Archives and Documentation Center
Digital Archives

Design and construction of a secure ID-card system using robust image hashing

Show simple item record

dc.contributor Graduate Program in Electrical and Electronic Engineering.
dc.contributor.advisor Mıhçak, Mehmet Kıvanç.
dc.contributor.author Öztemel, Mehmet.
dc.date.accessioned 2023-03-16T10:17:21Z
dc.date.available 2023-03-16T10:17:21Z
dc.date.issued 2009.
dc.identifier.other EE 2009 O88
dc.identifier.uri http://digitalarchive.boun.edu.tr/handle/123456789/12748
dc.description.abstract We present a very simple, cryptographically secure, inexpensive and contactless biometric identity veri cation system. The system we propose is a printout of individual's biometric feature (pictorial data) such as face, hand, iris and a textual message. Furthermore, an HF RFID tag that involves RSA signature, compressed representations of the textual and pictorial data printed on a PVC card provides contactless communication. Digital signature is created using the private key of the signer. Veri cation is performed by an intelligent device involving a USB Camera and a RFID Reader. There are mainly two processes: certi cation and authentication. ID is certi ed in the following way. First, the textual data is hashed using a cryptographically secure hashing algorithm such as MD5. Next, the pictorial data is hashed using robust hashing algorithms. Finally, hashed pictorial data, text and RSA signature of formers' are encoded into the RFID tag in ID card. Veri cation is performed by a simple and o - line device that contains the public key of the issuer. The signature, hashed textual and pictorial data are received from RFID tag via RFID reader, authenticity of the signature is checked. On the other side, a snapshot of the ID card is taken via USB camera. The image taken is then recti ed to obtain textual and facial data. The textual data on the card is converted into a text-string using reliable optical character recognition. Robust image hashing methods are applied to the facial data. A comparison score is obtained comparing the resulting hash values with the hash values obtained from RFID tag. The identity document is authentic if the score is above the threshold.
dc.format.extent 30cm.
dc.publisher Thesis (M.S.)-Bogazici University. Institute for Graduate Studies in Science and Engineering, 2009.
dc.subject.lcsh Radio frequency identification systems.
dc.subject.lcsh Identification cards.
dc.subject.lcsh Hashing (Computer science)
dc.title Design and construction of a secure ID-card system using robust image hashing
dc.format.pages xii, 47 leaves;


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search Digital Archive


Browse

My Account