A fingerprint encryption scheme based on irreversible function and secure authentication (Q308819): Difference between revisions
From MaRDI portal
Created claim: Wikidata QID (P12): Q35271558, #quickstatements; #temporary_batch_1712186161777 |
ReferenceBot (talk | contribs) Changed an Item |
||
Property / cites work | |||
Property / cites work: On the fractal geometry of DNA by the binary image analysis / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: A class of negatively fractal dimensional Gaussian random functions / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Power spectrum of generalized fractional Gaussian noise / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: On a mathematical model of immune competition / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Finding Collisions in the Full SHA-1 / rank | |||
Normal rank |
Latest revision as of 12:36, 12 July 2024
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | A fingerprint encryption scheme based on irreversible function and secure authentication |
scientific article |
Statements
A fingerprint encryption scheme based on irreversible function and secure authentication (English)
0 references
6 September 2016
0 references
Summary: A fingerprint encryption scheme based on irreversible function has been designed in this paper. Since the fingerprint template includes almost the entire information of users' fingerprints, the personal authentication can be determined only by the fingerprint features. This paper proposes an irreversible transforming function (using the improved SHA1 algorithm) to transform the original minutiae which are extracted from the thinned fingerprint image. Then, Chinese remainder theorem is used to obtain the biokey from the integration of the transformed minutiae and the private key. The result shows that the scheme has better performance on security and efficiency comparing with other irreversible function schemes.
0 references
fingerprint encryption
0 references
irreversible function
0 references
personal authentication
0 references