Browse > Article
http://dx.doi.org/10.6109/jicce.2010.8.5.539

Fingerprint Image for the Randomness Algorithm  

Park, Jong-Min (Cyber Security, Chosun University College of Science & Technology)
Abstract
We present a random bit generator that uses fingerprint image for the source of random, and random bit generator using fingerprint image for the randomness has not been presented as yet. Fingerprint image is affected by the operational environments including sensing act, nonuniform contact and inconsistent contact, and these operational environments make FPI to be used for the source of random possible. Our generator produces, on the average, 9,334 bits a fingerprint image in 0.03 second. We have used the NIST SDB14 test suite consisting of sixteen statistical tests for testing the randomness of the bit sequence generated by our generator, and as the result, the bit sequence passes all sixteen statistical tests.
Keywords
fingerprint; image; random bit generator; algorithm;
Citations & Related Records
연도 인용수 순위
  • Reference
1 J. B. Lacy, D. P. Mitchell, and W. M. Schell, "Cryptolib: Cryptography in software," In USENIX Security Symposium IV Proceedings, USENIX Association, pp.1-17, 1993.
2 M. R. Verma., A.K. Maynrklay, and B coatterjcee, "Edge ceteoction in fingerprints." Pattern Recogmitiom.20.p513, 1987   DOI   ScienceOn
3 D. M. Weher "A cost effective fingerprint verification algorithm for commercial application." Proceedings of the south African Syraposuno on Commendation and Signal Processing, p.9, 1992.
4 D. Mario and D. Maltoni, "Direct Gray-Scale Minutie Detection In Fingerprints," IEEE Trans. Pattern Analysis and Machine Intelligence, Vol. 19, no.1, pp.27-40, 1997.   DOI   ScienceOn
5 A. Shacur, "Or the generation of cryptographically strong pseudorandom sequences" ACM Transactions on Computer Science, pp 38-44, 1983.
6 NIST special prosecution 800-12. A statistical test suite for random and pseudorandom number generators for cryptographic applications. 2000
7 L. Blum, M. Blum, and M. shub, "A simple unpredictable pseudo random generator," SIAM Journal on Computing, 15, pp.364-383, 1986.   DOI   ScienceOn
8 S. Micali and C. P. Schnorr, "Efficient perfect polynomial random number generators," Journal of Cryptology, 3, pp.157-172, 1991.
9 L. Hong, Y. Wan and A. K. Jain, "Fingerprint enhancement: algorithm and performance evaluation," IEEE Trans. Pattern Anal. Mach. Intell. 20, p777, 1998.   DOI   ScienceOn
10 FIPS 186, "Digital signature standard," Federal Information Processing Standards 186, U.S. Department of Commerce/NIST, National Technical Information Service, Springfield, 1994.
11 G.. B. Agnew, "Ransom sources for cryptographic systems, "Eurocrypt '87, Springer-Verlag, LNCS v.304, pp.77-81, 1988.
12 D. Davis, R. Ihaka, and P. Fenstermacher, "Cryptographic randomness from air turbulence in disk drives," Crypto '94, Springer-Verlag, LNCS v.839, pp.114-120, 1994.
13 RSA data Security, "Inc-RSA secure PC for windows 55 Users Manual." 1997
14 M. Jakobsson, E. Shriver, B. K. Hillyer, and A. Juels, "A practical secure Random bit generator," ACM Conference on Computer and Communications Security, pp.103-111, 1998.
15 J. Hastad, "Pseudo random number generators under uniform assumptions," In Proceeding of the Twenty Second Annual ACM Symposium on Theory of Computing, pp.395-404, 1990.
16 M. Luby, Pseudorandomness and Cryptographic Applications, Princeton University Press, New Jersey, 1996.