Secure Hashing of Dynamic Hand Signatures Using Wavelet-Fourier Compression with BioPhasor Mixing and Discretization

We introduce a novel method for secure computation of biometric hash on dynamic hand signatures using BioPhasor mixing and discretization. The use of BioPhasor as the mixing process provides a one-way transformation that precludes exact recovery of the biometric vector from compromised hashes and stolen tokens. In addition, our user-specific discretization acts both as an error correction step as well as a real-to-binary space converter. We also propose a new method of extracting compressed representation of dynamic hand signatures using discrete wavelet transform (DWT) and discrete fourier transform (DFT). Without the conventional use of dynamic time warping, the proposed method avoids storage of user's hand signature template. This is an important consideration for protecting the privacy of the biometric owner. Our results show that the proposed method could produce stable and distinguishable bit strings with equal error rates (EERs) of and for random and skilled forgeries for stolen token (worst case) scenario, and for both forgeries in the genuine token (optimal) scenario.

[1]  Hao Feng,et al.  Private key generation from on-line handwritten signatures , 2002, Inf. Manag. Comput. Secur..

[2]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[3]  Ralf Steinmetz,et al.  Biometric hash based on statistical features of online signatures , 2002, Object recognition supported by user interaction for service robots.

[4]  Tsuhan Chen,et al.  Biometrics-based cryptographic key generation , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).

[5]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[6]  Bhagavatula Vijaya Kumar,et al.  Biometric Encryption using image processing , 1998, Electronic Imaging.

[7]  Ralf Steinmetz,et al.  Handwriting: Feature Correlation Analysis for Biometric Hashes , 2004, EURASIP J. Adv. Signal Process..

[8]  J.C. Martinez,et al.  A low-cost system for signature recognition , 1999, 42nd Midwest Symposium on Circuits and Systems (Cat. No.99CH36356).

[9]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[10]  D. Z. Lejtman,et al.  On-line handwritten signature verification using wavelets and back-propagation neural networks , 2001, Proceedings of Sixth International Conference on Document Analysis and Recognition.

[11]  Yutaka Fukui,et al.  On-line signature verification method utilizing feature extraction based on DWT , 2003, Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03..

[12]  Andrew Beng Jin Teoh,et al.  Cryptographic keys from dynamic hand-signatures with biometric secrecy preservation and replaceability , 2005, Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05).

[13]  T. Charles Clancy,et al.  Secure smartcardbased fingerprint authentication , 2003, WBMA '03.

[14]  K. Zimmermann,et al.  Signature recognition through spectral analysis , 1987, ICASSP '87. IEEE International Conference on Acoustics, Speech, and Signal Processing.

[15]  Andrew Beng Jin Teoh,et al.  Generation of Replaceable Cryptographic Keys from Dynamic Handwritten Signatures , 2006, ICB.

[16]  Hao Feng,et al.  Online signature verification using a new extreme points warping technique , 2003, Pattern Recognit. Lett..

[17]  Berrin A. Yanikoglu,et al.  Biometric Authentication Using Online Signatures , 2004, ISCIS.

[18]  David Chek Ling Ngo,et al.  Computation of Cryptographic Keys from Face Biometrics , 2003, Communications and Multimedia Security.

[19]  Hong Chang,et al.  SVC2004: First International Signature Verification Competition , 2004, ICBA.

[20]  Hong-Yuan Mark Liao,et al.  Wavelet-Based Off-Line Handwritten Signature Verification , 1999, Comput. Vis. Image Underst..

[21]  Kun Liu,et al.  Random projection-based multiplicative data perturbation for privacy preserving distributed data mining , 2006, IEEE Transactions on Knowledge and Data Engineering.

[22]  Andréa Vergara da Silva,et al.  Wavelet-Based Compared to Function-Based On-Line Signature Verification , 2002, SIBGRAPI.

[23]  Trevor Hastie,et al.  A model for signature verification , 1991, Conference Proceedings 1991 IEEE International Conference on Systems, Man, and Cybernetics.

[24]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..