Generating and Validating DSA Private Keys from Online Face Images for Digital Signatures

Asraa Safaa Ahmed (1), Firas A. Abdullatif (2), Taha Mohammad Hasan (3)
(1) Department of Computer Sciences, Diyala University, Baghdad, 10062, Iraq
(2) Department of Computer Sciences, Baghdad University, Baghdad , 10053, Iraq
(3) Head of Computer Science Department / College of Science / University of Diyala
Fulltext View | Download
How to cite (IJASEIT) :
Ahmed, Asraa Safaa, et al. “Generating and Validating DSA Private Keys from Online Face Images for Digital Signatures”. International Journal on Advanced Science, Engineering and Information Technology, vol. 9, no. 3, June 2019, pp. 993-8, doi:10.18517/ijaseit.9.3.8950.
Signing digital documents is attracting more attention in recent years, according to the rapidly growing number of digital documents being exchanged online. The digital signature proves the authenticity of the document and the sender’s approval on the contents of the document. However, storing the private keys of users for digital signing imposes threats toward gaining unauthorized access, which can result in producing false signatures. Thus, in this paper, a novel approach is proposed to extract the private component of the key used to produce the digital signature from online face image. Hence, this private component is never stored in any database, so that, false signatures cannot be produced and the sender’s approval cannot be denied. The proposed method uses a convolutional neural network that is trained using a semi-supervised approach, so that, the values used for the training are extracted based on the predictions of the neural network. To avoid the need for training a complex neural network, the proposed neural network makes use of existing pretrained neural networks, that already have the knowledge about the distinctive features in the faces. The use of the MTCNN for face detection and Facenet for face recognition, in addition to the proposed neural network, to achieved the best performance. The performance of the proposed method is evaluated using the Colored FERET Faces Database Version 2 and has achieved robustness rate of 13.48% and uniqueness of 100%.

J. Rothenberg, "Ensuring the longevity of digital documents," Scientific American, vol. 272, pp. 42-47, 1995.

A. M. French and J. P. Shim, "The Digital Revolution: Internet of Things, 5G, and Beyond," CAIS, vol. 38, p. 40, 2016.

P. Singh, B. Raman, and P. P. Roy, "Detection of seal and signature entities with hierarchical recovery based on watermark self embedding in tampered digital documents," Displays, vol. 54, pp. 47-59, 2018.

S. Saxena and D. Anand, "A Novel Digital Signature Algorithm based on Biometric Hash," International Journal of Computer Network and Information Security, vol. 9, p. 12, 2017.

H. E. Michail, G. S. Athanasiou, G. Theodoridis, A. Gregoriades, and C. E. Goutis, "Design and implementation of totally-self checking SHA-1 and SHA-256 hash functions’ architectures," Microprocessors and Microsystems, vol. 45, pp. 227-240, 2016.

D. E. Denning, "Digital signatures with RSA and other public-key cryptosystems," Communications of the ACM, vol. 27, pp. 388-392, 1984.

Y. Isobe, Y. Seto, and M. Kataoka, "Development of personal authentication system using fingerprint with digital signature technologies," in Proceedings of the 34th Annual Hawaii International Conference on System Sciences, 2001, p. 9 pp.

E. Rahmawati, M. Listyasari, A. S. Aziz, S. Sukaridhoto, F. A. Damastuti, M. M. Bachtiar, et al., "Digital signature on file using biometric fingerprint with fingerprint sensor on smartphone," in 2017 International Electronics Symposium on Engineering Technology and Applications (IES-ETA), 2017, pp. 234-238.

M. Malik and T. Patel, "Database securityattacks and control methods," International Journal of Information, vol. 6, pp. 175-183, 2016.

R. M. Thiyab, M. A. Ali, and F. Basil, "The impact of SQL injection attacks on the security of databases," in Proceedings of the 6th International Conference of Computing & Informatics, 2017, pp. 323-331.

C. Kerry and P. Gallagher, "FIPS PUB 186-4: Digital Signature Standard (DSS)," Federal Information Processing Standards Publication. National Institute of Standards und Technology, 2013.

K. Kumar Raghuvanshi, P. Khurana, and P. Bindal, "Study and comparative analysis of different hash algorithm," Journal of Engineering Computers & Applied Sciences, vol. 3, pp. 1-3, 2014.

D. Eastlake 3rd and P. Jones, "US secure hash algorithm 1 (SHA1)," 2070-1721, 2001.

G. Gupta and S. Sharma, "Enhanced SHA-192 Algorithm with Larger Bit Difference," in 2013 International Conference on Communication Systems and Network Technologies, 2013, pp. 152-156.

T. Lakshmanan and M. Madheswaran, "Security and robustness enhancement of existing Hash algorithm," in 2009 International Conference on Signal Processing Systems, 2009, pp. 253-257.

R. Kaur and A. Kaur, "Digital signature," in 2012 International Conference on Computing Sciences, 2012, pp. 295-301.

T. Pornin, "Deterministic usage of the digital signature algorithm (DSA) and elliptic curve digital signature algorithm (ECDSA)," 2070-1721, 2013.

G. Locke and P. Gallagher, "Fips pub 186-3: Digital signature standard (dss)," Federal Information Processing Standards Publication, vol. 3, pp. 186-3, 2009.

K. Zhang, Z. Zhang, Z. Li, and Y. Qiao, "Joint face detection and alignment using multitask cascaded convolutional networks," IEEE Signal Processing Letters, vol. 23, pp. 1499-1503, 2016.

H. Jiang and E. Learned-Miller, "Face detection with the faster R-CNN," in 2017 12th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2017), 2017, pp. 650-657.

F. Schroff, D. Kalenichenko, and J. Philbin, "Facenet: A unified embedding for face recognition and clustering," in Proceedings of the IEEE conference on computer vision and pattern recognition, 2015, pp. 815-823.

J. Deng, J. Guo, N. Xue, and S. Zafeiriou, "Arcface: Additive angular margin loss for deep face recognition," arXiv preprint arXiv:1801.07698, 2018.

NIST. (2016, 28/04/2019). The Color FERET Database Version 2. Available: http://www.nist.gov/itl/iad/ig/colorferet.cfm

Authors who publish with this journal agree to the following terms:

    1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
    2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
    3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).