Generating and Validating DSA Private Keys from Online Face Images for Digital Signatures
Abstract
Keywords
Full Text:
PDFReferences
J. Rothenberg, "Ensuring the longevity of digital documents," Scientific American, vol. 272, pp. 42-47, 1995.
A. M. French and J. P. Shim, "The Digital Revolution: Internet of Things, 5G, and Beyond," CAIS, vol. 38, p. 40, 2016.
P. Singh, B. Raman, and P. P. Roy, "Detection of seal and signature entities with hierarchical recovery based on watermark self embedding in tampered digital documents," Displays, vol. 54, pp. 47-59, 2018.
S. Saxena and D. Anand, "A Novel Digital Signature Algorithm based on Biometric Hash," International Journal of Computer Network and Information Security, vol. 9, p. 12, 2017.
H. E. Michail, G. S. Athanasiou, G. Theodoridis, A. Gregoriades, and C. E. Goutis, "Design and implementation of totally-self checking SHA-1 and SHA-256 hash functions’ architectures," Microprocessors and Microsystems, vol. 45, pp. 227-240, 2016.
D. E. Denning, "Digital signatures with RSA and other public-key cryptosystems," Communications of the ACM, vol. 27, pp. 388-392, 1984.
Y. Isobe, Y. Seto, and M. Kataoka, "Development of personal authentication system using fingerprint with digital signature technologies," in Proceedings of the 34th Annual Hawaii International Conference on System Sciences, 2001, p. 9 pp.
E. Rahmawati, M. Listyasari, A. S. Aziz, S. Sukaridhoto, F. A. Damastuti, M. M. Bachtiar, et al., "Digital signature on file using biometric fingerprint with fingerprint sensor on smartphone," in 2017 International Electronics Symposium on Engineering Technology and Applications (IES-ETA), 2017, pp. 234-238.
M. Malik and T. Patel, "Database securityattacks and control methods," International Journal of Information, vol. 6, pp. 175-183, 2016.
R. M. Thiyab, M. A. Ali, and F. Basil, "The impact of SQL injection attacks on the security of databases," in Proceedings of the 6th International Conference of Computing & Informatics, 2017, pp. 323-331.
C. Kerry and P. Gallagher, "FIPS PUB 186-4: Digital Signature Standard (DSS)," Federal Information Processing Standards Publication. National Institute of Standards und Technology, 2013.
K. Kumar Raghuvanshi, P. Khurana, and P. Bindal, "Study and comparative analysis of different hash algorithm," Journal of Engineering Computers & Applied Sciences, vol. 3, pp. 1-3, 2014.
D. Eastlake 3rd and P. Jones, "US secure hash algorithm 1 (SHA1)," 2070-1721, 2001.
G. Gupta and S. Sharma, "Enhanced SHA-192 Algorithm with Larger Bit Difference," in 2013 International Conference on Communication Systems and Network Technologies, 2013, pp. 152-156.
T. Lakshmanan and M. Madheswaran, "Security and robustness enhancement of existing Hash algorithm," in 2009 International Conference on Signal Processing Systems, 2009, pp. 253-257.
R. Kaur and A. Kaur, "Digital signature," in 2012 International Conference on Computing Sciences, 2012, pp. 295-301.
T. Pornin, "Deterministic usage of the digital signature algorithm (DSA) and elliptic curve digital signature algorithm (ECDSA)," 2070-1721, 2013.
G. Locke and P. Gallagher, "Fips pub 186-3: Digital signature standard (dss)," Federal Information Processing Standards Publication, vol. 3, pp. 186-3, 2009.
K. Zhang, Z. Zhang, Z. Li, and Y. Qiao, "Joint face detection and alignment using multitask cascaded convolutional networks," IEEE Signal Processing Letters, vol. 23, pp. 1499-1503, 2016.
H. Jiang and E. Learned-Miller, "Face detection with the faster R-CNN," in 2017 12th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2017), 2017, pp. 650-657.
F. Schroff, D. Kalenichenko, and J. Philbin, "Facenet: A unified embedding for face recognition and clustering," in Proceedings of the IEEE conference on computer vision and pattern recognition, 2015, pp. 815-823.
J. Deng, J. Guo, N. Xue, and S. Zafeiriou, "Arcface: Additive angular margin loss for deep face recognition," arXiv preprint arXiv:1801.07698, 2018.
NIST. (2016, 28/04/2019). The Color FERET Database Version 2. Available: http://www.nist.gov/itl/iad/ig/colorferet.cfm
DOI: http://dx.doi.org/10.18517/ijaseit.9.3.8950
Refbacks
- There are currently no refbacks.
Published by INSIGHT - Indonesian Society for Knowledge and Human Development