IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Secure Dynamic Signature-Crypto Key Computation

Secure Dynamic Signature-Crypto Key Computation
View Sample PDF
Author(s): Andrew Teoh Beng Jin (Yonsei University, Korea)and Yip Wai Kuan (Multimedia University, Malaysia)
Copyright: 2010
Pages: 17
Source title: Behavioral Biometrics for Human Identification: Intelligent Applications
Source Author(s)/Editor(s): Liang Wang (University of Bath, United Kingdom)and Xin Geng (Southeast University, China)
DOI: 10.4018/978-1-60566-725-6.ch017

Purchase

View Secure Dynamic Signature-Crypto Key Computation on the publisher's website for pricing and purchasing information.

Abstract

Biometric-key computation is a process of converting a piece of live biometric data into a key. Among the various biometrics available today, the hand signature has the highest level of social acceptance. The general masses are familiar with the use of handwritten signature by means of verification and acknowledgement. On the other hand, cryptography is used in multitude applications present in technologically advanced society. Examples include the security of ATM cards, computer networks, and e-commerce. The signature crypto-key computation is hence of highly interesting as it is a way to integrate behavioral biometrics with the existing cryptographic framework. In this chapter, we report a dynamic hand signatures-key generation scheme which is based on a randomized biometric helper. This scheme consists of a randomized feature discretization process and a code redundancy construction. The former enables one to control the intraclass variations of dynamic hand signatures to the minimal level and the latter will further reduce the errors. Randomized biometric helper ensures that a signature-key is easy to be revoked when the key is compromised. The proposed scheme is evaluated based on the 2004 signature verification competition (SVC) database. We found that the proposed methods are able to produce keys that are stable, distinguishable, and secure.

Related Content

Ajay Rawat, Shivani Gambhir. © 2017. 19 pages.
Abhijit Chandra, Srideep Maity. © 2017. 15 pages.
Swanirbhar Majumder, Saurabh Pal. © 2017. 26 pages.
Fouad Farouk Jabri. © 2017. 32 pages.
Francisco Pacheco Andrade, Teresa Coelho Moreira. © 2017. 13 pages.
Swanirbhar Majumder, Smita Majumder. © 2017. 31 pages.
Yuanfang Guo, Oscar C. Au, Ketan Tang. © 2017. 20 pages.
Body Bottom