DocumentCode
390021
Title
A secure mechanism for network authentication combining hand shapes verification and encryption
Author
Bing, He ; Zheng-ding, Qiu ; Dong-mei, Sun
Author_Institution
Inst. of Inf. Sci., Northern Jiaotong Univ., Beijing, China
Volume
2
fYear
2002
fDate
26-30 Aug. 2002
Firstpage
1846
Abstract
With the rapid growth of information technologies, biometrics is being used more and more widely in applications for accessing databases or business systems. These applications need to implement measures to counter threats to security. In the case of authentication through an open network, such as non-face-to-face trading, cryptography techniques are adopted (public key cryptography and digital signature) to avoid unauthorized use of the biometric information and guarantee the integrity of data. This paper presents a trusted third party authentication architecture in which hand shape verification techniques and cryptography techniques are combined. We have developed a prototype system in which the system is applied to a network-based workflow. Initial evaluation of the prototype system is encouraging. Similar techniques can be used to authenticate people for more flexible application.
Keywords
authorisation; biometrics (access control); data integrity; image recognition; message authentication; public key cryptography; biometrics; data integrity; digital signature; encryption; hand shape verification; network authentication; network-based workflow; nonface-to-face trading; public key cryptography; trusted third party authentication architecture; Authentication; Biometrics; Counting circuits; Data security; Databases; Information security; Information technology; Prototypes; Public key cryptography; Shape;
fLanguage
English
Publisher
ieee
Conference_Titel
Signal Processing, 2002 6th International Conference on
Print_ISBN
0-7803-7488-6
Type
conf
DOI
10.1109/ICOSP.2002.1180164
Filename
1180164
Link To Document