Limits...
A fingerprint encryption scheme based on irreversible function and secure authentication.

Yang Y, Yu J, Zhang P, Wang S - Comput Math Methods Med (2015)

Bottom Line: A fingerprint encryption scheme based on irreversible function has been designed in this paper.Since the fingerprint template includes almost the entire information of users' fingerprints, the personal authentication can be determined only by the fingerprint features.The result shows that the scheme has better performance on security and efficiency comparing with other irreversible function schemes.

View Article: PubMed Central - PubMed

Affiliation: ATR Key Laboratory of National Defense Technology, Shenzhen University, Shenzhen 518060, China.

ABSTRACT
A fingerprint encryption scheme based on irreversible function has been designed in this paper. Since the fingerprint template includes almost the entire information of users' fingerprints, the personal authentication can be determined only by the fingerprint features. This paper proposes an irreversible transforming function (using the improved SHA1 algorithm) to transform the original minutiae which are extracted from the thinned fingerprint image. Then, Chinese remainder theorem is used to obtain the biokey from the integration of the transformed minutiae and the private key. The result shows that the scheme has better performance on security and efficiency comparing with other irreversible function schemes.

Show MeSH

Related in: MedlinePlus

The iteration of improved SHA1.
© Copyright Policy
Related In: Results  -  Collection

License
getmorefigures.php?uid=PMC4385657&req=5

fig5: The iteration of improved SHA1.

Mentions: Formulae (5)~(8) remain unchanged. In formula (10), since there are two message words in Aj+1, it becomes very difficult to denote W[j] by a formula. 17 (the circularly left-shift bit in formula (10)) is relatively prime to 5, 30 (the circularly left-shift bit in formulae (4) and (6)), and 32 (the length of chaining variables). In this condition, it becomes more difficult to eliminate the modular differential by modular differential attack. The iteration of improved SHA1 has been shown in Figure 5.


A fingerprint encryption scheme based on irreversible function and secure authentication.

Yang Y, Yu J, Zhang P, Wang S - Comput Math Methods Med (2015)

The iteration of improved SHA1.
© Copyright Policy
Related In: Results  -  Collection

License
Show All Figures
getmorefigures.php?uid=PMC4385657&req=5

fig5: The iteration of improved SHA1.
Mentions: Formulae (5)~(8) remain unchanged. In formula (10), since there are two message words in Aj+1, it becomes very difficult to denote W[j] by a formula. 17 (the circularly left-shift bit in formula (10)) is relatively prime to 5, 30 (the circularly left-shift bit in formulae (4) and (6)), and 32 (the length of chaining variables). In this condition, it becomes more difficult to eliminate the modular differential by modular differential attack. The iteration of improved SHA1 has been shown in Figure 5.

Bottom Line: A fingerprint encryption scheme based on irreversible function has been designed in this paper.Since the fingerprint template includes almost the entire information of users' fingerprints, the personal authentication can be determined only by the fingerprint features.The result shows that the scheme has better performance on security and efficiency comparing with other irreversible function schemes.

View Article: PubMed Central - PubMed

Affiliation: ATR Key Laboratory of National Defense Technology, Shenzhen University, Shenzhen 518060, China.

ABSTRACT
A fingerprint encryption scheme based on irreversible function has been designed in this paper. Since the fingerprint template includes almost the entire information of users' fingerprints, the personal authentication can be determined only by the fingerprint features. This paper proposes an irreversible transforming function (using the improved SHA1 algorithm) to transform the original minutiae which are extracted from the thinned fingerprint image. Then, Chinese remainder theorem is used to obtain the biokey from the integration of the transformed minutiae and the private key. The result shows that the scheme has better performance on security and efficiency comparing with other irreversible function schemes.

Show MeSH
Related in: MedlinePlus