Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2017, International Journal of Computer Network and Information Security
Digital Signature protects the document`s integrity and binds the authenticity of the user who have signed. Present Digital Signature algorithm confirms authenticity but it does not ensure secrecy of the data. Techniques like encryption and decryption are needed to be used for this purpose. Biometric security has been a useful way for authentication and security as it provides a unique identity of the user. In this paper we have discussed the user authentication process and development of digital signatures. Authentication was based on hash functions which uses biometric features. Hash codes are being used to maintain the integrity of the document which is digitally signed. For security purpose, Encryption and Decryption techniques are used to develop a bio-cryptosystem. User information when gets concatenated with feature vector of biometric data, which actually justifies the sense of authentication. Various online or offline transaction where authenticity and integrity is the top most priority can make use of this development.
Digital Signatures are fast emerging as a viable information security solution, satiating the objectives of data integrity, entity authentication, privacy, non-repudiation and certification. The technique, as it stands today, faces the problem of the maintenance of the secrecy of the private key. This document provides a conceptual framework for the establishment of a biometric-based key generation scheme. In this scheme, the private key is generated each time a document or record requires to be signed. Such generation is based upon a combination of biometric traits.
2013
Associating an identity with an individual is called personal identification. A wide variety of systems requires reliable personal recognition schemes to either confirm or determine the identity of an individual. The problem of resolving the identity of a person can be categorized into two fundamentally distinct types of problems with different inherent complexities: (i) Verification (authentication) and (ii) Recognition (identification). The purpose of such schemes is to ensure that the rendered services are accessed only by a legitimate user and no one else. In the absence of robust personal recognition schemes, these systems are exposed to the tricks of a fraud. Biometric recognition or, simply, biometrics refers to the automatic recognition of individuals based on their physiological and/or behavioral characteristics. With the increasing reliance on electronic information, which needs to be exchanged across the internet or stored on open networks, cryptography is becoming an increasingly important feature of computer security. A biometric key dependent cryptosystem is proposed, to ensure the security of the whole system by using fingerprint features as a key in a cryptosystem. In this paper, extract the features of the fingerprint and use cryptography for related privacy concerns. Key generates from fingerprint and uses that key in digital signature to convert plain text into digital signature in asymmetric cryptography.
2011
Exchange of electronic documents (e-documents) or documents in an e-mail on the internet has been widely used as a commercial transaction. To ensure e-document is still intact / authentic to the party verifier in transit on the network insecure one of them by giving digital signatures on edocuments. The purpose of this research is to create a new concept in the security of e-documents with a hybrid method: Biometric signatures and DSA (Digital Signature Algorithm) as one solution to the problem of key management and meet the needs non-singular signer. The input as key generator is the offline signature of one or more users for produce one or more digital signatures to a single e-document. Furthermore, edocuments, digital signatures and public key is transmitted over the internet via e-mail on verifier. Then the verifier to verify whether the results are valid or invalid.
An online secured document exchange, secured bank transactions, and other ecommerce requirements need to be protected in commercial environment as it becomes big,. Digital signature (DS) is the only means of achieving it. This paper introduces a prototype online-algorithm in signing and verifying a document digitally. Document’s hash value is calculated, and protected using keys derived from face characteristics. This paper presents a method in signing document differ from traditional systems using passwords, smartcards or biometrics based on direct access. It utilizes a wirelessly accessed biometrics type to provide: 1. Un tampered biometrics in digital signatures. 2. Proof of a true identity. It also investigates existing digital signature system that is based on smart card. The obtained results were translated in term of speed and security enhancement which is highly in demand of e-commerce society
International Journal of Innovative Research in Computer and Communication Engineering, 2014
In recent days, for secure information transaction through internet, the most used term is cryptography. Where encryption algorithm, decryption algorithm, key generation algorithm and key matching algorithms are used for proper secure transaction from sender to receiver, avoiding any middle attacker. Here the main concept of the paper comes from cryptography, which is combined with the fingerprint geometry, which is the current leader of Biometric Authentication. Here the fingerprint geometry is used for key generation, information deduction from the key. Here the fingerprint matching algorithm would be used for information deduction from key. To implement the above concept, sender’s recent fingerprint geometry would be used to construct key by combining it with the information. For key decryption, the sender’s Database fingerprint images, which are already kept by receiver at receiver’s end would be used. Here the fingerprint matching algorithms would be used, which are applied on ...
People have traditionally used signatures as a means of informing others that the signature has read and understood a document. Digital signature in a document is bound to that document in such a way that altering the signed document or moving the signature to a different document invalidates the signature. This security eliminates the need for paper copies of documents and can speed the processes involving documents that require signatures. Digital Signatures are messages that identify and authenticate a particular person as the source of the electronic message, and indicate such persons approval of the information contained in the electronic message. Emerging applications like electronic commerce and secure communications over open networks have made clear the fundamental role of public key cryptosystem as unique security solutions. On the other hand, these solutions clearly expose the fact, that the protection of private keys is a security bottleneck in these sensitive applications. This problem is further worsened in the cases where a single and unchanged private key must be kept secret for very long time (such is the case of certification authority keys, and e-cash keys). They help users to achieve basic security building blocks such as identification, authentication, and integrity.
2013 4th International Conference on Computer and Communication Technology (ICCCT), 2013
ABSTRACT Signatures are widely used as a means of personal identification and verification. Many documents like bank cheques and legal transactions require signature verification. Signature-based verification of a large number of documents is a very difficult and time consuming task. Consequently an explosive growth has been observed in biometric personal verification and authentication systems that are connected with quantifiable physical unique characteristics (finger prints, hand geometry, face, ear, iris scan, or DNA) or behavioral features (gait, voice etc.). As traditional identity verification methods such as tokens, passwords, pins etc suffer from some fatal flaws and are incapable to satisfy the security necessities, the paper aims to consider a more reliable biometric feature, signature verification for the considering. We present a survey of signature verification systems. We classify and give an account of the various approaches that have been proposed for signature verification.
In the present scenario, the advancements and development of Information Technology makes the people to depend on various computing devices to do their work efficiently and conveniently. To protect the data from the hackers during transmission, it " s best preventing from the unauthorized person access. To achieve this key (Cryptography) and fingerprint, tongue iris…etc (Biometrics) can be used to resolve this problem. This paper is about comparative study on three papers with different algorithms and methods to provide data protection from an intruder. This paper helps you to understand how to provide an enhanced security for data transmission and authentication of a person by integrating features of Cryptography and Biometrics.
cse.lehigh.edu
Despite the fact that public key algorithms are very strong, their security lies in the safe custody of the private key. In case of private key compromise, extensive damage may be caused to the user as the key can be used to sign forged documents. The usual way to store a private ...
International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2022
This alludes to measurements identified or verified with human qualities. Biometrics techniques are validating is useful and utilized in the software testing or engineering as the any type of IDs and also access control. This is likewise used distinguish persons in collect or gatherings that are under re-co naissance. Biometric technique identifiers or validates are the particular, correct qualities used to identify name and depute individuals. The biometric validates or identifiers are frequently sorted as physiological vs behavioral (use as social) characteristics. The physiological or behavioral attributes are the identified or verified with the any part of the full body and we can see as well. Precedents incorporate, these are not any restricted to fingerprint impression, face, veins, DNA, hand geometry ,palm print bio, iris , eye retina and smell/odor/fragrance. The behavioral (like as Social) characteristics and attributes are verified or identified within this instance of conduct to a human like a man or women, including yet not also restricted to composing, walk, and human voice.
Biometrics can provide a key element of identity management, both in terms of biometric user authentication and identity assurance systems. In the area of cyber-security, it is important to know both who is attempting to access a system and that biometric identity data is itself protected. Biometrics has emerged as an important tool in supporting effective identity management by strongly binding a physical person to their identity. ISO has developed several standards that support the use of biometrics in a cyber-security environment. Signcryption is a relatively new cryptographic primitive, standardized in 2012 as ISO/IEC 29150 .Signcryption uses "an asymmetric encryption scheme and a digital signature scheme combined in a specific way", along with "a specially developed algorithm" to perform both encryption and digital signature functions simultaneously. This efficient cryptographic technique provides data integrity, origin authentication, and data confidentiality in a single operation.
2012
The Design and Implementation of a Biometric System for Nigerian Prisons Service (NPS) using Calabar Prisons as case study has been carried out. The system allows users (prison inmates) to be enrolled so that their biometric fingerprint trait is captured and encrypted using Hash Massage Authentication Code (HMAC) technique modeled via cryptographic hash algorithms. The unique corresponding HMAC of the user generated can then be stored in either the application database or in a smart memory card (smart card) for future usage and referencing.
With the use of mobile devices as a client for Internet, the threat of unauthorized and unauthenticated access of crucial documents is increasing day by day. Although Digital Signature is meant to be the solution for the unauthenticated access, its implementation is not adequate till now. Symmetric Data Transfer mechanism is used for the transfer of significant documents, but there is need of a more competent mechanism for safe transfer, authentication as well as verification of the documents. In this paper, we contemplate Asymmetric Data Transfer mechanism for the transfer of documents on Smartphones. But Asymmetric Cryptographic algorithms require complex computations and consume lot of power for execution. Hence a new technique is suggested in the paper, which is merely based on the concept of Asymmetric Cryptography but is feasible for smartphones. The paper also presents some research about the pre-existing techniques for implementation of Digital Signature technology.
2015
Nowadays, security plays a major role in communication. Security is the degree of resistance to, or protection from harm or viruses that corrupts the system. As there is tremendous increase in the use of internet and various communication channels , the issue of data or message security is arised. Digital signature is a technique that provides security to the data or message. In this paper we are going to survey on the digital signature. It is an electronic signature used to authenticate the identity of the sender and it assures that original content of the message or document received by the receiver is unchanged or same. The goal of the paper is to study the various digital signature methods proposed recently to secure the data transmission.
International Journal of Computer Applications, 2015
The digital signature technique is essential for secure transactions over open networks. It is used in a variety of applications to ensure the integrity of data exchanged or stored and to prove to the recipient the originator's identity. Digital signature schemes are mostly used in cryptographic protocols to provide services like entity authentication, authenticated key transport and authenticated key agreement. This architecture is related with secure Hash Function and cryptographic algorithm In this paper we are going to make review about all those technique that are developed within last 5-10 years. And which are developed with the help of digital signature and based on public key cryptography. These techniques provides a better platform for security of data using cryptography.
International Journal of Computer Applications, 2021
Network is a node collection. The network's basic aim is to transfer information from one location to another. This information must be secured from access by third parties. The cryptography concept was based upon the necessity to secure critical data exchanged across an unsecured network. While using encryption the transmitter encrypts or encodes the information with a secret key so that only the tender recipient will understand it. Cryptanalysis, however, means unwanted access without the secret information key. The cryptography uses various techniques that are Diffie Hellman, AES, RSA, DES, IDEA, BLOWFISH, x.509, PKI, Digital Signatures convert plain texts into the respective chipper text. In different circumstances all these algorithms are important. RSA's most productive computerized signature calculation .This article presents a precise writing review of different computerized signature frameworks dependent on RSA. A basic report is completed on the key age, the creation of marks, the mark check of different computerized signature approaches.
Signature identification using Biometrics methods is a well-studied problem in Biometrics. It involves the authentication of a person based on his signature. This paper is developed by using Vb.net as a front end Ms Access as backend. Our method validates the signature based on hand movement when a person signs his signature. Our method has a unique advantage over existing systems. A signature can be drawn easily by other unintended persons in important documents. But it is sure that only the original person can sign with the same fast movement and correct sequence. Since our method tracks the movement sequence and the speed with which the person signs his signature, it is highly accurate for authentication than any other existing system. One of the main advantages of our method is computationally inexpensive, that is it uses minimum system resources, less memory and hence offers a very high speed of recognition. Also, the signature identification cannot be duplicated unlike the existing methods where the passwords could be cracked using trail-and-error methods. We implement the system using the GUI tools of VB.NET. He has to draw his signature using the mouse in the panel and he/she is entered into the website based on the recognition result.
Handwritten signature biometric is considered as a noninvasive and nonintrusive process by the majority of the users. Furthermore, it has a high legal value for document authentication, as well as being dependent on by both commercial transactions and governmental institutions. Signature verification requires storing templates in the database, which threatens the security of the system from being stolen, to being vulnerable to the template playback attack that may give an attacker an invalid access to the system. Moreover, an individual cannot use his / her signature with two applications or more, otherwise, a cross matching problem will occur. The aforementioned problems can be avoided by using biometric template protection techniques for the online signature, which have been reviewed and discussed in this paper considering both protections and verification. Furthermore, the verification elaboration comprises of capture devices, pre-processing, feature extraction and classification methods.
2001
Although PKI offers many advantages like authentication, integrity, non-repudiation and confidentiality, it cannot identify the maker of a transaction. It can only identify maker's belongings (disks, smart cards) or what he remembers (passwords, PINs etc). Integrating biometrics with PKI to directly generate private key can not only identify the maker accurately but can also resolve the key management issue by not having to store the private key anywhere. We proposed a new system to generate digital signatures using biometrics and denominated it as Biometric Signatures in . We also discussed two schemes to generate Biometric Signatures using RSA and DSA. This paper gives detail description of the modifications suggested for private key generation in [1,2] using both schemes to allow certificate renewal. This paper also proposes a new method to generate private keys for Biometric Signatures using RSA. Speed of Biometric Signatures using modified schemes for iris recognition and comparative key generation speeds for various biometrics is presented using JAVA implementation of both approaches.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.