Replaceable and securely hashed keys from online signatures

10Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.

Abstract

Incorporating the use of biometrics in cryptography has many advantages over the conventional use of passwords and keys. However, biometric data is non-replaceable, non-exact and requires template storage for comparison. We propose a secure method for generating biometric hash from online signature without template storag by incorporating user token and Wavelet-Fourier compression. Our results show good separation between genuine and forged signature keys. © IEICE 2006.

Author supplied keywords

References Powered by Scopus

Random projection-based multiplicative data perturbation for privacy preserving distributed data mining

426Citations
N/AReaders
Get full text

Biometric encryption™ using image processing

173Citations
N/AReaders
Get full text

Private key generation from on-line handwritten signatures

166Citations
N/AReaders
Get full text

Cited by Powered by Scopus

A survey on biometric cryptosystems and cancelable biometrics

544Citations
N/AReaders
Get full text

A review on performance,security and various biometric template protection schemes for biometric authentication systems

88Citations
N/AReaders
Get full text

Biometric Encryption: The New Breed of Untraceable Biometrics

39Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Yip, W. K., Teoh, A. B. J., & Ngo, D. C. L. (2006). Replaceable and securely hashed keys from online signatures. IEICE Electronics Express, 3(18), 410–416. https://doi.org/10.1587/elex.3.410

Readers' Seniority

Tooltip

Professor / Associate Prof. 5

83%

PhD / Post grad / Masters / Doc 1

17%

Readers' Discipline

Tooltip

Engineering 3

50%

Agricultural and Biological Sciences 1

17%

Computer Science 1

17%

Social Sciences 1

17%

Save time finding and organizing research with Mendeley

Sign up for free