Secure Dynamic Signature-Crypto Key Computation

Author(s):  
Andrew Teoh Beng Jin ◽  
Yip Wai Kuan

Biometric-key computation is a process of converting a piece of live biometric data into a key. Among the various biometrics available today, the hand signature has the highest level of social acceptance. The general masses are familiar with the use of handwritten signature by means of verification and acknowledgement. On the other hand, cryptography is used in multitude applications present in technologically advanced society. Examples include the security of ATM cards, computer networks, and e-commerce. The signature crypto-key computation is hence of highly interesting as it is a way to integrate behavioral biometrics with the existing cryptographic framework. In this chapter, we report a dynamic hand signatures-key generation scheme which is based on a randomized biometric helper. This scheme consists of a randomized feature discretization process and a code redundancy construction. The former enables one to control the intraclass variations of dynamic hand signatures to the minimal level and the latter will further reduce the errors. Randomized biometric helper ensures that a signature-key is easy to be revoked when the key is compromised. The proposed scheme is evaluated based on the 2004 signature verification competition (SVC) database. We found that the proposed methods are able to produce keys that are stable, distinguishable, and secure.

2019 ◽  
Author(s):  
Juliana De A. S. M. ◽  
Márjory Da Costa-Abreu

In recent years, behavioural soft-biometrics have been widely used to improve biometric systems performance. Information like gender, age and ethnicity can be obtained from more than one behavioural modality. In this paper, we propose a multimodal hand-based behavioural database for gender recognition. Thus, our goal in this paper is to evaluate the performance of the multimodal database. For this, the experiment was realised with 76 users and was collected keyboard dynamics, touchscreen dynamics and handwritten signature data. Our approach consists of compare two-modal and one-modal modalities of the biometric data with the multimodal database. Traditional and new classifiers were used and the statistical Kruskal-Wallis to analyse the accuracy of the databases. The results showed that the multimodal database outperforms the other databases.


2017 ◽  
Vol 4 (1) ◽  
pp. 41-61
Author(s):  
Pelin Sönmez ◽  
Abulfaz Süleymanov

Türkiye, Cumhuriyet tarihinin en yoğun zorunlu göç dalgasını 2011 yılından bu yana süren Suriye Savaşı ile yaşamaktadır. Suriye vatandaşlarının geçici koruma statüsü altında Türkiye toplumuna her açıdan entegrasyonları günümüzün ve geleceğin politika öncelikleri arasında düşünülmelidir. Öte yandan ülkeye kabul edilen sığınmacıların kendi kültürel kimliğini kaybetmeden içinde yaşadığı ev sahibi topluma uyumu, ortak yaşam kültürünün gelişmesi açısından önem arz etmektedir. Bu makalede, "misafir" olarak kabul edilen Suriyeli vatandaşların Türk toplumunca kabul edilmeleri ve dışlanma risklerinin azaltılmasına yönelik devlet politikaları ortaya konularak, üye ve aday ülkelere göçmenlerin dışlanmasını önlemek için Avrupa Birliği (AB) tarafından sunulan hukuki yapı ve kamu hizmeti inisiyatifleri incelenmekte, birlikte yaşam kültürü çerçevesinde Suriyeli vatandaşlara yönelik  toplumsal kabul düzeyleri ele alınmaktadır. Çalışma iki ana bölümden oluşmaktadır: göçmen ve sığınmacılara karşı toplumsal dışlanmayı engellemek için benimsenen yasa ve uygulamaların etkisi ve İstanbul-Sultanbeyli bölgesinde Suriyeli sığınmacılarla ilgili toplumsal algı çalışmasının sonuçları. Bölgede ikamet eden Suriyelilere yönelik toplumsal kabul düzeyinin yüksek olduğu görülürken, halkın Suriyelileri kendilerine  kültürel ve dini olarak yakın hissetmesi toplumsal kabul düzeyini olumlu etkilemektedir. ABSTRACT IN ENGLISHAn evaluation of the European Union and Turkish policies regarding the culture of living togetherThis article aims to determine the level of social acceptance towards Syrians within the context of cohabitation culture by evaluating EU’s legal structure and public service initiatives in order to prevent Syrian refugees from being excluded in member and candidate countries and by revealing government policies on acceptance of Syrians as “guest” by Turkish society and minimizing the exclusion risks of them. This article consists of two main parts, one of which is based on the effects of law and practices preventing refugees and asylum seekers from social exclusion, and the other is on the results of social perception on Syrians in Sultanbeyli district of Istanbul. At the end of 5-years taking in Syrian War, it is obvious that most of more than 3 million Syrian with unregistered ones in Turkey are “here to stay”. From this point of view, the primary scope of policies should be specified in order to remove side effects of refugee phenomenon seen as weighty matter by bottoming out the exclusion towards those people. To avoid possible large-scale conflicts or civil wars in the future, the struggle with exclusion phenomenon plays a crucial role regarding Turkey’s sociological situation and developing policies. In the meaning of forming a model for Turkey, a subtitle in this article is about public services for European-wide legal acquis and practices carried out since 1970s in order to prevent any exclusion from the society. On the other hand, other subtitles are about legal infrastructure and practices like Common European Asylum and Immigration Policies presented in 2005, and Law on Foreigners and International Protection introduced in 2013. In the last part of the article, the results of a field survey carried out in a district of Istanbul were used to analyze the exclusion towards refugees in Turkey. A face-to-face survey was randomly conducted with 200 settled refugees in Sultanbeyli district of Istanbul, and their perceptions towards Syrian people under temporary protection were evaluated. According to the results, the level of acceptance for Syrians living in this district seems relatively high. The fact that Turkish people living in the same district feel close to Syrian refugees culturally and religiously affect their perception in a positive way: however, it is strikingly seen and understood that local residents cop an attitude on the refugees’ becoming Turkish citizens.


2017 ◽  
Vol 27 (03) ◽  
pp. 1850037 ◽  
Author(s):  
Yasir ◽  
Ning Wu ◽  
Xiaoqiang Zhang

This paper proposes compact hardware implementations of 64-bit NESSIE proposed MISTY1 block cipher for area constrained and low power ASIC applications. The architectures comprise only one round MISTY1 block cipher algorithm having optimized FO/FI function by re-utilizing S9/S7 substitution functions. A focus is also made on efficient logic implementations of S9 and S7 substitution functions using common sub-expression elimination (CSE) and parallel AND/XOR gates hierarchy. The proposed architecture 1 generates extended key with independent FI function and is suitable for MISTY1 8-rounds implementation. On the other hand, the proposed architecture 2 uses a single FO/FI function for both MISTY1 round function as well as extended key generation and can be employed for MISTY1 [Formula: see text] rounds. To analyze the performance and covered area for ASICs, Synopsys Design Complier, SMIC 0.18[Formula: see text][Formula: see text]m @ 1.8[Formula: see text]V is used. The hardware constituted 3041 and 2331 NAND gates achieving throughput of 171 and 166 Mbps for 8 rounds implementation of architectures 1 and 2, respectively. Comprehensive analysis of proposed designs is covered in this paper.


2021 ◽  
Vol 8 ◽  
Author(s):  
Shivanand S. Gornale ◽  
Sathish Kumar ◽  
Abhijit Patil ◽  
Prakash S. Hiremath

Biometric security applications have been employed for providing a higher security in several access control systems during the past few years. The handwritten signature is the most widely accepted behavioral biometric trait for authenticating the documents like letters, contracts, wills, MOU’s, etc. for validation in day to day life. In this paper, a novel algorithm to detect gender of individuals based on the image of their handwritten signatures is proposed. The proposed work is based on the fusion of textural and statistical features extracted from the signature images. The LBP and HOG features represent the texture. The writer’s gender classification is carried out using machine learning techniques. The proposed technique is evaluated on own dataset of 4,790 signatures and realized an encouraging accuracy of 96.17, 98.72 and 100% for k-NN, decision tree and Support Vector Machine classifiers, respectively. The proposed method is expected to be useful in design of efficient computer vision tools for authentication and forensic investigation of documents with handwritten signatures.


1999 ◽  
Vol 9 (2) ◽  
pp. 337-345 ◽  
Author(s):  
John Dobson

Abstract:Here I synthesize certain ideas presented in two different articles that appeared in the same issue of Business Ethics Quarterly. One article (Hasnas) invokes the stockholder model as a valid normative theory of business ethics, the other article (Dunfee) invokes a marketplace of morality. Both articles imply that the accepted financial-economic view of the firm is a view that can accommodate ethics. I offer empirical support for this view. I also identify the ethic of the stockholder model as a variant on might-makes-right and consider the social acceptance of this ethic as a postmodern phenomenon.


2019 ◽  
Vol 8 (4) ◽  
pp. 12465-12470

E-Voting is one of the advance techniques which is imposed for the Voters to a get advancement in casting their vote towards to their desired candidate. The E-Voting is implemented in various other countries with the various methodologies as per their need. This paper evaluates a Unique method for the process of e-voting with the proper authentication from the government servers and also it authenticates the e-Voting machine using the proper authentication process and allows the voter to cast their vote towards the desired candidate. The System uses the Specific Security Strategic Algorithm which is used for the providing of the efficient security to the both Voter and Voter Machine. The Chances of the Jail Breaking of the Communication channel of the system server and e-Voting Machine is reduced to minimal level that the no chances of data breach or the data leak can be entertained. Following of the proper architectural approach which makes the system more efficient which achieves the higher range of the accuracy and throughput value when compared with the other imposed E-Voting System. The strategic policies used in the system complies with all the security rules and terms that provides the evidences of a better architecture gives the process of the E-Voting system more secure and specific


2015 ◽  
Vol 25 (3) ◽  
pp. 271 ◽  
Author(s):  
Glauber Carvalho Nobre ◽  
Paulo Felipe Ribeiro Bandeira ◽  
Maria Helena Da Silva Ramalho ◽  
Francisco Salviano Sales Nobre ◽  
Nadia Cristina Valentini

ntroduction: practising sport contributes tothe reinforcement of important psychological features such as self-perception of competence, especially when participants are children from socially vulnerable contexts. Objective: to compare the socially vulnerablechildren’s self-perception of competence, assisted and unassisted by social sports projects. Method: a total of 235 children (male and female), aged between seven and tenyears, participated in this comparative study. They were divided into two groups: onegroup was formed by 106 children participating in social sports projects;the other was 129 children who did not participate in socialsports projects. The self-perception of competence was assessed by the Brazilian version of the Self-Perception Profile for Children. We used a three-way ANOVA to assess the possible interaction effect between gender, age and group (children assisted and unassisted) in the different dimensions of perceived competence. Results: The children attending sports projects reported higher overall self-worth (F(1.234)) = 6.132, p = 0.014, η2 = 0.026). It was observed that there was an effect of interaction between the variable age x group (F(1.234)) = 6.673, p = 0.010, η2 = 0.029) on the self-perception of social acceptance. There were no significant effects of group on the other dimensions of self-perception of competence. Conclusion: the children participatingin social sports projects showed more self-perception in terms of social acceptance and self-concept compared tonon-participatory children. This project does not help in other dimensions of self-perception.


Author(s):  
Mariia Lutsenko ◽  
Alexandr Kuznetsov ◽  
Yurii Gorbenko ◽  
Inna Oleshko ◽  
Yurii Pronchakov ◽  
...  

2020 ◽  
Vol 38 (3B) ◽  
pp. 115-127
Author(s):  
Duha D. Salman ◽  
Raghad A. Azeez ◽  
Adul mohssen J. Hossen

Biometrics are short of revocability and privacy while cryptography cannot adjust the user’s identity.  By obtaining cryptographic keys using biometrics, one can obtain the features such as revocability, assurance about user’s identity, and privacy. Multi-biometrical based cryptographic key generation approach has been proposed, subsequently, left and right eye and ear of a person are uncorrelated from one to other, and they are treated as two independent biometrics and combine them in our system. None-the-less, the encryption keys are produced with the use of an approach of swarm intelligence.  Emergent collective intelligence in groups of simple autonomous agents is collectively termed as a swarm intelligence. The Meerkat Clan Key Generation Algorithm (MCKGA) is a method for the generation of a key stream for the encryption of the plaintext. This method will reduce and distribute the number of keys.  Testing of system, it was found that the keys produced by the characteristics of the eye are better than the keys produced by the characteristics of the ear. The advantages of our approach comprise generation of strong and unique keys from users’ biometric data using MCKGA and it is faster and accurate in terms of key generation.


Sign in / Sign up

Export Citation Format

Share Document