A new security scheme based on palmprint biometrics for signature

被引:0
|
作者
Shi, Ruiqiong [1 ]
Sun, Dongmei [1 ]
机构
[1] Beijing Jiaotong Univ, Inst Informat Sci, Beijing 100044, Peoples R China
关键词
palmprint; biometrics; gabor filter; secure key management; signature;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents a palmprint biometrics technology for secure key management and signature; and a practical and secure cryptographic algorithm is proposed. The algorithm provides a method of generating reliably binary templates, or "biometric templates", from genuine palmprint image using 2-D Gabor filters. The biometric template can replace traditional password used for secure key management, which can protect the secrecy of the master key used for key pair generation before signature. A public key and corresponding private key can be created using the elliptic curve point embedding technique. Based on the above ideas, we use a pairing based signature scheme to perform signing and verification on the elliptic curve. Finally, the scheme was evaluated using 98 different person's right hands and proved to have higher accuracy and better FRR rates compared with the prior work.
引用
收藏
页码:101 / 106
页数:6
相关论文
共 50 条
  • [21] On the security of a group signature scheme with forward security
    Wang, GL
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003, 2004, 2971 : 27 - 39
  • [22] How AI-based biometrics can guarantee e-signature security
    Sahib, Mo
    [J]. Biometric Technology Today, 2022, 2022 (04)
  • [23] One-Factor Cancellable Palmprint Recognition Scheme Based on OIOM and Minimum Signature Hash
    Wang, Xiyu
    Li, Hengjian
    [J]. IEEE ACCESS, 2019, 7 : 131338 - 131354
  • [24] Identity-based quantum signature scheme with strong security
    Xiangjun Xin
    Zhuo Wang
    Qinglan Yang
    [J]. Optical and Quantum Electronics, 2019, 51
  • [25] A tight security reduction identity-based signature scheme
    Kang, Li
    Lu, Xianhui
    Tang, Xiaohu
    Fan, Jia
    [J]. CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 730 - 734
  • [26] Security Analysis of a Proxy Blind Signature Scheme Based on ECDLP
    Yang, Xuan
    Yu, Zhaoping
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4732 - 4735
  • [27] Security of digital signature scheme based on factoring and discrete logarithms
    Chang, CC
    Chang, YF
    [J]. Proceedings of the Second International Conference on Information and Management Sciences, 2002, 2 : 331 - 332
  • [28] Identity-Based Digital Signature Scheme with Forward Security
    Tang Lei
    Liu Yali
    [J]. PROCEEDINGS OF 2009 CONFERENCE ON COMMUNICATION FACULTY, 2009, : 290 - 293
  • [29] RKA Security of Identity-Based Homomorphic Signature Scheme
    Chang, Jinyong
    Ma, Hui
    Zhang, Anling
    Xu, Maozhi
    Xue, Rui
    [J]. IEEE ACCESS, 2019, 7 : 50858 - 50868
  • [30] Identity-based quantum signature scheme with strong security
    Xin, Xiangjun
    Wang, Zhuo
    Yang, Qinglan
    [J]. OPTICAL AND QUANTUM ELECTRONICS, 2019, 51 (12)