A Fingerprint Encryption Scheme Based on Irreversible Function and Secure Authentication
A fingerprint encryption scheme based on irreversible function has been designed in this paper. Since the fingerprint template includes almost the entire information of users’ fingerprints, the personal authentication can be determined only by the fingerprint features. This paper proposes an irrever...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi Limited
2015-01-01
|
Series: | Computational and Mathematical Methods in Medicine |
Online Access: | http://dx.doi.org/10.1155/2015/673867 |
id |
doaj-291af44d1297423498b90c992252e2e0 |
---|---|
record_format |
Article |
spelling |
doaj-291af44d1297423498b90c992252e2e02020-11-24T22:42:41ZengHindawi LimitedComputational and Mathematical Methods in Medicine1748-670X1748-67182015-01-01201510.1155/2015/673867673867A Fingerprint Encryption Scheme Based on Irreversible Function and Secure AuthenticationYijun Yang0Jianping Yu1Peng Zhang2Shulan Wang3ATR Key Laboratory of National Defense Technology, Shenzhen University, Shenzhen 518060, ChinaATR Key Laboratory of National Defense Technology, Shenzhen University, Shenzhen 518060, ChinaATR Key Laboratory of National Defense Technology, Shenzhen University, Shenzhen 518060, ChinaATR Key Laboratory of National Defense Technology, Shenzhen University, Shenzhen 518060, ChinaA fingerprint encryption scheme based on irreversible function has been designed in this paper. Since the fingerprint template includes almost the entire information of users’ fingerprints, the personal authentication can be determined only by the fingerprint features. This paper proposes an irreversible transforming function (using the improved SHA1 algorithm) to transform the original minutiae which are extracted from the thinned fingerprint image. Then, Chinese remainder theorem is used to obtain the biokey from the integration of the transformed minutiae and the private key. The result shows that the scheme has better performance on security and efficiency comparing with other irreversible function schemes.http://dx.doi.org/10.1155/2015/673867 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Yijun Yang Jianping Yu Peng Zhang Shulan Wang |
spellingShingle |
Yijun Yang Jianping Yu Peng Zhang Shulan Wang A Fingerprint Encryption Scheme Based on Irreversible Function and Secure Authentication Computational and Mathematical Methods in Medicine |
author_facet |
Yijun Yang Jianping Yu Peng Zhang Shulan Wang |
author_sort |
Yijun Yang |
title |
A Fingerprint Encryption Scheme Based on Irreversible Function and Secure Authentication |
title_short |
A Fingerprint Encryption Scheme Based on Irreversible Function and Secure Authentication |
title_full |
A Fingerprint Encryption Scheme Based on Irreversible Function and Secure Authentication |
title_fullStr |
A Fingerprint Encryption Scheme Based on Irreversible Function and Secure Authentication |
title_full_unstemmed |
A Fingerprint Encryption Scheme Based on Irreversible Function and Secure Authentication |
title_sort |
fingerprint encryption scheme based on irreversible function and secure authentication |
publisher |
Hindawi Limited |
series |
Computational and Mathematical Methods in Medicine |
issn |
1748-670X 1748-6718 |
publishDate |
2015-01-01 |
description |
A fingerprint encryption scheme based on irreversible function has been designed in this paper. Since the fingerprint template includes almost the entire information of users’ fingerprints, the personal authentication can be determined only by the fingerprint features. This paper proposes an irreversible transforming function (using the improved SHA1 algorithm) to transform the original minutiae which are extracted from the thinned fingerprint image. Then, Chinese remainder theorem is used to obtain the biokey from the integration of the transformed minutiae and the private key. The result shows that the scheme has better performance on security and efficiency comparing with other irreversible function schemes. |
url |
http://dx.doi.org/10.1155/2015/673867 |
work_keys_str_mv |
AT yijunyang afingerprintencryptionschemebasedonirreversiblefunctionandsecureauthentication AT jianpingyu afingerprintencryptionschemebasedonirreversiblefunctionandsecureauthentication AT pengzhang afingerprintencryptionschemebasedonirreversiblefunctionandsecureauthentication AT shulanwang afingerprintencryptionschemebasedonirreversiblefunctionandsecureauthentication AT yijunyang fingerprintencryptionschemebasedonirreversiblefunctionandsecureauthentication AT jianpingyu fingerprintencryptionschemebasedonirreversiblefunctionandsecureauthentication AT pengzhang fingerprintencryptionschemebasedonirreversiblefunctionandsecureauthentication AT shulanwang fingerprintencryptionschemebasedonirreversiblefunctionandsecureauthentication |
_version_ |
1725699011268050944 |