Skip to main content

Asymmetric Encryption Scheme Based on Fingerprint Topological Transformation

  • Conference paper
Network Computing and Information Security (NCIS 2012)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 345))

Included in the following conference series:

  • 1333 Accesses

Abstract

This paper proposes an asymmetric encryption scheme based on fingerprint minutiae. The topology remains unchanged during encryption with round transformation, displacement and rotation operation. Meanwhile, the validity and security is proved. When length of private key is k, the number of round transformation operations for brute-force method can arrive at 2 2k.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Han, F., Hu, J., Yu, X., Wang, Y.: Fingerprint images encryption via multiscroll chaotic attractors. Applied Mathematics and Computation 185(2), 931–939 (2007)

    Article  MATH  Google Scholar 

  2. Hong, L., Wan, Y., Jain: Fingerprint image enhancement: algorithm and performance evaluation. IEEE Transactions on Pattern Analysis and Machine Intelligence 20(8), 777–789 (2002)

    Article  Google Scholar 

  3. Diffie-Hellman, W.: New direction in cryptography. IEEE Transaction on Information Theory 22(6), 644–654 (1976)

    Article  Google Scholar 

  4. Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public key crypto- systems. Communications of the ACM 21(2), 120–126 (1978)

    Article  MathSciNet  MATH  Google Scholar 

  5. Gamal, L.: A Public Key Cryptosystem and A Signa- ture Scheme Based on Discrete Logarithms. IEEE Transactions on Information Theory 31(4), 469–472 (1985)

    Article  MATH  Google Scholar 

  6. Koblitz, N.: Elliptic curve cryptosystems. Mathematics of Computation 48(177), 201–209 (1987)

    Article  MathSciNet  Google Scholar 

  7. Miller, V.S.: Use of Elliptic Curves in Cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986)

    Google Scholar 

  8. Brown, G.E., Green, A.E.S.: American Journal of Physics 36(4), 371 (1968)

    Google Scholar 

  9. Smid, M.E., Branstad, D.K., NBS, Gaithersburg, M.D.: Data Encryptions Standard: past and future. Proceedings of the IEEE 76(5), 550–559 (1988)

    Article  Google Scholar 

  10. Black, J., Rogaway, P., Shrimpton, T.: Encryption-Scheme Security in the Presence of Key-Dependent Messages. In: van der Hoek, A., Coen-Porisini, A. (eds.) SEM 2002. LNCS, vol. 2596, pp. 62–75. Springer, Heidelberg (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cui, J., Zhang, X., Yue, G., Liu, H., Lai, Z. (2012). Asymmetric Encryption Scheme Based on Fingerprint Topological Transformation. In: Lei, J., Wang, F.L., Li, M., Luo, Y. (eds) Network Computing and Information Security. NCIS 2012. Communications in Computer and Information Science, vol 345. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35211-9_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35211-9_26

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35210-2

  • Online ISBN: 978-3-642-35211-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics