Limits...
A fingerprint encryption scheme based on irreversible function and secure authentication.

Yang Y, Yu J, Zhang P, Wang S - Comput Math Methods Med (2015)

Bottom Line: A fingerprint encryption scheme based on irreversible function has been designed in this paper.Since the fingerprint template includes almost the entire information of users' fingerprints, the personal authentication can be determined only by the fingerprint features.The result shows that the scheme has better performance on security and efficiency comparing with other irreversible function schemes.

View Article: PubMed Central - PubMed

Affiliation: ATR Key Laboratory of National Defense Technology, Shenzhen University, Shenzhen 518060, China.

ABSTRACT
A fingerprint encryption scheme based on irreversible function has been designed in this paper. Since the fingerprint template includes almost the entire information of users' fingerprints, the personal authentication can be determined only by the fingerprint features. This paper proposes an irreversible transforming function (using the improved SHA1 algorithm) to transform the original minutiae which are extracted from the thinned fingerprint image. Then, Chinese remainder theorem is used to obtain the biokey from the integration of the transformed minutiae and the private key. The result shows that the scheme has better performance on security and efficiency comparing with other irreversible function schemes.

Show MeSH

Related in: MedlinePlus

(a) The comparison between improved SHA1 and original SHA1. (b) The efficiency of improved SHA1 and original SHA1.
© Copyright Policy - open-access
Related In: Results  -  Collection


getmorefigures.php?uid=PMC4385657&req=5

fig7: (a) The comparison between improved SHA1 and original SHA1. (b) The efficiency of improved SHA1 and original SHA1.

Mentions: In the improved SHA1, the complexity has been slightly increased because of the extra circularly left-shift and additional calculation. In a computer with Intel (R) Pentium (R) D CPU 3.0 GHz and RAM 512 M, the hash value is calculated for the same character string “iscbupt” with two different hash functions. The running time of improved SHA1 and original SHA1 has been shown in Figure 7(a).


A fingerprint encryption scheme based on irreversible function and secure authentication.

Yang Y, Yu J, Zhang P, Wang S - Comput Math Methods Med (2015)

(a) The comparison between improved SHA1 and original SHA1. (b) The efficiency of improved SHA1 and original SHA1.
© Copyright Policy - open-access
Related In: Results  -  Collection

Show All Figures
getmorefigures.php?uid=PMC4385657&req=5

fig7: (a) The comparison between improved SHA1 and original SHA1. (b) The efficiency of improved SHA1 and original SHA1.
Mentions: In the improved SHA1, the complexity has been slightly increased because of the extra circularly left-shift and additional calculation. In a computer with Intel (R) Pentium (R) D CPU 3.0 GHz and RAM 512 M, the hash value is calculated for the same character string “iscbupt” with two different hash functions. The running time of improved SHA1 and original SHA1 has been shown in Figure 7(a).

Bottom Line: A fingerprint encryption scheme based on irreversible function has been designed in this paper.Since the fingerprint template includes almost the entire information of users' fingerprints, the personal authentication can be determined only by the fingerprint features.The result shows that the scheme has better performance on security and efficiency comparing with other irreversible function schemes.

View Article: PubMed Central - PubMed

Affiliation: ATR Key Laboratory of National Defense Technology, Shenzhen University, Shenzhen 518060, China.

ABSTRACT
A fingerprint encryption scheme based on irreversible function has been designed in this paper. Since the fingerprint template includes almost the entire information of users' fingerprints, the personal authentication can be determined only by the fingerprint features. This paper proposes an irreversible transforming function (using the improved SHA1 algorithm) to transform the original minutiae which are extracted from the thinned fingerprint image. Then, Chinese remainder theorem is used to obtain the biokey from the integration of the transformed minutiae and the private key. The result shows that the scheme has better performance on security and efficiency comparing with other irreversible function schemes.

Show MeSH
Related in: MedlinePlus