A new security scheme based on palmprint biometrics for signature

被引:0
|
作者
Shi, Ruiqiong [1 ]
Sun, Dongmei [1 ]
机构
[1] Beijing Jiaotong Univ, Inst Informat Sci, Beijing 100044, Peoples R China
关键词
palmprint; biometrics; gabor filter; secure key management; signature;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents a palmprint biometrics technology for secure key management and signature; and a practical and secure cryptographic algorithm is proposed. The algorithm provides a method of generating reliably binary templates, or "biometric templates", from genuine palmprint image using 2-D Gabor filters. The biometric template can replace traditional password used for secure key management, which can protect the secrecy of the master key used for key pair generation before signature. A public key and corresponding private key can be created using the elliptic curve point embedding technique. Based on the above ideas, we use a pairing based signature scheme to perform signing and verification on the elliptic curve. Finally, the scheme was evaluated using 98 different person's right hands and proved to have higher accuracy and better FRR rates compared with the prior work.
引用
收藏
页码:101 / 106
页数:6
相关论文
共 50 条
  • [1] Multimodal biometrics by integrating fingerprint and Palmprint for security
    Mhaske, V. D.
    Patankar, A. J.
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2013, : 38 - 42
  • [2] A Secure and Practical Signature Scheme for Blockchain Based on Biometrics
    Kaga, Yosuke
    Fujio, Masakazu
    Naganuma, Ken
    Takahashi, Kenta
    Murakami, Takao
    Ohki, Tetsushi
    Nishigaki, Masakatsu
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2017, 2017, 10701 : 877 - 891
  • [3] Security of a new digital signature scheme based on factoring and discrete logarithms
    Shao, Z
    [J]. INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2005, 82 (10) : 1215 - 1219
  • [4] Biometrics Encryption Based on Palmprint and Convolutional Code
    Qiu, Jian
    Li, Hengjian
    Dong, Jiwen
    Feng, Guang
    [J]. 2017 2ND INTERNATIONAL CONFERENCE ON MULTIMEDIA AND IMAGE PROCESSING (ICMIP), 2017, : 187 - 190
  • [5] Biometrics Security Scheme for Privacy Protection
    Ko, Jong Gook
    Moon, Ki Young
    [J]. PROCEEDINGS OF THE 2008 ADVANCED SOFTWARE ENGINEERING & ITS APPLICATIONS, 2008, : 230 - 232
  • [6] On the security of an identity-based signature scheme
    [J]. Huang, X.-Y. (xyhuang81@gmail.com), 1600, Science Press (37):
  • [7] On the Security of an Attribute-Based Signature Scheme
    Tan, Syh-Yuan
    Heng, Swee-Huay
    Goi, Bok-Min
    [J]. U- AND E-SERVICE, SCIENCE AND TECHNOLOGY, 2009, 62 : 161 - +
  • [8] Security analysis on a blind signature scheme based on Elgamal signature equation
    Yu Eaozheng
    Xu Congwei
    [J]. CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 741 - 744
  • [9] RKA Security for Identity-Based Signature Scheme
    Chang, Jinyong
    Wang, Huiqun
    Wang, Fei
    Zhang, Anling
    Ji, Yanyan
    [J]. IEEE ACCESS, 2020, 8 : 17833 - 17841
  • [10] On the security of group signature scheme and designated verifier signature scheme
    Zhang, Jianhong
    Geng, Qin
    [J]. PROCEEDINGS OF THE 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE, AND STORAGE, 2008, : 351 - 358