Biometric Digital Signature Key Generation
Dec 01, 2001 This paper introduces the notion of biometric signature – a new approach to integrate biometrics with public key infrastructure, using biometric based digital signature generation which is secure, efficacious, fast, convenient, non‐invasive and correctly identifies the maker of a transaction. Biometric Digital Signature Key Generation 39 From the technical point of view, this work proposes several biometric dig-ital key and signature generation frameworks to ensure data integrity, mutual authentication, and confidentiality. From the practical perspective, this work de.
This alert has been successfully added and will be sent to:
You will be notified whenever a record that you have chosen has been cited.
To manage your alert preferences, click on the button below.
Manage my AlertsPlease log in to your account
Save to Binder
Create a New Binder
- 1.Biometrics Consortium homepage; www.biometrics.org.Google Scholar
- 2.Chellappa, R., Wilson, C., and Sirohey, A. Human and machine recognition of faces: A survey. In Proceedings of the IEEE 83, 5 (1995) 705-740.Google ScholarCross Ref
- 3.Daugman, J.G. High confidence visual recognition of persons by a test of statistical independence. IEEE Trans. Pattern Anal. and Machine Intell. 15, 11 (1993)1148-1161. Google ScholarDigital Library
- 4.Furui, S. Recent advances in speaker recognition. Pattern Recognition Letters 18 (1997) 859-872.Google ScholarCross Ref
- 5.Jain, A.K. Bolle, R. and Pankanti S. (eds.). Biometrics: Personal Identification in Networked Society. Kluwer, New York, 1999. Google ScholarDigital Library
- 6.Jain, A.K., Hong, L., Pankanti, S., and Bolle, R. An identityauthentication system using fingerprints. In Proceedings of the IEEE 85, 9 (1997), 1365-1388. Google ScholarDigital Library
- 7.Nalwa, V. Automatic on-line signature verification. In Proceedings of the IEEE 85, 2 (1997), 213-239.Google ScholarCross Ref
- 8.Miller, B. Vital signs of identity. IEEE Spectrum 31, 2 (1994), 22-30. Google ScholarDigital Library
- 9.Sidlauskas, D.R. 3D hand profile identification apparatus. U.S. Patent No. 4736203, 1988.Google Scholar
- 10.Hill, R.B. Apparatus and method for identifying individuals through their retinal vasculature patterns. US Patent No. 4109237, 1978.Google Scholar
- 11.Prokoski, F.K. Disguise detection and identification using infrared imagery. In the Proceedings of SPIE, Optics, and Images in Law Enforcement II. A.S. Hecht, Ed. (Arlington, VA, May, 1982), 27-31.Google Scholar
- 12.Wayman, J.L. Error Rate Equations for the General Biometric System. IEEE Robotics & Automation 6, 9 (Jan. 1999), 35-48.Google Scholar
Biometric identification
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Biometric Digital Safe
Sign inFull Access
Published in
EISSN:1557-7317Issue’s Table of ContentsCopyright © 2000 ACM
In-Cooperation
Publisher
Association for Computing Machinery https://olwin.over-blog.com/2020/10/linksys-wusb54gs-v2-driver-download.html.
New York, NY, United States
Publication History
Permissions
Request permissions about this article.
Request PermissionsConference
Article Metrics
- Total CitationsView Citations
- Total Downloads
- Downloads (Last 12 months)395
- Downloads (Last 6 weeks)163
Other Metrics
PDF Format
eReader
Biometric Digital Signature Key Generation Download
Digital Edition
View this article in digital edition.
View Digital EditionHTML Format
Digital Signature Free
View this article in HTML Format .
View HTML FormatBiometric Digital Signature Key Generation Plus
- Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21, 120–126 (1978)zbMATHCrossRefGoogle Scholar
- Boneh, D.: Twenty years of attacks on the RSA cryptosystem. Notices of the American Mathematical Society (AMS) 46(2), 203–213 (1999)zbMATHGoogle Scholar
- ElGamal, T.: A Public Key Cryptosystem and a Signature Scheme based on Discrete Logarithms. IEEE Transactions on Information Theory IT-30(4), 469–472 (1985)CrossRefGoogle Scholar
- Juels, A., Sudan, M.: A Fuzzy Vault Scheme, also available at http://www.rsasecurity.com/rsalabs/staff/bios/ajuels/publications/fuzzy-vault/fuzzy_vault.pdf
- Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography, pp.287-291, pp.312-315. CRC Press, Boca Raton, USA (1997)zbMATHGoogle Scholar
- Tuyls, P., Goseling, J.: Capacity and examples of template-protecting biometric authentication systems. In: Maltoni, D., Jain, A.K. (eds.) BioAW 2004. LNCS, vol. 3087, pp. 158–170. Springer, Heidelberg (2004)Google Scholar
- Nagpal, R., Nagpal, S.: Biometric based digital signature scheme. Internet-Draft, draft-nagpal-biometric-digital-signature-00.txt (May 2002)Google Scholar
- Dodis, Y., Reyzin, L., Smith, A.: Fuzzy Extractors: How to generate strong keys from biometric identification. In: Proceedings of the Security and Privacy, IEEE Computer Society Press, Los Alamitos (1998)Google Scholar
- Boyen, X., Dodis, Y., Katz, J., Ostrovsky, R., Smith, A.: Secure remote authentication using biometrics. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 147–163. Springer, Heidelberg (2005)Google Scholar
- Soutar, C.: Biometric system performance and security (2002), Manuscript available at http://www.bioscrypt.com/assets/biopaper.pdf
- Jain, A., Hong, L., Pankanti, S.: Biometric identification. Communications of the ACM (February 2000)Google Scholar
- Janbandhu, P., Siyal, M.: Novel biometric digital signatures for Internet-based applications. Information Man-agement & Computer Security 9(5), 205–212 (2001)CrossRefGoogle Scholar
- Kwon, T., Lee, J.: Practical digital signature generation using biometrics. In: Laganà, A., Gavrilova, M., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3043, Springer, Heidelberg (2004)Google Scholar
- Orvos, P.: Towards biometric digital signatures. Networkshop, pp. 26–28. Eszterhazy College, Eger (March 2002)Google Scholar