Tamper-resistant biometric IDs

被引:0
|
作者
Kirovski, D [1 ]
Jojic, N [1 ]
Jancke, G [1 ]
机构
[1] Microsoft Res, Redmond, WA 98052 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present FaceCerts, a simple, inexpensive, and cryptographically secure identity certification system. A FaceCert is a printout of person's portrait photo, an arbitrary textual message, and a 2-D color barcode which encodes an RSA signature of the message hash and the compressed representation of the face encompassed by the photo. The signature is created using the private key of the party issuing the ID. ID verification is performed by a simple off-line scanning device that contains the public key of the issuer. The system does not require smart cards; it can be expanded to encompass other biometric features, and more interestingly, the ID does not need to be printed by a trusted or high-end printer, it can be printed anywhere, anytime, and potentially by anyone. The ID verifier uses a single scan process which does not require the use of displays. We detail system's components and present a preliminary performance evaluation using an in-field experiment.
引用
收藏
页码:160 / 175
页数:16
相关论文
共 50 条
  • [1] TAMPER-RESISTANT BUT NOT IMPOSSIBLE
    MCLEARN, D
    [J]. AMERICAN JOURNAL OF NURSING, 1985, 85 (03) : 244 - +
  • [2] Tamper-resistant cryptographic hardware
    Fujino, Takeshi
    Kubota, Takaya
    Shiozaki, Mitsuru
    [J]. IEICE ELECTRONICS EXPRESS, 2017, 14 (02): : 1 - 13
  • [3] Tamper-Resistant LikeJacking Protection
    Johns, Martin
    Lekies, Sebastian
    [J]. RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES, 2013, 8145 : 265 - 285
  • [4] TAMPER-RESISTANT PACKAGING - IS IT REALLY
    LOCKHART, HE
    RICHMOND, M
    SNEDEN, J
    [J]. PACKAGE ENGINEERING, 1983, 28 (07): : 96 - &
  • [5] Tamper-resistant LikeJacking protection
    Johns, Martin
    Lekies, Sebastian
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2013, 8145 LNCS : 265 - 285
  • [6] License protection with a tamper-resistant token
    Chong, CN
    Ren, B
    Doumen, J
    Etalle, S
    Hartel, PH
    Corin, R
    [J]. INFORMATION SECURITY APPLICATIONS, 2005, 3325 : 223 - 237
  • [7] Tamper-resistant ubiquitous data management
    Bouganim, L
    Ngoc, FD
    Pucheral, P
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2005, 20 (02): : 147 - 158
  • [8] The Research of Website Tamper-resistant Technology
    Qi Tao
    Wang Bo
    Zhao Sujuan
    [J]. ADVANCES IN APPLIED SCIENCES AND MANUFACTURING, PTS 1 AND 2, 2014, 850-851 : 475 - +
  • [9] Tamper-resistant whole program partitioning
    Zhang, T
    Pande, S
    Valverde, A
    [J]. ACM SIGPLAN NOTICES, 2003, 38 (07) : 209 - 219
  • [10] Two-stage tamper response in tamper-resistant software
    Park, Moon Chan
    Koo, Woo Kwon
    Suh, Dong Geun
    Kim, In Seok
    Lee, Dong Hoon
    [J]. IET SOFTWARE, 2016, 10 (03) : 81 - 88