期刊文献+

一个基于指纹和智能卡的密钥封装方案 被引量:2

A Key Encapsulation Scheme based on Fingerprint and Smartcard
原文传递
导出
摘要 文中提出一种利用指纹生物特征进行密钥封装的方案。使用主成分分析方法对采集的指纹特征数据进行处理。采用Reed—Solomon编码和Hadamard编码的级联方案,随机选取一个密钥应用该级联方案进行编码,把编码后的结果与指纹生物特征生成的secure vault存储在智能卡上,并将随机密钥销毁。在验证阶段,利用相同的指纹特征将该随机密钥重构出来,以应用到其他方面。最后对方案的安全性进行分析。 This paper proposes a key encapsulation scheme with fingerprint biometric. The fingerprint data is processed by the principal component analysis method. The cascaded solution of Reed-Solomon codes and Hadamard codes is used to encode with a random key, then the encoded result and the fingerprint data are integrated to generate the secure vault, which is stored on a smart card, and then this random key is destroyed. During the validation phrase, the random key is reconstructed from the same fingerprint. Finally, the security of this scheme is analyzed.
出处 《信息安全与通信保密》 2009年第8期338-340,344,共4页 Information Security and Communications Privacy
基金 国家自然科学基金(60773175,60673077) 现代通信国家重点实验室基金(9140C1108020906).
关键词 指纹特征 密钥封装 主成分分析 fingerprint key encapsulation principal component analysis
  • 相关文献

参考文献14

  • 1金晓刚,杨原.指纹识别和KEY[J].信息安全与通信保密,2007,29(2):88-89. 被引量:4
  • 2刘福元,王玲.自动指纹识别算法研究[J].信息安全与通信保密,2007,29(2):70-72. 被引量:10
  • 3Juels A, Wattenberg M. A fuzzy commitment scheme[C]// In CCS ' 99: Proceedings of the 6th ACM conference on Computer and communications security. USA: ACM, 1999: 28-36.
  • 4Juels A, Sudan M. A fuzzy vault scheme[C]//Proceedings of IEEE International Symposium on Information Theory. Switzerland: IEEE, 2002:408-416.
  • 5Dodis Y, Reyzin L, Smith A. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data[C]// Proceedings. of guroerypt 2004 International Conference on the Theory and Applications of Cryptographic Techniques. Switzerland: Springer, 2004: 523-540.
  • 6Arakala A, Jeffers J, Horadam J. Fuzzy extractors for minutiae-based fingerprint authentication[C]//Advances in Biometrics. Seoul. Korea: Springer, 2007:760-769.
  • 7Chang Ee-Chine, LI Qiming. Hiding secret points amongst ehaff[C]//Advances in Cryptology - EUROCRYPT 2006. 25th Annual International Conference on the Theory and Applications of Cryptographie Techniques. St. Petersburg. Russia: Springer, 2006: 59-72.
  • 8gludag U, Jain A K. Securing fingerprint template: fuzzy vault with helper data[C]//Proceedings of the 2006 Conference on Computer Vision and Pattern Recognition Workshop. USA: IEEE, 2006:163-169.
  • 9Boyen X. Reusable cryptographic fuzzy extractors[C] // Proceedings of the llth ACM Conference on Computer and Communications Security. USA: ACM, 2004: 82-91.
  • 10Hao F, Anderson R, Dauaman J. Combining crypto with biometrics effectively[J]. IEEE Transactions on Computers, 2006, 55(09): 1081-1088.

二级参考文献7

  • 1[1]Lin Hong Wan,Yi-fei Jain,A.Fingerprint image enhancement:algorithm and performance evaluation.IEEE Transactions on Pattern Analysis and Machine Intelligence,1998,20(8):777~789.
  • 2[2]Jain A,Lin Hong,Bolle R.On-Line fingerprint verification.IEEE Transactions on Pattern Analysis and Machine Intelligence,1997,19,(4):302~313.
  • 3[3]Chang C H,Cheng F H,Hsu W H,et al.Fast algorithm for point pattern matching:invariant to translations,rotations and scale changes.Pattern Recognition,1997,30(2):311~316.
  • 4[4]Jiang,Xu-dong,Yau,Wei-Yun.Fingerprint minutiae matching based on the local and global structures.In:Sanfeliu,A.,Villanueva,J.J.,eds.Proceedings of the 15th International Conference on Pattern Recognition.Los Alamitos,CA:IEEE Computer Society Press,2000:1042~ 1045.
  • 5[5]A K Jain,S Prabhakar,L Hong,et al.Filterbank-Based Fingerprint Matching.IEEE Trans.Image Processing,2000,9(5):846~859.
  • 6[6]Ross A,Jain A,Reisman J.A Hybird Fingerprint Matcher.Proc.16th Int' 1 Conf.Pattern Recognition,2002,3(4):795~798.
  • 7[2]Personal verification through biometric methods.ISO/IEC 7816-11.

共引文献11

同被引文献10

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部