A Robust Online Signature Based Cryptosystem
Citations
49 citations
37 citations
Cites background from "A Robust Online Signature Based Cry..."
...A strong online signature based cryptosystem is proposed in [135]....
[...]
18 citations
16 citations
Cites background from "A Robust Online Signature Based Cry..."
...[21] analyzed the e-signatures by dividing the process into pieces in time-domain....
[...]
...The outcomes of this research could be implemented by the online features presented before, mostly the pressure data like in research [21] if there is a special device that can extract these features....
[...]
References
17,604 citations
"A Robust Online Signature Based Cry..." refers methods in this paper
...In back propagation algorithm [19] formulated by Rumelhart et al....
[...]
15,813 citations
13,579 citations
[...]
1,481 citations
901 citations
"A Robust Online Signature Based Cry..." refers methods in this paper
...A ROBUST ONLINE SIGNATURE BASED CRYPTOSYSTEM Ashok K. Bhateja Scientific Analysis Group Defence R & D Organization, Delhi, India Santanu Chaudhury Department of Electrical Engineering Indian Institute of Technology, Delhi, India P. K. Saxena Scientific Analysis Group Defence R & D Organization, Delhi, India 2 September 2014 1 ICFHR 2014 Outline 2 September 2014 ICFHR 2014 2 Introduction The Problem Statement Fuzzy vault Proposed Scheme Feature Extraction AdaBoost Algorithm Weighted Back Propagation Algorithm Encoding & Decoding in the proposed cryptosystem Experimental Results Conclusion References Introduction 2 September 2014 ICFHR 2014 3 Cryptography: Protect information by ensuring Confidentiality Integrity and Authenticity Cryptosystem: Binds plaintext x and key k using a mathematical function f Ciphertext y = f (x, k) Extraction of x or k is computationally hard Management and maintenance of the keys is one of the major problems in a cryptosystem Cryptographic keys stored in highly secure location with Password Personal Identification Number (PIN) Introduction 2 September 2014 ICFHR 2014 4 Signatures are used Financial transactions Documents Verification Dynamic features: velocity, slope along with static (shape) features....
[...]
...Cryptographic techniques are being increasingly used to protect information by ensuring Confidentiality, Integrity and Authenticity [2]....
[...]