Computer Science & Electrical

Computer Science & Electrical

Biometric based digital signature scheme for land registry verification

Pages: 6  ,  Volume: 11  ,  Issue: 1 , August   2018
Received: 08 Sep 2018  ,  Published: 08 September 2018
Views: 11  ,  Download: 5


# Author Name
1 R.Sinthujan
2 S.Senthilkumaran
3 N.Pranavan
4 V.Vijitharan
5 Kavinga Yapa Abeywardena


One of the most common and frequent problem faced by developing countries like Sri Lanka is the management and administration of land properties due to poor land ownership verification mechanisms exercised by government in the sector of land registry department. This leads to cases like land fraudulent, land encroachment, land misuse and land disuse. This research paper states of a biometric based verification scheme for land property management which guarantees the authenticity of land ownership, integrity of land information, and non-repudiation of land transactions. The goal is to generate biometric based asymmetric keys from a personnel’s fingerprint to be used for digitally signing the land registry document and then to verify that signature in a secure way where some of the key procedures must take place within an isolated area like sandbox environment to ensure the security and robustness of the system. Also, there are procedures in place for handling disputes that can be confronted when implementing a land management system with biometric verification procedures. This biometric based verification scheme is not limited only within the boundaries of the land registry domain, but can also be extended and applied as a generic solution for many other similar domains where the verification procedure is vital and a must.


  • biometric keys
  • RSA Algorithm
  • Digital Signature
  • Land Registry
  • References

    [1] J. Jayakody, "An analysis of land ownership rights in document registration: A pragmatic Sri Lankan perspective",, 2018. [Online]. Available: [Accessed: 01- Apr- 2018].

    [2] Kirubananthan, "Evaluating Land Governance Issues in Land Titling Programme (A Case Study in Sri Lanka)",, 2018. [Online]. Available: [Accessed: 01- Apr- 2018].

    [3] T. Perera, "Implementing Land Registration Systems in Sri Lanka: Being Pragmatic", 2018. [Online]. Available: [Accessed: 01- Apr- 2018].

    [4] H. Buddhisena, "Registration of Titles to Land - An new approach ",, 2018. [Online]. Available: [Accessed: 01- Apr- 2018].

    [5] P. Craig, "What is a sandbox? And why do I need one to defend against advanced threats?", Sophos News, 2018. [Online]. Available: [Accessed: 01- Apr- 2018].

    [6] "Sandboxes Explained: How They’re Already Protecting You and How to Sandbox Any Program",, 2018. [Online]. Available: [Accessed: 01- Apr- 2018].

    [7] "What is a Sandbox (in Computer Security)? - Definition from Techopedia",, 2018. [Online]. Available: [Accessed: 01- Apr- 2018].

     [8] M. T. Rashid and H. A. Zaki, “RSA Cryptographic Key Generation Using Fingerprint Minutiae,” Iraqi Comm. Comput. Informatics ,Iraqi J. Comput. Informatics, vol. 1, no. 1, pp. 66–69, 2014.

     [9] V. Conti, S. Vitabile, and F. Sorbello, “Fingerprint traits and RSA algorithm fusion technique,” Proc. - 2012 6th Int. Conf. Complex, Intelligent, Softw. Intensive Syst. CISIS 2012, pp. 351–356, 2012.

    [10] D. Mann, S. Gupta, A. Sharma, and S. Akhtar, “Digital Signature using Biometrics,” vol. I, no. 2, pp. 6–7, 2015.

    [11] R. Ranjan and S. K. Singh, “Improved and innovative key generation algorithms for biometric cryptosystems,” Proc. 2013 3rd IEEE Int. Adv. Comput. Conf. IACC 2013, no. i, pp. 943–946, 2013.

    [12] P. Balakumar and R. Venkatesan, “Secure Biometric Key Generation Scheme for Cryptography using Combined Biometric Features of Fingerprint and Iris,” IJCSI Int. J. Comput. Sci. Issues, vol. 8, no. 5, pp. 349–356, 2011.

    [13] "Minutiae Based Extraction in Fingerprint Recognition", Bayometric, 2018. [Online]. Available: [Accessed: 01- Apr- 2018].

    [14] L. You, G. Zhang, and F. Zhang, “A fingerprint and threshold scheme-based key generation method,” Proceeding - 5th Int. Conf. Comput. Sci. Converg. Inf. Technol. ICCIT 2010, pp. 615–619, 2010.

    [15] Make Tech Easier. (2018). 6 of the Best Sandbox Applications for Windows 10 - Make Tech Easier. [online] Available at: [Accessed 15 May 2018].

    [16] (2018). About App Sandbox. [online] Available at: [Accessed 15 May 2018].

    [17] Risto Vaarandi. Platform Independent Event Correlation Tool for Network Management. Proceedings of the 8th IEEE/IFIP Network Operations and Management Symposium, pp. 907-910, [2002].

    [18] NIST, “National institute of standards and technology [docket no: 070911510-7512-01]announcing request for candidate algorithm nominations for a new cryptographic hash algorithm (SHA-3) family,” Federal Register, November 2007.

    [19] J. P. Aumasson, L. Henzen, W. Meier, and R. C. W. Phan, „SHA-3 proposal BLAKEversion 1.3,” NIST SHA-3 Competition.

    [20] P. Gauravaram, L. R. Knudsen, K. Matusiewicz, F. Mendel, C. Rechberger, M. Schlffer,and S. S. Thomsen, “SHA-3 proposal grostel version 2.0.1,” NIST SHA-3 Competition.

    [21] Professor N. Selvakkumaran, University of Colombo, Tiernan Mennen, Abt Associates, “Land disputes and development in Sri Lanka implications of the vestiges of crown land”, February 24, 2017.

    [22] Zakout, W, Wehrmann, B, Torhonen, “Good Governance in Land Administration. Principles and Good Practices”, 2007.

    [23] Alden Wily, Liz, “Whose Land Is It? Commons and Conflict States. Why the Ownership of the Commons Matters in Making and Keeping Peace”, 2008.

    [24] Gershin Feder, “The Benefits of Land registration and titling economic and social perspectives, Land Use Policy”, 1999.