Biometric Digital Signature Key Generation

Publication: Communications of the ACMFebruary 2000 https://doi.org/10.1145/328236.328110
  • This alert has been successfully added and will be sent to:

    You will be notified whenever a record that you have chosen has been cited.

    To manage your alert preferences, click on the button below.

    Manage my Alerts

    Please log in to your account

  • Save to Binder
    Create a New Binder
  1. 1.Biometrics Consortium homepage; www.biometrics.org.Google Scholar
  2. 2.Chellappa, R., Wilson, C., and Sirohey, A. Human and machine recognition of faces: A survey. In Proceedings of the IEEE 83, 5 (1995) 705-740.Google ScholarCross Ref
  3. 3.Daugman, J.G. High confidence visual recognition of persons by a test of statistical independence. IEEE Trans. Pattern Anal. and Machine Intell. 15, 11 (1993)1148-1161. Google ScholarDigital Library
  4. 4.Furui, S. Recent advances in speaker recognition. Pattern Recognition Letters 18 (1997) 859-872.Google ScholarCross Ref
  5. 5.Jain, A.K. Bolle, R. and Pankanti S. (eds.). Biometrics: Personal Identification in Networked Society. Kluwer, New York, 1999. Google ScholarDigital Library
  6. 6.Jain, A.K., Hong, L., Pankanti, S., and Bolle, R. An identityauthentication system using fingerprints. In Proceedings of the IEEE 85, 9 (1997), 1365-1388. Google ScholarDigital Library
  7. 7.Nalwa, V. Automatic on-line signature verification. In Proceedings of the IEEE 85, 2 (1997), 213-239.Google ScholarCross Ref
  8. 8.Miller, B. Vital signs of identity. IEEE Spectrum 31, 2 (1994), 22-30. Google ScholarDigital Library
  9. 9.Sidlauskas, D.R. 3D hand profile identification apparatus. U.S. Patent No. 4736203, 1988.Google Scholar
  10. 10.Hill, R.B. Apparatus and method for identifying individuals through their retinal vasculature patterns. US Patent No. 4109237, 1978.Google Scholar
  11. 11.Prokoski, F.K. Disguise detection and identification using infrared imagery. In the Proceedings of SPIE, Optics, and Images in Law Enforcement II. A.S. Hecht, Ed. (Arlington, VA, May, 1982), 27-31.Google Scholar
  12. 12.Wayman, J.L. Error Rate Equations for the General Biometric System. IEEE Robotics & Automation 6, 9 (Jan. 1999), 35-48.Google Scholar
Signature
  1. Biometric identification

Biometric Key Generation In Digital Signature Of Asymmetric Key Cryptographic To Enhance Security Of Digital Data Kamini H Solanki,Chandni Patel Abstract — Associating an identity with an individual is called personal identification.

Please enable JavaScript to view thecomments powered by Disqus.

Login options

  1. Generating digital signatures using biometrics (from a practical perspective) by exploiting the existing tools in software that can release a human being from hardware devices storing a signing key or a biometric template. The digital signature should be generated in the way that it can be verified by the existing.
  2. Oct 17, 2014 This means that signing a document can use a simple signature acquisition workflow which obviates the need for the user to remember a PIN and is more secure. Simple to use, everyone has one, and very secure. Biometric signatures combined with existing electronic signature technology is a perfect combination.

Check if you have access through your login credentials or your institution to get full access on this article.

Sign inBiometric Digital Signature Key Generation

Full Access

Biometric Signature Pad

  • Published in

    EISSN:1557-7317
    Issue’s Table of Contents

    Copyright © 2000 ACM

    In-Cooperation

    Publisher

    Association for Computing Machinery

    On your ubuntu host:service ssh status Start sshd if necessarymkdir /.ssh/ (if it doesn't already exist)4. On your Windows host via cmder:cd C:UsersyourUserNamescp authorizedkeys login-id@ubuntu-Host-Ip:/.ssh5. On your Ubuntu host:chmod 700 /.sshchmod 600 /.ssh/authorizedkeys6. Generate ssh public key windows 10.

    New York, NY, United States

    Publication History

    Permissions

    Request permissions about this article.

    Request Permissions

    Conference

  • Article Metrics

    • Total Citations
      View Citations
    • Total Downloads
    • Downloads (Last 12 months)395
    • Downloads (Last 6 weeks)163

    Other Metrics

Biometric Digital Signature Key Generation Software

PDF Format

eReader

Digital Edition

View this article in digital edition. Centos generate new ssh key.

View Digital Edition

HTML Format

View this article in HTML Format .

View HTML Format

Biometric Digital Signature Key Generation And Cryptography Communication Based On Fingerprint

  1. Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21, 120–126 (1978)zbMATHCrossRefGoogle Scholar
  2. Boneh, D.: Twenty years of attacks on the RSA cryptosystem. Notices of the American Mathematical Society (AMS) 46(2), 203–213 (1999)zbMATHGoogle Scholar
  3. ElGamal, T.: A Public Key Cryptosystem and a Signature Scheme based on Discrete Logarithms. IEEE Transactions on Information Theory IT-30(4), 469–472 (1985)CrossRefGoogle Scholar
  4. Juels, A., Sudan, M.: A Fuzzy Vault Scheme, also available at http://www.rsasecurity.com/rsalabs/staff/bios/ajuels/publications/fuzzy-vault/fuzzy_vault.pdf
  5. Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography, pp.287-291, pp.312-315. CRC Press, Boca Raton, USA (1997)zbMATHGoogle Scholar
  6. Tuyls, P., Goseling, J.: Capacity and examples of template-protecting biometric authentication systems. In: Maltoni, D., Jain, A.K. (eds.) BioAW 2004. LNCS, vol. 3087, pp. 158–170. Springer, Heidelberg (2004)Google Scholar
  7. Nagpal, R., Nagpal, S.: Biometric based digital signature scheme. Internet-Draft, draft-nagpal-biometric-digital-signature-00.txt (May 2002)Google Scholar
  8. Dodis, Y., Reyzin, L., Smith, A.: Fuzzy Extractors: How to generate strong keys from biometric identification. In: Proceedings of the Security and Privacy, IEEE Computer Society Press, Los Alamitos (1998)Google Scholar
  9. Boyen, X., Dodis, Y., Katz, J., Ostrovsky, R., Smith, A.: Secure remote authentication using biometrics. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 147–163. Springer, Heidelberg (2005)Google Scholar
  10. Soutar, C.: Biometric system performance and security (2002), Manuscript available at http://www.bioscrypt.com/assets/biopaper.pdf
  11. Jain, A., Hong, L., Pankanti, S.: Biometric identification. Communications of the ACM (February 2000)Google Scholar
  12. Janbandhu, P., Siyal, M.: Novel biometric digital signatures for Internet-based applications. Information Man-agement & Computer Security 9(5), 205–212 (2001)CrossRefGoogle Scholar
  13. Kwon, T., Lee, J.: Practical digital signature generation using biometrics. In: Laganà, A., Gavrilova, M., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3043, Springer, Heidelberg (2004)Google Scholar
  14. Orvos, P.: Towards biometric digital signatures. Networkshop, pp. 26–28. Eszterhazy College, Eger (March 2002)Google Scholar