期刊文献+

基于比特流的虹膜特征数据的隐藏算法 被引量:1

Bit-stream Based Iris Features Data Hidden Method
下载PDF
导出
摘要 对生物特征数据的攻击是生物特征识别自身安全的主要威胁。为了提高虹膜特征数据的安全性,根据现有主要的虹膜识别方法中特征模板的数据特性和基于汉明距的比对方法,提出一种基于比特流的将虹膜特征模板数据嵌入人脸图像的数据隐藏算法。实验结果表明,该算法具有较强的隐蔽性,隐藏算法本身误码率为零,计算效率高,不会影响虹膜识别技术本身的性能,能够有效保护特征模板数据,增强虹膜识别系统自身的安全性。 Attacks pointing to biometric data are the basic menace of biometrics self-security. For improving the security of iris features data, this paper proposes a bit stream based data hidden approach by embedding iris features data into a face image which is applicable to the dominant method of present iris recognition technologies. While having the high computation efficiency and the zero-decoding-errorrate, the method embedding a key biometric feature into another biometric feature for transmission in a biometrics security net can deceive attackers better, and also is not repressive to the excellent performance of the iris recognition. Experiments show that the data hidden approach can effectively protect iris features data and enhance the iris recognition system self-security.
作者 叶学义
出处 《计算机工程》 CAS CSCD 北大核心 2008年第5期182-184,187,共4页 Computer Engineering
关键词 虹膜识别 比特流 数据隐藏 iris recognition bit stream data hidden
  • 相关文献

参考文献14

  • 1Higgins P T. An Introduction of Biometrics[C]//Proceedings of Biometrics Consortium Conference. Arlington, VA, USA: [s. n.], 2005.
  • 2Schneier B, The Uses and Abuses of Biometrics[J]. Comm. ACM, 1999, 42(8): 136.
  • 3Edler A. Can Sample Images Be Regenerated form Biometric Templates[C]//Proceedings of Biometrics Consortium Conference. Arlington, VA, USA: [s. n.], 2003.
  • 4Jain A K, Uludag U. Hiding Biometric Data[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2003, 25(11).
  • 5Huartung F, Kutter M. Multimedia Watermarking Techniques[J]. Proc. of the IEEE, 1999, 87(7): 1079-1107.
  • 6Jain S. Digital Watermarking Techniques: A Case Study in Fingerprints & Faces[C]//Proc. of Computer Vision, Graphics and Image Processing Conf. Bangalore, India: [s. n.], 2000: 139-144.
  • 7Ratha N K, Connell J H, BoUe R M. Secure Data Hiding in Wavelet Compressed Fingerprint Bangalore, India[C]//Proc. of ACM Multimedia. New York, USA: [s. n.], 2000: 127-130.
  • 8Pankati S, Yeung M M. Verification Watermarks on Fingerprint Recognition and Retrieval[C]//Proc. of SPIE. San Jose, USA: [s. n.], 1999, 3657: 66-78.
  • 9Gunsel B, Uludag U, Teklap A M. Robust Watermarking of Fingerprint Images[J]. Pattern Recognition, 2002, 35(12): 2739- 2747.
  • 10Bender W, Gruhl D, Morimoto N, et al. Techniques for Data Hiding[J]. IBM Systems Journal, 1996, 35(3/4): 313-336.

同被引文献10

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部