Submitted:
24 September 2025
Posted:
25 September 2025
You are already at the latest version
Abstract
Keywords:
1. Introduction
2. Background Information
- To develop a novel, templateless biometric authentication protocol that dynamically generates ephemeral cryptographic keys from stable facial landmarks using a subset challenge response mechanism ensuring neither biometric templates nor sensitive keys are ever stored, and all data remains irreversible and resistant to inversion attacks.
- To enhance authentication security and resiliency against next-generation threats including deepfakes, spoofing, and quantum adversaries, by promoting expression based authentication, injecting noise into the key generated in the biometric process, leveraging post-quantum cryptographic (PQC) algorithms for data protection, and integrating machine learning based liveness detection.
- To implement robust MFA by binding biometric-derived cryptographic key and key generated from SRAM PUF to further strengthen security against cloning, replay, and side-channel attacks in distributed, zero-trust environments.
3. Templateless Biometrics
3.1. Enrollment of Face
3.2. Key Generation and Recovery Using 2D Facial Data
3.2.1. Initial Enrollment/Registration
- After quantizing and gray-coding the calculated distances between facial landmarks, a random subset of bits is removed while the order of the remaining bits is preserved. By incorporating only these selected segments of the encoded biometric representation into the final key material enhances security and minimizes the risk of information leakage from the overall biometric dataset.
- The second additional step is noise injection. After masking and encoding the per-challenge bitstrings for the selected enrollment frame (as depicted in Figure 2) and before gating by the ephemeral key K, noise is injected across the entire collection of encoded responses. The detailed description of the method is explained in the Algorithm 2. This obfuscation is applied only during the enrollment phase, ensuring that while additional uncertainty is injected into the stored representations, legitimate key recovery during authentication remains unaffected.
Algorithm for Key Generation is as follows:

-
Password-tied primitives & helpers
- -
- DeriveChallenges: Expand with SHAKE-256 long enough for coordinates. Read the values and reduce to get coordinates. Same method is used in the recovery.
- -
- BreakRuns: A sliding window of length scans sequence k, and if the window contains only zeros, one bit is flipped to 1 to prevent extended zero runs and enforce distributed activations.
- -
- HashKey: Hash representation of k which uses SHA-256 and SHAKE-256.
- -
- GenerateSubset: Given an ordered list of responses, 50% of the responses are stored while the rest are deleted.
- -
- GrayCode bit selection/Pick3: After converting distance s to binary using gray code, we deterministically selects g bit indices from . This returns the remaining indices in increasing order, preserving bit order.
-
Face Detection & Geometry
- -
- FaceChips: Detect a single face per frame and align it to a square chip.
- -
- Landmarks: Extract 2D landmarks for each face chip using . Coordinates are pixel positions in the chip reference frame.
- -
- BuildLandmarkMask: Landmarks with high variance in their location across all frames are masked and the stable ones are used.
-
Challenge Responses
- -
- RawResponses: For each challenge , compute Euclidean distances to landmarks with and collect them into a list. The output per frame is a list of lists (one list per challenge).
-
Deadzones (stability gating)
- -
- PerChallengeDeadzones: Partition into equal bins. For each challenge, identify indices that fall near transition boundaries and mark them as unstable, with stable regions left unmarked.
- -
- FrequentDeadzoneMask: Aggregate these instability markings across all challenges and construct a global mask that flags the most frequently unstable positions for exclusion.
- -
- ApplyDeadzone: Apply in every frame/challenge, drop distances where so later quantization avoids unstable indices.
-
Global noise injection:

-
Final Step
- -
- GenerateSubset: After noise injection, publish only the responses whose indices are selected; this yields the stored subset.
- -
- MaskGeneration: Deadzone/challenge masks use , . Landmark mask uses (selected landmarks)
3.2.2. Key Recovery
Algorithm for Key Recovery is as follows:

3.2.3. Error Correction
-
Case 1: One match found.Consider we have 8 responses as shown in Figure 4(a). In this scenario, the search begins by finding a match for subset . The comparison starts with and considers the first 4 full subset responses generated by the client. It is observed that a match is found at , i.e., , so the binary stream at the location is set to "1", and the other unmatched locations before are set to "0". To continue the search, the remains unchanged, but .
-
Case 2: No match found.Figure 4(b) illustrates the scenario when no match is found. Consideringand , while attempting to find a match for subset , the first 4 full subset responses are examined for a match. Since no matches are found, the window is shifted by one, i.e., is set to 1, and is marked as "X". The window size is expanded to . This expansion accounts for the possibility that might find a match in either , , or . Assuming that every window has one match, the search extends to the next 4 values of the full subset response to find a match for .
-
Case 3: More than one match found.Figure 4(c) depicts the scenario when more than one match is found. Considering and , while attempting to find a match for subset , the first 4 full subset responses are examined. When multiple matches occur, it is termed a collision. In this example, matches were found at and , indicating a potential presence of a 1 at either of these positions. Therefore, both positions are marked as "X", and the responses before the first match are set to 0. In this case, is set to 3, is set to , and the window size is adjusted to .
-
Functions Used in Error Correction for Key Recovery
- -
- AttemptKeyRecovery: Let F be the ordered list of enrollment-time bitstrings at the K kept positions (recomputed during recovery). Slide a window of size N over F and, for each published item in subset, look for matches within tolerance T (default Hamming). Output a keystate vector where 1 marks a confident match at a unique position, marks uncertainty/collisions, and 0 marks not-yet-determined positions.
- -
- EnumerateCompletions: If u contains , enumerate assignments for those positions (bounded by a threshold Q before attempting). For each candidate , accept iff .
- -
- Verification & early exit: If u contains no , form directly and accept on hash match. If the count of exceeds the budget , abort.
3.3. Key Generation and Recovery Using 3D Facial Data
3.3.1. Initial Enrollment
- For each frame the same challenge is formed by hashing a random nonce (RN) with the user’s password (PWD).
- For each challenge, a unique subset response is generated and used to derive an ephemeral key K, as illustrated in Figure 6. The key generation methodology follows the process detailed in Section 3.2.1.
- Similar to the 2D the essential subset responses, RN, and the hash of the ephemeral key are securely stored. All other enrollment data, including raw landmarks, are promptly deleted to ensure privacy and security.
3.3.2. Key Recovery
- The challenge is regenerated from the and and applied to the live capture, producing a fresh set of responses using the methodology from Section 3.2.2.
- To reconstruct K, a subset response is randomly selected. If the ephemeral key generated () closely matches the expected response profile (i.e., the number of 1’s is near the subset length with low uncertainty), the recovery continues with this set. If not, another subset is randomly chosen, and the process repeats.
- This iterative matching substantially reduces latency in key recovery; however, to prevent extended search times, a threshold is enforced. If recovery exceeds the allotted time, access is denied and the user must re-initiate authentication.
- Once a ternary key with the appropriate number of 1’s and minimal ambiguity is identified, an exhaustive search is conducted by toggling uncertain positions. All candidate keys are hashed and compared to the stored . A match grants access; otherwise, the process is restarted.

3.4. Multi-Factor Authentication (MFA) with 2D/3D Biometry and SRAM PUF
3.4.1. MFA Protocol Design
- For SRAM PUF enrollment, the SRAM PUF is read multiple times to filter unstable cells, and stable responses are used to generate high entropy responses.
- The key generation process initiates with the server generating a RN, while the user provides a PWD. These inputs undergo hashing using SHA3-512 and SHAKE256, resulting in a message digest.
- The SRAM PUF utilizes the enrollment to generate a response, denoted as .
- Next with the biometric data, the hash is utilized to generate challenges, facilitating the calculation of the distance between each challenge and the landmarks of the user’s face. This process results in the generation of a full set of responses as detailed in Section 3.2.
- Following this, the protocol generates an ephemeral key, denoted as , and produces a subset response utilized during the recovery process.
- During the process of ephemeral key generation using the biometric data, a liveliness test is conducted to ensure the absence of any spoofing attacks. The outcome of this liveliness test is denoted as L and is utilized in the generation of the final key, denoted as K.
- The final key K is generated by combining , , and L through an XOR operation followed by a modulo operation. This resulting key K is then employed in encryption algorithms such as AES, Double Encryption using AES, CRYSTAL-KYBER, or CRYSTAL-DILITHIUM [33] to secure digital files.
- During this process the , hash of the SRAM PUF response , subset responses and hash of the ephemeral key is stored as handshake. This handshake is shared with the client during the authentication process.
- Utilizing the handshake, the client extracts the RN, while the user inputs the PWD, both of which undergo one-way hashing to produce a message digest. This message digest is employed to generate challenges for extracting responses from the SRAM PUF and ephemeral keys from the biometric data.
- The SRAM PUF generates a response , while the biometry data produces two outputs: the potential ephemeral key and the liveliness factor L.
- undergoes error management methods like Response Based Cryptography [34] to identify and manage errors and extract . Similarly, the subset response method generates the potential ephemeral key with uncertain positions as detailed in Section 3.2.2, which is passed through the error correction method detailed in Section 3.2.3 to determine the ephemeral key .
- Combining , , and L generates the final key . The hash of is then compared with . If a match is found, decryption of the digital file is initiated; otherwise, authentication is denied.
- The complexity of generating the final key K from multiple factors in the MFA system makes it impossible to pinpoint which specific factor contributed to any errors resulting in authentication failure.
4. Results
4.1. Entropy Analysis
- The selection of k unique coordinates from grid .
-
The assignment of l facial landmarks from a total set L to each selected point. Entropy Computation is represented as:
- Key length generated is:
- 256 unique grid coordinates selected:
- For each coordinate, consider l = 32 stable landmarks out of the L = 68 or 468 landmarks:
- The resulting entropy is:
4.2. Error Rate

4.3. FAR and FRR
2D Biometric Analysis:
Impact of Noise Injection:
Impact of Noise Injection and Selective Gray Code Bit Extraction:
3D Biometric Analysis:
MFA with Biometry and SRAM PUF
4.4. Latency
5. Real-Time Use-Cases
6. Discussion
7. Conclusion and Future Work
8. Patents
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
Abbreviations
| CRP | Challenge Response Pair |
| ECC | Error Correction Code |
| FAR | False Acceptance Rate |
| FRR | False Rejection Rate |
| GANs | Generative Adversarial Network |
| MFA | Multi Factor Authentication |
| OTP | One Time Password |
| PINs | Personal Identification Number |
| PQC | Post Quantum Cryptography |
| PUF | Physically Unclonable Functions |
| RBC | Response Based Cryptography |
| SRAM | Static Random Access Memory |
| TI | Template Inversion |
| IoT | Internet of Thing |
| RN | Random Number |
| PWD | Password |
| ZKP | Zero Knowledge Proof |
References
- Chen, S.; Pande, A.; Mohapatra, P. Sensor-assisted facial recognition: an enhanced biometric authentication system for smartphones. In Proceedings of the Proceedings of the 12th annual international conference on Mobile systems, applications, and services, 2014, pp. 109–122.
- Dabbah, M.; Woo, W.; Dlay, S. Secure authentication for face recognition. In Proceedings of the 2007 IEEE symposium on computational intelligence in image and signal processing. IEEE; 2007; pp. 121–126. [Google Scholar]
- Al-Assam, H.; Sellahewa, H.; Jassim, S. On security of multi-factor biometric authentication. In Proceedings of the 2010 International Conference for Internet Technology and Secured Transactions. IEEE; 2010; pp. 1–6. [Google Scholar]
- Banerjee, I.; Mookherjee, S.; Saha, S.; Ganguli, S.; Kundu, S.; Chakravarti, D. Advanced atm system using iris scanner. In Proceedings of the 2019 International Conference on Opto-Electronics and Applied Optics (Optronix). IEEE; 2019; pp. 1–3. [Google Scholar]
- Nath, D.; Ray, S.; Ghosh, S.K. Fingerprint recognition system: design & analysis. In Proceedings of the conference international conference on scientific paradigm shift in information technology & management, SPSITM; 2011. [Google Scholar]
- Ometov, A.; Bezzateev, S.; Mäkitalo, N.; Andreev, S.; Mikkonen, T.; Koucheryavy, Y. Multi-factor authentication: A survey. Cryptography 2018, 2, 1. [Google Scholar] [CrossRef]
- Elmahmudi, A.; Ugail, H. A framework for facial age progression and regression using exemplar face templates. The visual computer 2021, 37, 2023–2038. [Google Scholar] [CrossRef]
- Insan, I.M.; Sukarno, P.; Yasirandi, R. Multi-factor authentication using a smart card and fingerprint (case study: Parking gate). Indonesia Journal on Computing (Indo-JC) 2019, 4, 55–66. [Google Scholar]
- Karimian, N.; Guo, Z.; Tehranipoor, F.; Woodard, D.; Tehranipoor, M.; Forte, D. Secure and reliable biometric access control for resource-constrained systems and IoT. arXiv 2018, arXiv:1803.09710. [Google Scholar] [CrossRef]
- Patel, V.M.; Ratha, N.K.; Chellappa, R. Cancelable biometrics: A review. IEEE signal processing magazine 2015, 32, 54–65. [Google Scholar] [CrossRef]
- Zhang, H.; Bian, W.; Jie, B.; Xu, D.; Zhao, J. A complete user authentication and key agreement scheme using cancelable biometrics and PUF in multi-server environment. IEEE Transactions on Information Forensics and Security 2021, 16, 5413–5428. [Google Scholar] [CrossRef]
- Mansour, A.; Sadik, M.; Sabir, E. Multi-factor authentication based on multimodal biometrics (MFA-MB) for Cloud Computing. In Proceedings of the 2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA). IEEE; 2015; pp. 1–4. [Google Scholar]
- Lipps, C.; Herbst, J.; Schotten, H.D. How to Dance Your Passwords: A Biometric MFA-Scheme for Identification and Authentication of Individuals in IIoT Environments. In Proceedings of the Proceedings of the ICCWS 2021 16th International Conference on Cyber Warfare and Security, 2021, p. 168.
- Pramana, M.D.; Lestyea, A.; Amiruddin, A. Development of a Secure Access Control System Based on Two-Factor Authentication Using Face Recognition and OTP SMS-Token. In Proceedings of the 2020 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS). IEEE, 2020; pp. 52–57.
- Ibrokhimov, S.; Hui, K.L.; Al-Absi, A.A.; Sain, M.; et al. Multi-factor authentication in cyber physical system: A state of art survey. In Proceedings of the 2019 21st international conference on advanced communication technology (ICACT). IEEE; 2019; pp. 279–284. [Google Scholar]
- Shahreza, H.O.; Marcel, S. Template inversion attack using synthetic face images against real face recognition systems. IEEE Transactions on Biometrics, Behavior, and Identity Science 2024, 6, 374–384. [Google Scholar] [CrossRef]
- Cambou, B.; Philabaum, C.; Hoffstein, J.; Herlihy, M. Methods to encrypt and authenticate digital files in distributed networks and zero-trust environments. Axioms 2023, 12, 531. [Google Scholar] [CrossRef]
- Cambou, B.F.; Herlihy, M.; Tamassia, R.; Toussaint, K.; KRISHNA, K. Protocols for protecting digital files, 2025. US Patent App. 19/064,331.
- Dkhil, M.B.; Wali, A.; Alimi, A.M. Towards a new system for drowsiness detection based on eye blinking and head posture estimation. arXiv 2018, arXiv:1806.00360. [Google Scholar] [CrossRef]
- Ghanai Miandoab, D.; Garrett, M.L.; Alam, M.; Jain, S.; Assiri, S.; Cambou, B. Secure Cryptographic Key Encapsulation and Recovery Scheme in Noisy Network Conditions. Applied Sciences 2025, 15, 2732. [Google Scholar] [CrossRef]
- Cambou, B.F.; Garrett, M.L.; Partridge, M.; Ghanaimiandoab, D. Protocols with noisy response-based cryptographic subkeys, 2025. US Patent App. 18/885,226.
- Jabberi, M.; Wali, A.; Chaudhuri, B.B.; Alimi, A.M. 68 landmarks are efficient for 3D face alignment: what about more? 3D face alignment method applied to face recognition. Multimedia Tools and Applications 2023, 82, 41435–41469. [Google Scholar] [CrossRef] [PubMed]
- Abhishek, K.; Roshan, S.; Kumar, P.; Ranjan, R. A comprehensive study on multifactor authentication schemes. In Proceedings of the Advances in Computing and Information Technology: Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India-Volume 2. Springer, 2013, pp. 561–568.
- Ometov, A.; Petrov, V.; Bezzateev, S.; Andreev, S.; Koucheryavy, Y.; Gerla, M. Challenges of multi-factor authentication for securing advanced IoT applications. IEEE Network 2019, 33, 82–88. [Google Scholar] [CrossRef]
- Reno, J. Multifactor authentication: Its time has come. Technology Innovation Management Review 2013, 3. [Google Scholar] [CrossRef]
- Cambou, B.; Gowanlock, M.; Heynssens, J.; Jain, S.; Booher, D.; Burke, I.; Garrard, J.; Philabaum, C. Blockchain Technology with Ternary Cryptography. Technical report, Northern Arizona University Flagstaff United States, 2020.
- Cambou, B.; Gowanlock, M.; Heynssens, J.; Jain, S.; Philabaum, C.; Booher, D.; Burke, I.; Garrard, J.; Telesca, D.; Njilla, L. Securing additive manufacturing with blockchains and distributed physically unclonable functions. Cryptography 2020, 4, 17. [Google Scholar] [CrossRef]
- Jain, S.; Korenda, A.R.; Cambou, B.; Lucero, C. Secure Content Protection Schemes for Industrial IoT with SRAM PUF-Based One-Time Use Cryptographic Keys. In Proceedings of the Science and Information Conference. Springer; 2024; pp. 478–498. [Google Scholar]
- Cambou, B.F.; Jain, S. Key Recovery for Content Protection Using Ternary PUFs Designed with Pre-Formed ReRAM. Applied Sciences 2022, 12, 1785. [Google Scholar] [CrossRef]
- Jain, S.; Korenda, A.R.; Bagri, A.; Cambou, B.; Lucero, C.D. Strengthening industrial IoT security with integrated puf token. In Proceedings of the Proceedings of the Future Technologies Conference. Springer, 2024, pp. 99–123.
- Jain, S.; Korenda, A.R.; Cambou, B. A Novel Approach to Optimize Response-Based Cryptography for Secure. In Proceedings of the Proceedings of the Future Technologies Conference (FTC) 2024, Volume 4. Springer Nature, 2024, Vol. 1157, p. 226.
- Jain, S. Secure and Reliable Zero-Knowledge Proof Cryptographic Systems for Real-World Applications. PhD thesis, Northern Arizona University, 2024.
- Partridge, M.; Jain, S.; Garrett, M.; Cambou, B. Post-quantum cryptographic key distribution for autonomous systems operating in contested areas. In Proceedings of the Autonomous Systems: Sensors, Processing and Security for Ground, Air, Sea, and Space Vehicles and Infrastructure 2023. SPIE, 2023, Vol. 12540; pp. 126–138.
- Cambou, B.; Philabaum, C.; Booher, D.; Telesca, D.A. Response-based cryptographic methods with ternary physical unclonable functions. In Proceedings of the Advances in Information and Communication: Proceedings of the 2019 Future of Information and Communication Conference (FICC), Volume 2. Springer, 2020, pp. 781–800.
- Thomaz, C.E. FEI face database. FEI Face DatabaseAvailable 2012, 11, 46–57. [Google Scholar]
- Ballard, L.; Kamara, S.; Reiter, M.K. The Practical Subtleties of Biometric Key Generation. In Proceedings of the USENIX Security Symposium; 2008; pp. 61–74. [Google Scholar]
- Wati, V.; Kusrini, K.; Al Fatta, H.; Kapoor, N. Security of facial biometric authentication for attendance system. Multimedia Tools and Applications 2021, 80, 23625–23646. [Google Scholar] [CrossRef]
- Chen, B.; Chandran, V. Biometric based cryptographic key generation from faces. In Proceedings of the 9th biennial conference of the Australian pattern recognition society on digital image computing techniques and applications (DICTA 2007). IEEE; 2007; pp. 394–401. [Google Scholar]
- Rathgeb, C.; Merkle, J.; Scholz, J.; Tams, B.; Nesterowicz, V. Deep face fuzzy vault: Implementation and performance. Computers & Security 2022, 113, 102539. [Google Scholar] [CrossRef]
- Sardar, A.; Umer, S.; Rout, R.K.; Sahoo, K.S.; Gandomi, A.H. Enhanced biometric template protection schemes for securing face recognition in IoT environment. IEEE Internet of Things Journal 2024, 11, 23196–23206. [Google Scholar] [CrossRef]
- Boddeti, V.N. Secure face matching using fully homomorphic encryption. In Proceedings of the 2018 IEEE 9th international conference on biometrics theory, applications and systems (BTAS). IEEE; 2018; pp. 1–10. [Google Scholar]
















| Feature / Metric | This work | Rathgeb, et al.[39] | Sardar, et al.[40] | Boddeti, Vishnu Naresh[41] |
|---|---|---|---|---|
| Protocol/System | Multi-view 2D/3D Templateless; Expression; SRAM PUF; Liveliness; Noise Injection | Face (Deep Features/ArcFace | Face (Feature Fusion, FaceHashing, Sliding-XOR) | Face (Homomorphic Enc., IoT-ready) |
| Expression-aware | Yes | No | No | No |
| ZKP | Yes | No | No | No |
| MFA | Yes | No | No | No |
| Data Stored | No biometric or sensitive info stored | Protected Template (Fuzzy Vault) | Cancelable Templates/Bio-Crypto | Encrypted or Compressed Template |
| PQC Ready | Yes | Not Claimed | Not Claimed | Yes |
| FAR | For 2D - 0.05, 3D - 0.46, and MFA | 0.01 | 0.14-0.27 | Not reported |
| FRR | For 2D - 0.001, 3D - 2.75 and MFA | <1 | 0.12-0.34 | Not reported |
| Smart Device Ready | Yes | Not Emphasized | Yes | Yes |
| Flexible Key Length | Yes | Not Emphasized | Not Emphasized | Not Emphasized |
| Adaptability | Yes (Can tune variables to adapt different use cases) | No | No | No |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).