Generating and Validating DSA Private Keys from Online Face Images for Digital Signatures
How to cite (IJASEIT) :
J. Rothenberg, "Ensuring the longevity of digital documents," Scientific American, vol. 272, pp. 42-47, 1995.
A. M. French and J. P. Shim, "The Digital Revolution: Internet of Things, 5G, and Beyond," CAIS, vol. 38, p. 40, 2016.
P. Singh, B. Raman, and P. P. Roy, "Detection of seal and signature entities with hierarchical recovery based on watermark self embedding in tampered digital documents," Displays, vol. 54, pp. 47-59, 2018.
S. Saxena and D. Anand, "A Novel Digital Signature Algorithm based on Biometric Hash," International Journal of Computer Network and Information Security, vol. 9, p. 12, 2017.
H. E. Michail, G. S. Athanasiou, G. Theodoridis, A. Gregoriades, and C. E. Goutis, "Design and implementation of totally-self checking SHA-1 and SHA-256 hash functions’ architectures," Microprocessors and Microsystems, vol. 45, pp. 227-240, 2016.
D. E. Denning, "Digital signatures with RSA and other public-key cryptosystems," Communications of the ACM, vol. 27, pp. 388-392, 1984.
Y. Isobe, Y. Seto, and M. Kataoka, "Development of personal authentication system using fingerprint with digital signature technologies," in Proceedings of the 34th Annual Hawaii International Conference on System Sciences, 2001, p. 9 pp.
E. Rahmawati, M. Listyasari, A. S. Aziz, S. Sukaridhoto, F. A. Damastuti, M. M. Bachtiar, et al., "Digital signature on file using biometric fingerprint with fingerprint sensor on smartphone," in 2017 International Electronics Symposium on Engineering Technology and Applications (IES-ETA), 2017, pp. 234-238.
M. Malik and T. Patel, "Database securityattacks and control methods," International Journal of Information, vol. 6, pp. 175-183, 2016.
R. M. Thiyab, M. A. Ali, and F. Basil, "The impact of SQL injection attacks on the security of databases," in Proceedings of the 6th International Conference of Computing & Informatics, 2017, pp. 323-331.
C. Kerry and P. Gallagher, "FIPS PUB 186-4: Digital Signature Standard (DSS)," Federal Information Processing Standards Publication. National Institute of Standards und Technology, 2013.
K. Kumar Raghuvanshi, P. Khurana, and P. Bindal, "Study and comparative analysis of different hash algorithm," Journal of Engineering Computers & Applied Sciences, vol. 3, pp. 1-3, 2014.
D. Eastlake 3rd and P. Jones, "US secure hash algorithm 1 (SHA1)," 2070-1721, 2001.
G. Gupta and S. Sharma, "Enhanced SHA-192 Algorithm with Larger Bit Difference," in 2013 International Conference on Communication Systems and Network Technologies, 2013, pp. 152-156.
T. Lakshmanan and M. Madheswaran, "Security and robustness enhancement of existing Hash algorithm," in 2009 International Conference on Signal Processing Systems, 2009, pp. 253-257.
R. Kaur and A. Kaur, "Digital signature," in 2012 International Conference on Computing Sciences, 2012, pp. 295-301.
T. Pornin, "Deterministic usage of the digital signature algorithm (DSA) and elliptic curve digital signature algorithm (ECDSA)," 2070-1721, 2013.
G. Locke and P. Gallagher, "Fips pub 186-3: Digital signature standard (dss)," Federal Information Processing Standards Publication, vol. 3, pp. 186-3, 2009.
K. Zhang, Z. Zhang, Z. Li, and Y. Qiao, "Joint face detection and alignment using multitask cascaded convolutional networks," IEEE Signal Processing Letters, vol. 23, pp. 1499-1503, 2016.
H. Jiang and E. Learned-Miller, "Face detection with the faster R-CNN," in 2017 12th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2017), 2017, pp. 650-657.
F. Schroff, D. Kalenichenko, and J. Philbin, "Facenet: A unified embedding for face recognition and clustering," in Proceedings of the IEEE conference on computer vision and pattern recognition, 2015, pp. 815-823.
J. Deng, J. Guo, N. Xue, and S. Zafeiriou, "Arcface: Additive angular margin loss for deep face recognition," arXiv preprint arXiv:1801.07698, 2018.
NIST. (2016, 28/04/2019). The Color FERET Database Version 2. Available: http://www.nist.gov/itl/iad/ig/colorferet.cfm
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).