A palmprint cryptosystem

14Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Traditional cryptosystems are based on passwords, which can be cracked (simple ones) or forgotten (complex ones). This paper proposes a novel cryptosystem based on palmprints. This system directly uses the palmprint as a key to encrypt/decrypt information. The information of a palmprint is so complex that it is very difficult, if not impossible, to crack the system while it need not remember anything to use the system. In the encrypting phase, a 1024 bits binary string is extracted from the palmprints using differential operations. Then the string is translated to a 128 bits encrypting key using a Hash function, and at the same time, an error-correct-code (ECC) is generated. Some general encryption algorithms use the 128 bits encrypting key to encrypt the secret information. In decrypting phase, the 1024 bits binary string extracted from the input palmprint is first corrected using the ECC Then the corrected string is translated to a decrypting key using the same Hash function. Finally, the corresponding general decryption algorithms use decrypting key to decrypt the information. The experimental results show that the accuracy and security of this system can meet the requirement of most applications. © Springer-Verlag Berlin Heidelberg 2007.

Cite

CITATION STYLE

APA

Wu, X., Zhang, D., & Wang, K. (2007). A palmprint cryptosystem. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4642 LNCS, pp. 1035–1042). Springer Verlag. https://doi.org/10.1007/978-3-540-74549-5_108

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free