Secure Hashing of Dynamic Hand Signatures Using Wavelet-Fourier Compression with BioPhasor Mixing and 2N Discretization
We introduce a novel method for secure computation of biometric hash on dynamic hand signatures using BioPhasor mixing and 2N discretization. The use of BioPhasor as the mixing process provides a one-way transformation that precludes exact recovery of the biometric vector from compromised hashes and...
| Main Authors: | Wai Kuan, Yip, Teoh, Andrew B. J., Ngo, David C. L. |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
SPRINGER
2007
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/3164/ http://shdl.mmu.edu.my/3164/1/1173.pdf |
Similar Items
Biophasor: Token supplemented cancellable biometrics
by: Teoh, , Andrew B. J, et al.
Published: (2006)
by: Teoh, , Andrew B. J, et al.
Published: (2006)
Cancellable biometrics and annotations on BioHash
by: TEOH, A, et al.
Published: (2008)
by: TEOH, A, et al.
Published: (2008)
Dynamic signature verification based on hybrid wavelet-Fourier transform
by: Khoh, W. H., et al.
Published: (2014)
by: Khoh, W. H., et al.
Published: (2014)
Remarks on BioHash and its mathematical foundation
by: TEOH, A, et al.
Published: (2006)
by: TEOH, A, et al.
Published: (2006)
Cryptographic keys from dynamic hand-signatures with biometric secrecy preservation and replaceability
by: Kuan, , YW, et al.
Published: (2005)
by: Kuan, , YW, et al.
Published: (2005)
Eigenspace-based face hashing
by: Ngo, , DCL, et al.
Published: (2004)
by: Ngo, , DCL, et al.
Published: (2004)
Loss-tolerant stream authentication via configurable integration of one-time signatures and hash-graphs
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs
by: Teoh, A.B.J., et al.
Published: (2006)
by: Teoh, A.B.J., et al.
Published: (2006)
Image Steganography Using Hash Function And Compression
by: Ahmad Sulaiman, Zurkifli
Published: (2023)
by: Ahmad Sulaiman, Zurkifli
Published: (2023)
Effect of image compression using fast fourier transformation and discrete wavelet transformation on transfer learning wafer defect image classification
by: Jessnor Arif, Mat Jizat, et al.
Published: (2020)
by: Jessnor Arif, Mat Jizat, et al.
Published: (2020)
Single hand Indian classical gesture recognition based on discrete wavelet transform and discrete cosine transform feature extraction
by: Jaganathan, Kavitha
Published: (2015)
by: Jaganathan, Kavitha
Published: (2015)
Design and analysis of discrete wavelet transform (DWT) for image compression using VHDL
by: Al Muhit, , A, et al.
Published: (2005)
by: Al Muhit, , A, et al.
Published: (2005)
Generation of replaceable cryptographic keys from dynamic handwritten signatures
by: Yip, , WK, et al.
Published: (2006)
by: Yip, , WK, et al.
Published: (2006)
PalmHashing: a novel approach for cancelable biometrics
by: Tee, Connie, et al.
Published: (2005)
by: Tee, Connie, et al.
Published: (2005)
Methods For Generating Cryptographic Keys From Online Hand Signatures
by: Yip, Wai Kuan
Published: (2007)
by: Yip, Wai Kuan
Published: (2007)
Remarks on BioHashing based cancelable biometrics in verification system
by: JIN, A, et al.
Published: (2006)
by: JIN, A, et al.
Published: (2006)
PalmHashing: A novel approach for dual-factor authentication
by: Tee, Connie, et al.
Published: (2004)
by: Tee, Connie, et al.
Published: (2004)
Personalised cryptographic key generation based on FaceHashing
by: TEOH, A
Published: (2004)
by: TEOH, A
Published: (2004)
Speech Compression Using Discrete Wavelet Transform
by: M.Ali Najih, Abdulmawla
Published: (2003)
by: M.Ali Najih, Abdulmawla
Published: (2003)
Improved fuzzy hashing technique for biometric template protection
by: Ong, T. S., et al.
Published: (2014)
by: Ong, T. S., et al.
Published: (2014)
Compression of chemical signal using wavelet transform
by: S.A.A., Karim, et al.
Published: (2009)
by: S.A.A., Karim, et al.
Published: (2009)
Classification of phonocardiogram signals using discrete wavelet analysis
by: Chebil, Jalel, et al.
Published: (2014)
by: Chebil, Jalel, et al.
Published: (2014)
A study on different fault characteristics using wavelet and fast Fourier transforms
by: E., Engu, et al.
Published: (2008)
by: E., Engu, et al.
Published: (2008)
VLSI implementation of Inverse Discrete Wavelet Transform for JPEG 2000
by: Bhuyan, Mohammad Shaharia, et al.
Published: (2007)
by: Bhuyan, Mohammad Shaharia, et al.
Published: (2007)
Broad view of cryptographic hash functions
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
An efficient fingerprint verification system using integrated wavelet and Fourier–Mellin invariant transform
by: Jin, A
Published: (2004)
by: Jin, A
Published: (2004)
Omega network hash construction
by: Chuah, Chai Wen
Published: (2009)
by: Chuah, Chai Wen
Published: (2009)
Discrete Wavelet Transform (DWT) Based Dual Watermarking For Authentication And Copyright Protection
by: Lim, Chen Gen
Published: (2023)
by: Lim, Chen Gen
Published: (2023)
A comparison of discrete cosine transform and discrete wavelet transform algorithm in watermarking against common attacks
by: Said, Mohamed Abdisalan
Published: (2015)
by: Said, Mohamed Abdisalan
Published: (2015)
Design and analysis of a new hash function gear
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
Cryptographic hash function: a high level view
by: Taha, Imad, et al.
Published: (2015)
by: Taha, Imad, et al.
Published: (2015)
A new design of cryptographic hash function: gear
by: Alkandari, Abdulaziz M, et al.
Published: (2015)
by: Alkandari, Abdulaziz M, et al.
Published: (2015)
A new design of cryptographic hash function: gear
by: Alkandari, Abdulaziz M, et al.
Published: (2015)
by: Alkandari, Abdulaziz M, et al.
Published: (2015)
MOIM: a novel design of cryptographic hash function
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
Hash function of finalist SHA-3: analysis study
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
Cryptographic hash function: A high level view
by: Alkandari, Abdulaziz Ali, et al.
Published: (2013)
by: Alkandari, Abdulaziz Ali, et al.
Published: (2013)
Removal of Decaying DC Offset in Current Signals for Power System Phasor Estimation
by: Amir A. A., Eisa, et al.
Published: (2008)
by: Amir A. A., Eisa, et al.
Published: (2008)
Diversity technique using discrete wavelet transform in OFDM system
by: Parveen, Nagma, et al.
Published: (2019)
by: Parveen, Nagma, et al.
Published: (2019)
Biometric hash: high-confidence face recognition
by: Ngo, D.C.L., et al.
Published: (2006)
by: Ngo, D.C.L., et al.
Published: (2006)
Generalized discrete fourier transform based improvement of partial transmit sequence scheme to reduce PAPR in OFDM systems
by: Elshirkasi, Ahmed Mohamed, et al.
Published: (2015)
by: Elshirkasi, Ahmed Mohamed, et al.
Published: (2015)
Similar Items
-
Biophasor: Token supplemented cancellable biometrics
by: Teoh, , Andrew B. J, et al.
Published: (2006) -
Cancellable biometrics and annotations on BioHash
by: TEOH, A, et al.
Published: (2008) -
Dynamic signature verification based on hybrid wavelet-Fourier transform
by: Khoh, W. H., et al.
Published: (2014) -
Remarks on BioHash and its mathematical foundation
by: TEOH, A, et al.
Published: (2006) -
Cryptographic keys from dynamic hand-signatures with biometric secrecy preservation and replaceability
by: Kuan, , YW, et al.
Published: (2005)