Limits...
A fingerprint encryption scheme based on irreversible function and secure authentication.

Yang Y, Yu J, Zhang P, Wang S - Comput Math Methods Med (2015)

Bottom Line: A fingerprint encryption scheme based on irreversible function has been designed in this paper.Since the fingerprint template includes almost the entire information of users' fingerprints, the personal authentication can be determined only by the fingerprint features.The result shows that the scheme has better performance on security and efficiency comparing with other irreversible function schemes.

View Article: PubMed Central - PubMed

Affiliation: ATR Key Laboratory of National Defense Technology, Shenzhen University, Shenzhen 518060, China.

ABSTRACT
A fingerprint encryption scheme based on irreversible function has been designed in this paper. Since the fingerprint template includes almost the entire information of users' fingerprints, the personal authentication can be determined only by the fingerprint features. This paper proposes an irreversible transforming function (using the improved SHA1 algorithm) to transform the original minutiae which are extracted from the thinned fingerprint image. Then, Chinese remainder theorem is used to obtain the biokey from the integration of the transformed minutiae and the private key. The result shows that the scheme has better performance on security and efficiency comparing with other irreversible function schemes.

Show MeSH

Related in: MedlinePlus

The 8 adjacent pixels of P.
© Copyright Policy - open-access
Related In: Results  -  Collection


getmorefigures.php?uid=PMC4385657&req=5

fig3: The 8 adjacent pixels of P.

Mentions: Since the low-quality images are very common, this paper extracts minutiae from the thinned fingerprint image. As shown in Figure 3, let P be the object pixel, and then there are P1,…, P8 surrounding it. These eight points are defined as the eight adjacent pixels of P.


A fingerprint encryption scheme based on irreversible function and secure authentication.

Yang Y, Yu J, Zhang P, Wang S - Comput Math Methods Med (2015)

The 8 adjacent pixels of P.
© Copyright Policy - open-access
Related In: Results  -  Collection

Show All Figures
getmorefigures.php?uid=PMC4385657&req=5

fig3: The 8 adjacent pixels of P.
Mentions: Since the low-quality images are very common, this paper extracts minutiae from the thinned fingerprint image. As shown in Figure 3, let P be the object pixel, and then there are P1,…, P8 surrounding it. These eight points are defined as the eight adjacent pixels of P.

Bottom Line: A fingerprint encryption scheme based on irreversible function has been designed in this paper.Since the fingerprint template includes almost the entire information of users' fingerprints, the personal authentication can be determined only by the fingerprint features.The result shows that the scheme has better performance on security and efficiency comparing with other irreversible function schemes.

View Article: PubMed Central - PubMed

Affiliation: ATR Key Laboratory of National Defense Technology, Shenzhen University, Shenzhen 518060, China.

ABSTRACT
A fingerprint encryption scheme based on irreversible function has been designed in this paper. Since the fingerprint template includes almost the entire information of users' fingerprints, the personal authentication can be determined only by the fingerprint features. This paper proposes an irreversible transforming function (using the improved SHA1 algorithm) to transform the original minutiae which are extracted from the thinned fingerprint image. Then, Chinese remainder theorem is used to obtain the biokey from the integration of the transformed minutiae and the private key. The result shows that the scheme has better performance on security and efficiency comparing with other irreversible function schemes.

Show MeSH
Related in: MedlinePlus