A Fingerprint Encryption Scheme Based on Irreversible Function and Secure Authentication

被引:2
|
作者
Yang, Yijun [1 ]
Yu, Jianping [1 ]
Zhang, Peng [1 ]
Wang, Shulan [1 ]
机构
[1] Shenzhen Univ, ATR Key Lab Natl Def Technol, Shenzhen 518060, Peoples R China
关键词
Cryptography; -; Authentication;
D O I
10.1155/2015/673867
中图分类号
Q [生物科学];
学科分类号
07 ; 0710 ; 09 ;
摘要
A fingerprint encryption scheme based on irreversible function has been designed in this paper. Since the fingerprint template includes almost the entire information of users' fingerprints, the personal authentication can be determined only by the fingerprint features. This paper proposes an irreversible transforming function (using the improved SHA1 algorithm) to transformthe original minutiae which are extracted from the thinned fingerprint image. Then, Chinese remainder theorem is used to obtain the biokey from the integration of the transformed minutiae and the private key. The result shows that the scheme has better performance on security and efficiency comparing with other irreversible function schemes.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] Secure Fingerprint Authentication with Homomorphic Encryption
    Yang, Wencheng
    Wang, Song
    Yu, Kan
    Kang, James Jin
    Johnstone, Michael N.
    [J]. 2020 DIGITAL IMAGE COMPUTING: TECHNIQUES AND APPLICATIONS (DICTA), 2020,
  • [2] The fingerprint identity-based encryption scheme based on IBE and fingerprint authentication
    Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China
    不详
    不详
    [J]. Beijing Youdian Daxue Xuebao, 2006, SUPPL. 2 (19-23+29):
  • [3] A secure and efficient fingerprint images encryption scheme
    Zhao, Song
    Li, Hengjian
    Yan, Xu
    [J]. PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 2803 - +
  • [4] An authentication and encryption scheme of network management message based on device fingerprint
    Zhang, Dengyin
    Xu, Jinlian
    Cheng, Chunling
    Xue, Qinghan
    [J]. Information Technology Journal, 2013, 12 (06) : 1206 - 1212
  • [5] Secure and Efficient Online Fingerprint Authentication Scheme Based On Cloud Computing
    Liu, Yao
    Zhou, Tanping
    Yue, Zelun
    Liu, Wenchao
    Han, Yiliang
    Li, Qi
    Yang, Xiaoyuan
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (01) : 564 - 578
  • [6] THREE-FACTOR AUTHENTICATION SCHEME BASED ON SEARCHABLE ENCRYPTION AND BIOMETRIC FINGERPRINT
    Mihailescu, Marius Iulian
    Nita, Stefania Loredana
    [J]. 2020 13TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2020, : 139 - 144
  • [7] A Medical Image Encryption Scheme for Secure Fingerprint-Based Authenticated Transmission
    Castro, Francesco
    Impedovo, Donato
    Pirlo, Giuseppe
    [J]. APPLIED SCIENCES-BASEL, 2023, 13 (10):
  • [8] Secure fingerprint-based remote user authentication scheme using smartcards
    Yoon, EJ
    Yoo, KY
    [J]. INTERNET AND NETWORK ECONOMICS, PROCEEDINGS, 2005, 3828 : 405 - 413
  • [9] ID-based authentication scheme combined with identity-based encryption with fingerprint hashing
    Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876, China
    不详
    [J]. J. China Univ. Post Telecom., 2008, 4 (75-80,120):
  • [10] An Indistinguishably Secure Function Encryption Scheme
    Zhang, Ping
    Li, Yamin
    Liu, Muhua
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2019, 2019