Generating and Validating DSA Private Keys from Online Face Images for Digital Signatures

Asraa Safaa Ahmed, Firas A. Abdullatif, Taha Mohammad Hasan


Signing digital documents is attracting more attention in recent years, according to the rapidly growing number of digital documents being exchanged online. The digital signature proves the authenticity of the document and the sender’s approval on the contents of the document. However, storing the private keys of users for digital signing imposes threats toward gaining unauthorized access, which can result in producing false signatures. Thus, in this paper, a novel approach is proposed to extract the private component of the key used to produce the digital signature from online face image. Hence, this private component is never stored in any database, so that, false signatures cannot be produced and the sender’s approval cannot be denied. The proposed method uses a convolutional neural network that is trained using a semi-supervised approach, so that, the values used for the training are extracted based on the predictions of the neural network. To avoid the need for training a complex neural network, the proposed neural network makes use of existing pretrained neural networks, that already have the knowledge about the distinctive features in the faces. The use of the MTCNN for face detection and Facenet for face recognition, in addition to the proposed neural network, to achieved the best performance. The performance of the proposed method is evaluated using the Colored FERET Faces Database Version 2 and has achieved robustness rate of 13.48% and uniqueness of 100%.


digital signature algorithm; face biometrics; artificial neural networks; semi-supervised learning.

Full Text:



J. Rothenberg, "Ensuring the longevity of digital documents," Scientific American, vol. 272, pp. 42-47, 1995.

A. M. French and J. P. Shim, "The Digital Revolution: Internet of Things, 5G, and Beyond," CAIS, vol. 38, p. 40, 2016.

P. Singh, B. Raman, and P. P. Roy, "Detection of seal and signature entities with hierarchical recovery based on watermark self embedding in tampered digital documents," Displays, vol. 54, pp. 47-59, 2018.

S. Saxena and D. Anand, "A Novel Digital Signature Algorithm based on Biometric Hash," International Journal of Computer Network and Information Security, vol. 9, p. 12, 2017.

H. E. Michail, G. S. Athanasiou, G. Theodoridis, A. Gregoriades, and C. E. Goutis, "Design and implementation of totally-self checking SHA-1 and SHA-256 hash functions’ architectures," Microprocessors and Microsystems, vol. 45, pp. 227-240, 2016.

D. E. Denning, "Digital signatures with RSA and other public-key cryptosystems," Communications of the ACM, vol. 27, pp. 388-392, 1984.

Y. Isobe, Y. Seto, and M. Kataoka, "Development of personal authentication system using fingerprint with digital signature technologies," in Proceedings of the 34th Annual Hawaii International Conference on System Sciences, 2001, p. 9 pp.

E. Rahmawati, M. Listyasari, A. S. Aziz, S. Sukaridhoto, F. A. Damastuti, M. M. Bachtiar, et al., "Digital signature on file using biometric fingerprint with fingerprint sensor on smartphone," in 2017 International Electronics Symposium on Engineering Technology and Applications (IES-ETA), 2017, pp. 234-238.

M. Malik and T. Patel, "Database securityattacks and control methods," International Journal of Information, vol. 6, pp. 175-183, 2016.

R. M. Thiyab, M. A. Ali, and F. Basil, "The impact of SQL injection attacks on the security of databases," in Proceedings of the 6th International Conference of Computing & Informatics, 2017, pp. 323-331.

C. Kerry and P. Gallagher, "FIPS PUB 186-4: Digital Signature Standard (DSS)," Federal Information Processing Standards Publication. National Institute of Standards und Technology, 2013.

K. Kumar Raghuvanshi, P. Khurana, and P. Bindal, "Study and comparative analysis of different hash algorithm," Journal of Engineering Computers & Applied Sciences, vol. 3, pp. 1-3, 2014.

D. Eastlake 3rd and P. Jones, "US secure hash algorithm 1 (SHA1)," 2070-1721, 2001.

G. Gupta and S. Sharma, "Enhanced SHA-192 Algorithm with Larger Bit Difference," in 2013 International Conference on Communication Systems and Network Technologies, 2013, pp. 152-156.

T. Lakshmanan and M. Madheswaran, "Security and robustness enhancement of existing Hash algorithm," in 2009 International Conference on Signal Processing Systems, 2009, pp. 253-257.

R. Kaur and A. Kaur, "Digital signature," in 2012 International Conference on Computing Sciences, 2012, pp. 295-301.

T. Pornin, "Deterministic usage of the digital signature algorithm (DSA) and elliptic curve digital signature algorithm (ECDSA)," 2070-1721, 2013.

G. Locke and P. Gallagher, "Fips pub 186-3: Digital signature standard (dss)," Federal Information Processing Standards Publication, vol. 3, pp. 186-3, 2009.

K. Zhang, Z. Zhang, Z. Li, and Y. Qiao, "Joint face detection and alignment using multitask cascaded convolutional networks," IEEE Signal Processing Letters, vol. 23, pp. 1499-1503, 2016.

H. Jiang and E. Learned-Miller, "Face detection with the faster R-CNN," in 2017 12th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2017), 2017, pp. 650-657.

F. Schroff, D. Kalenichenko, and J. Philbin, "Facenet: A unified embedding for face recognition and clustering," in Proceedings of the IEEE conference on computer vision and pattern recognition, 2015, pp. 815-823.

J. Deng, J. Guo, N. Xue, and S. Zafeiriou, "Arcface: Additive angular margin loss for deep face recognition," arXiv preprint arXiv:1801.07698, 2018.

NIST. (2016, 28/04/2019). The Color FERET Database Version 2. Available:



  • There are currently no refbacks.

Published by INSIGHT - Indonesian Society for Knowledge and Human Development