INFORMATION CHANGE THE WORLD

International Journal of Computer Network and Information Security(IJCNIS)

ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)

Published By: MECS Press

IJCNIS Vol.9, No.1, Jan. 2017

A Novel Digital Signature Algorithm based on Biometric Hash

Full Text (PDF, 452KB), PP.12-19


Views:256   Downloads:10

Author(s)

Shivangi Saxena, Darpan Anand

Index Terms

Hash functions;Bio-cryptosystem;Feature vector;Digital Signature;Integrity;Authenticity; Biometric Template

Abstract


Digital Signature protects the document`s integrity and binds the authenticity of the user who have signed. Present Digital Signature algorithm confirms authenticity but it does not ensure secrecy of the data. Techniques like encryption and decryption are needed to be used for this purpose. Biometric security has been a useful way for authentication and security as it provides a unique identity of the user. In this paper we have discussed the user authentication process and development of digital signatures. Authentication was based on hash functions which uses biometric features. Hash codes are being used to maintain the integrity of the document which is digitally signed. For security purpose, Encryption and Decryption techniques are used to develop a bio -cryptosystem. User information when gets concatenated with feature vector of biometric data, which actually justifies the sense of authentication. Various online or offline transaction where authenticity and integrity is the top most priority can make use of this development.

Cite This Paper

Shivangi Saxena, Darpan Anand,"A Novel Digital Signature Algorithm based on Biometric Hash", International Journal of Computer Network and Information Security(IJCNIS), Vol.9, No.1, pp.12-19, 2017.DOI: 10.5815/ijcnis.2017.01.02

Reference

[1]U. Uludag, S. Pankanti, A.K. Jain, "Biometric cryptosystems: Issues and Challenges", IEEE Multimedia.

[2]Emanuele Maiorana, Patrizio Campisi, Alessandro Neri "TEMPLATE PROTECTION FOR DYNAMIC TIME WARPING BASED BIOMETRIC SIGNATURE AUTHENTICATION", 5-7 July 2009 IEEE.

[3]Digital signatures S.R. SUBRAMANYA AND BYUNG K. YI.

[4]Security for Digital Rights Managmement, Vol. 92, No.6, pp: 948960, 2004 Jain AK, Nandakumar K, Nagar A: Biometric template security. EURASIP J Adv Signal Process 2008, 1-17.

[5]Choosing Best Hashing Strategies and Hash Functions Mahima Singh,. Deepak Garg Computer science and Engineering Department, Thapar University, Patiala.

[6]Password Hardened Biometric: A Complete Solution of Online Security, I. J. Computer Network and Information Security, 2013, 6, 42-48 Published Online May 2013 in MECS.

[7]Biometric Hash based on Statistical Features of Online Signatures Clam Vielhauer', Ralf Steinrnetz', Astrid Mayerhofer'.

[8]Ratha, J. Connell, and R. Bolle. 2001. Enhancing Security and Privacy in Biometrics-based Authentication Systems. IBM Systems Journal 40, 3 (2001), 614–634.

[9]R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Communications of the ACM, vol.21, pp.120-126, 1978.

[10]Digital Signature using Biometrics D Mann, S Gupta, A Sharma, S Akhtar - Proceedings of the World Congress on Engineering and Computer Science 2015 Vol I WCECS 2015, October 21-23, 2015, San Francisco, USA.

[11]Elmadani A. B, Prakash V and Ramli A. R.Application of Smartcard & Secure Coprocessor, BICET conference. Brunei.2001.

[12]Spalka A. Cremers A and Langweg H.,Protecting the Creation of Digital Signature with Trusted Computing Platform Technology Against Attacks by Trojan Horse. In IFIP Security Conference. 2001.

[13]Langweg H. Malware Attacks on Electronic Signatures Revisited. In Sicherheit 3rd Jahrestagug Fachbereich Sicherheit der Gesellschaft fuer Informatik. 2006.

[14]Trusted Document Signing based on use of biometric(Face) keys International Journal of Cyber-Security and Digital Forensics (IJCSDF) 1(4): 289-296 The Society of Digital Information and Wireless Communications, 2012 (ISSN: 2305-0012) Ahmed B. Elmadani.

[15]Practical Digital Signature Generation using Biometrics, Taekyoung Kwon1 and Jae-il Lee2.

[16]Digital Signature forming and keys protection based onperson's Characteristics Ahmed B. Elmadani Dept. of Computer Science Faculty of Science Sebha University, 978-1-4673-1166-3/12/$31.00 ©2012 IEEE.

[17]International Journal of Engineering Research and General Science Volume 2, Issue 4, June-July, 2014 ISSN 2091-2730182 www.ijergs.org Biometric Template Feature Extraction and Matching Using ISEF Edge Detection and Contouring Based Algorithm Deven Trivedi1, Rohit Thanki1, Ashish Kothari2 1PhD Researcher Scholar, C. U. Shah University, Near Kothariya Village, Wadhwan City, Gujarat, India 2Assistant Professor, Atmiya Institute of Technology & Science, Rajkot, Gujarat, India.

[18]Image Feature Extraction for application of Biometric Identification of Iris – A Morphological Approach JOAQUIM DEMIRA JR.1, JOCELIMAYER2 Proceedings ofthe XVI Brazilian Symposium on Computer Graphics and Image Processing (SIBGRAPI'03) 1530-1834/03, 2003 IEEE.

[19]Joshua Abraham, "Fingerprint Matching using A Hybrid Shape and Orientation Descriptor", State of the art in Biometrics, ISBN 978-953-307-489-4, July 2011. 

[20]Evolution of Electronic Passport Scheme using Cryptographic Protocol along with Biometrics Authentication System, I. J. Computer Network and Information Security, 2012, 2, 50-58 Published Online March 2012 in MECS.

[21]Mohammad Ziaullah; Dept. of ECE, SECAB I.E.T, Vijayapur, Karnataka, India; Prakash Shetty; Shoaib Kamal, "Image feature based authentication and digital signature for wireless data transmission".IEEE, 7-9 Jan. 2016.