Browse > Article
http://dx.doi.org/10.3745/KIPSTD.2003.10D.3.541

Practically Secure and Efficient Random Bit Generator Using Digital Fingerprint Image for The Source of Random  

Park, Seung-Bae (초당대학교 컴퓨터과학과)
Joo, Nak-Keun (동신대학교 인터넷정보학과)
Kang, Moon-Seol (강주대학교 컴퓨터전자통신공학부)
Abstract
We present a random bit generator that uses fingerprint image as the source of random, and the random bit generator is the first generator in the world that uses biometric information for the source of random in the world. The generator produces, on the average, 9,334 bits a fingerprint image in 0.03 second, and the produced bit sequence passes all 16 statistical tests that are recommended by NIST for testing the randomness.
Keywords
Random Bit Generator; Source of Random; Fingerprint Image; Binarization; Statistical Random Test;
Citations & Related Records
연도 인용수 순위
  • Reference
1 G. B. Agnew, 'Ransom sources for cryptographic systems,' Eurocrypt'87, Springer-Verlag, LNCS Vol.304, pp.77-81, 1988
2 D. Davis, R. Ihaka and P. Fenstermacher, 'Cryptographic randomness from air turbulence in disk drives,' Crypto'94, Springer-Verlag, LNCS Vol.839, pp.114-120, 1994
3 FIPS 186, 'Digital signature standard,' Federal Information Processing Standards 186, U.S. Department of Commerce/NIST, National Technical Information Service, Springfield, 1994
4 J. Hastad, 'Pseudo random number generators under uniform assumptions,' In Proceedings of the Twenty Second Annual ACM Symposium on Theory of Computing, pp.395-404, 1990   DOI
5 J. B. Lacy, D. P. Mitchell and W. M. Schell, 'Cryptolib : Cryptography in software,' In USENIX Security Symposium IV Proceedings, USENIX Association, pp.1-17, 1993
6 M. Luby, Pseudorandomness and Cryptographic Applications, Princeton University Press, New Jersey, 1996
7 D. Mario and D. Maltoni, 'Direct Gray-Scale Minutiae Detection In Fingerprints,' IEEE Trans. Pattern Analysis and Machine Intelligence, Vol.19, No.1, pp.27-40, 1997   DOI   ScienceOn
8 L. Blum, M. Blum and M. Shub, 'A simple unpredictable pseudo random generator,' SIAM Journal on Computing, 15, pp.364-383, 1986   DOI   ScienceOn
9 RSA Data Security, Inc., 'RSA Secure PC for Windows95 Users Manual,' 1997
10 A. Shamir, 'On the generation of cryptographically strong pseudorandom sequences,' ACM Transactions on Computer Science, pp.38-44, 1983   DOI
11 M. Jakobsson, E. Shriver, B. K. Hillyer and A. Juels, 'A practical secure Random bit generator,' ACM Conference on Computer and Communications Security, pp.103-111, 1998   DOI
12 L. Hong, Y. Wan and A. K. Jain, 'Fingerprint enhancement : algorithm and performance evaluation,' IEEE Trans. Pattern Anal. Mach. Intell., 20, p.777, 1998   DOI   ScienceOn
13 NIST Special Publication 800-12, A statistical test suite for random and pseudorandom number generators for cryptographic applications, 2000
14 S. Micali and C. P. Schnorr, 'Efficient perfect polynomial random number generators,' Journal of Cryptology, 3, pp.157-172, 1991   DOI
15 M. R. Verma, A. K. Majumdar and B. Chatterjeee, 'Edge detection in fingerprints,' Pattern Recognition 20, p.513, 1987   DOI   ScienceOn
16 D. M. Weber, 'A cost effective fingerprint verification algorithm for commercial application,' Proceedings of the South African Symposium on Communication and Signal Processing, p.9, 1992   DOI