期刊文献+

一种基于模糊提取的虹膜鉴别方案 被引量:7

An Iris Authentication Scheme Based on Fuzzy Extractor
下载PDF
导出
摘要 模糊提取从生物特征输入中以容错的方式可靠地提取出均匀分布的随机密钥,当输入发生变化且变化很小时,该密钥可以保持不变.研究了当汉明距离作为生物特征匹配的度量标准时,结合纠错编码学与传统密码学实现模糊提取的虹膜鉴别方法,分析了虹膜特征编码之间的差异对正确鉴别性能的影响,设计了重复码和Reed-Solomon码的两层级联纠错编码方案,并对128只虹膜的各3个样本进行了模拟实验.所给方案使用户虹膜特征模板的安全性和隐私性得到了有效保护,并能够支持用户虹膜的注册更新.此外,实验表明该方案同时具有较理想的识别性能. Abstract Fuzzy extractors allow one to extract some uniformly distributed random key in an error tolerant way from a biometric input w and then successfully reproduce the key from any other biometric input w that is close to w. In this paper, a fuzzy extractor based iris authentication scheme is provided, which combines error correcting codes and cryptography, when Hamming distance is adopted as the biometric matching metric. The impacts of iris in tra-class differences upon false rejection rate are analyzed and a two-layer coding scheme in which iterative codes and Reed-Solomon codes are applied is presented. In place of introducing mask filters to reduce iris code bit error rates, error correction capability is enhanced to strive for more iris valid entropy, when quality of iris image is not very good because of disturbance of eyelashes, eyelids, etc. The scheme is evaluated using 4096-bit iris codes from 128 different eyes, with 3 samples from each eye. Simulation experiments show that the false rejection rate is less than one percent. Additionally, both security and privacy of user's biometric template can be well protected, and user registration update can also be supported. The proposed scheme is especially applicable to iris authentication system with privacy requirements.
出处 《计算机研究与发展》 EI CSCD 北大核心 2008年第6期1036-1042,共7页 Journal of Computer Research and Development
基金 国家自然科学基金项目(60673083,60503014) 北京市自然科学基金项目(4072026)~~
关键词 模糊提取 纠错码 虹膜鉴别 隐私性 错误拒绝率 fuzzy extractor error correcting code iris authentication privacy false rejection rate
  • 相关文献

参考文献15

  • 1王蕴红,朱勇,谭铁牛.基于虹膜识别的身份鉴别[J].自动化学报,2002,28(1):1-10. 被引量:259
  • 2Ari Juels, Martin Wattenberg. A fuzzy commitment scheme [C]. In:Proc of the 6th ACM Conf on Computer and Communications Security (CCS 1999 ). New York: ACM Press, 1999. 28-86.
  • 3Ari Juels, Madhu Sudan. A fuzzy vault scheme [C]. In: Proc of the 2002 Int'l Syrup on Information Theory (ISIT 2002). Piscataway, NJ: IEEEPress, 2002. 408-426.
  • 4Umut UIudag, Sharath Pankanti, AniI K Jain. Fuzzy vauIt for fingerprints [C]. In:Proc of Audio- and Video Based Biometric Person Authentication ( AVBPA 2005 ), LNCS 3546. Berlin: Springer Verlag, 2005. 310-319.
  • 5Yevgeniy Dodis, Leonid Reyzin, Adam Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data [C]. In: Proc of Eurocrypt 2004, LNCS 3027. Berlin: Springer-Verlag, 2004. 523-540.
  • 6Xavier Boyen. ReusabIe cryptographic fuzzy extractors[C]: In.. Proc of ACM Conf on Computer and Communications Security CCS 2004. New York: ACM Press, 2004. 82-91.
  • 7T Charles Clancy, Negar Kiyavash, Dennis J Lin. Secure smartcardbased fingerprint authentication [C]. In: Proc of the 2003 ACM SIGMM Workshop on Biometrics Methods and Application (WBMA 2003). New York: ACM Press,2003. 45-52.
  • 8F Monrose, M K Reiter, Q Li, et al. Cryptographic key generation from voice [C]. The 2001 IEEE Syrup on Security and Privacy, Oakland, CA, 2001.
  • 9Alwyn Goh, David Ngo Chek Ling. Computation of cryptographic keys from face biometrics [C]. In: Proc of Int'l Federation for Information Processing 2003, LNCS 2828. Berlin: Springer-Verlag, 2003. 1-13.
  • 10Feng Hao, Ross Anderson, John Daugman. Combining crypto with biometrics effectively [J]. IEEE Trans on Computers, 2006, 55(9):1081-1088.

共引文献258

同被引文献93

引证文献7

二级引证文献74

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部