TY - GEN
T1 - A palmprint cryptosystem
AU - Wu, Xiangqian
AU - Zhang, Dapeng
AU - Wang, Kuanquan
PY - 2007/12/1
Y1 - 2007/12/1
N2 - Traditional cryptosystems are based on passwords, which can be cracked (simple ones) or forgotten (complex ones). This paper proposes a novel cryptosystem based on palmprints. This system directly uses the palmprint as a key to encrypt/decrypt information. The information of a palmprint is so complex that it is very difficult, if not impossible, to crack the system while it need not remember anything to use the system. In the encrypting phase, a 1024 bits binary string is extracted from the palmprints using differential operations. Then the string is translated to a 128 bits encrypting key using a Hash function, and at the same time, an error-correct-code (ECC) is generated. Some general encryption algorithms use the 128 bits encrypting key to encrypt the secret information. In decrypting phase, the 1024 bits binary string extracted from the input palmprint is first corrected using the ECC Then the corrected string is translated to a decrypting key using the same Hash function. Finally, the corresponding general decryption algorithms use decrypting key to decrypt the information. The experimental results show that the accuracy and security of this system can meet the requirement of most applications.
AB - Traditional cryptosystems are based on passwords, which can be cracked (simple ones) or forgotten (complex ones). This paper proposes a novel cryptosystem based on palmprints. This system directly uses the palmprint as a key to encrypt/decrypt information. The information of a palmprint is so complex that it is very difficult, if not impossible, to crack the system while it need not remember anything to use the system. In the encrypting phase, a 1024 bits binary string is extracted from the palmprints using differential operations. Then the string is translated to a 128 bits encrypting key using a Hash function, and at the same time, an error-correct-code (ECC) is generated. Some general encryption algorithms use the 128 bits encrypting key to encrypt the secret information. In decrypting phase, the 1024 bits binary string extracted from the input palmprint is first corrected using the ECC Then the corrected string is translated to a decrypting key using the same Hash function. Finally, the corresponding general decryption algorithms use decrypting key to decrypt the information. The experimental results show that the accuracy and security of this system can meet the requirement of most applications.
UR - http://www.scopus.com/inward/record.url?scp=37849010331&partnerID=8YFLogxK
M3 - Conference article published in proceeding or book
SN - 9783540745488
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 1035
EP - 1042
BT - Advances in Biometrics - International Conference, ICB 2007, Proceedings
T2 - 2007 International Conference on Advances in Biometrics, ICB 2007
Y2 - 27 August 2007 through 29 August 2007
ER -