 51, pp. 1–11, 2022, doi: 10.1016/j.matpr.2021.03.604.
[18] C. Kamlaskar and A. Abhyankar, "Iris-Fingerprint multimodal biometric system based on optimal feature level fusion model," AIMS Electronics and Electrical Engineering, vol. 5, no. 4, pp. 229–250, 2021, doi: 10.3934/electreng.2021013.
[19] Jagadeesan and K. Duraiswamy, "Secured Cryptographic Key Generation From Multimodal Biometrics: Feature Level Fusion of Fingerprint and Iris," in 2010 International Conference on Signal and Image Processing, Chennai, India, Mar. 2010, pp. 432–436.
[20] Almomani et al., "Proposed Biometric Security System Based on Deep Learning and Chaos Algorithms," Computers, Materials & Continua, vol. 74, no. 2, pp. 3515–3537, 2023, doi: 10.32604/cmc.2023.033765.
[21] T. G. Yirga, H. G. Yirga, and E. G. Addisu, "Cryptographic key generation using deep learning with biometric face and finger vein data," Frontiers in Artificial Intelligence, vol. 8, p. 1545946, Apr. 2025, doi: 10.3389/frai.2025.1545946.