Implementation of Secure Hash Algorithm – 3 for Biometric Fingerprint Access Control Based on Arduino Mega 2560

Indrian Alfiansyah, Rini Wisnu Wardhani
{"title":"Implementation of Secure Hash Algorithm – 3 for Biometric Fingerprint Access Control Based on Arduino Mega 2560","authors":"Indrian Alfiansyah, Rini Wisnu Wardhani","doi":"10.1109/ICAITI.2018.8686734","DOIUrl":null,"url":null,"abstract":"Biometric recognition refers to the use of distinctive anatomical (e.g., fingerprints, face, iris) and behavioral (e.g., speech) characteristics, called biometric identifiers or traits or characteristics for automatically recognizing individuals. Fingerprint has advantages that we don't need to bring a card or remember a password and the most important thing is fingerprint could not be shared or transferred. Biometric fingerprint authentication has many advantages, but biometric fingerprint authentication has a weakness in fingerprint template that can be stolen and the attacker can reconstructs fingerprint template to fingerprint image. In this paper, we introduce an implementation of SHA-3 hash function for fingerprint template on biometric fingerprint authentication based Arduino Mega 2560. This paper describes about how to secures fingerprint template with SHA-3 from attacker that want to reconstructs fingerprint template to fingerprint image.","PeriodicalId":233598,"journal":{"name":"2018 International Conference on Applied Information Technology and Innovation (ICAITI)","volume":"10 3","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Applied Information Technology and Innovation (ICAITI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAITI.2018.8686734","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

Biometric recognition refers to the use of distinctive anatomical (e.g., fingerprints, face, iris) and behavioral (e.g., speech) characteristics, called biometric identifiers or traits or characteristics for automatically recognizing individuals. Fingerprint has advantages that we don't need to bring a card or remember a password and the most important thing is fingerprint could not be shared or transferred. Biometric fingerprint authentication has many advantages, but biometric fingerprint authentication has a weakness in fingerprint template that can be stolen and the attacker can reconstructs fingerprint template to fingerprint image. In this paper, we introduce an implementation of SHA-3 hash function for fingerprint template on biometric fingerprint authentication based Arduino Mega 2560. This paper describes about how to secures fingerprint template with SHA-3 from attacker that want to reconstructs fingerprint template to fingerprint image.
基于Arduino Mega 2560的生物指纹访问控制安全哈希算法- 3的实现
生物特征识别是指利用独特的解剖特征(如指纹、面部、虹膜)和行为特征(如言语),称为生物特征标识符或特征或特征来自动识别个体。指纹的优点是我们不需要带卡或记住密码,最重要的是指纹不能共享或转移。生物特征指纹认证有很多优点,但是生物特征指纹认证的缺点是指纹模板可以被窃取,攻击者可以将指纹模板重建为指纹图像。本文介绍了基于Arduino Mega 2560的指纹模板SHA-3哈希函数在生物指纹认证中的实现。本文介绍了如何利用SHA-3保护指纹模板,防止攻击者将指纹模板重构为指纹图像。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信