期刊文献+

生物特征安全概略构造:理论与实践

Construction of Biometric Secure Sketch:Theory and Practice
原文传递
导出
摘要 在指纹数据库上研究了生物特征向量的提取和量化问题,讨论了量化前后的性能变化,并分析了理论上安全概略一致拒绝率和不一致接收率的界。采用BCH纠错码实现了安全概略的构造,计算了不同纠错能力下安全概略一致拒绝率和不一致接收率,分析了实际实现算法与理论界限产生差距的原因,指出了现有安全概略构造在性能和安全方面存在的问题。 Based on fingerprint database,extraction and quantization of biometric vector is studied,the change of performance after quantization is discussed and theoretic bound of genuine rejection rate and imposter acceptance rate are given.Using BCH code,construction of secure sketch is made and under different error correction capability genuine rejection rate and imposter acceptance rate are calculated,the distance between theoretic bound and practical parameters is discussed,problems of capability and security of secure sketch are pointed out.
出处 《武汉理工大学学报》 CAS CSCD 北大核心 2011年第7期147-151,共5页 Journal of Wuhan University of Technology
基金 国家自然科学基金(60773175和60973134) 现代通信国家重点实验室基金(9140C1108020906) 广东省自然科学基金(9151064201000058) 华南农业大学创新基金(6100-k09156)
关键词 生物特征 密钥提取 安全概略 纠错码 错误率 biometric key extraction secure sketch error correcting code error rate
  • 相关文献

参考文献11

  • 1Juels A, Wattenherg M. Fuzzy Commitment Scheme[C]//Proceedings of the 1999 6th ACM Conference on Computer and Communications Security (ACM CCS). Singapore: ACM, 1999 :28-36.
  • 2Juels A, Sudan M. A Fuzzy Vault Scheme[J]. Designs Codes and Cryptography, 2006, 38(2) : 237-257.
  • 3Dodis Y, Reyzin I., Smith A. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data [C]// 23rd Annual Eurocrypt Conference. Switzerland: [s. n. ],2004:523-540.
  • 4Dodis Y, Ostrovsky R, Reyzin L, et al. How to Generate Strong Keys from Biometrics and Other Noisy Data [J]. Siam Journal on Computing, 2008, 38(1): 97-139.
  • 5Chang E C, Shen R, Teo F W. Finding the Original Point Set Hidden Among Chaff[C]//2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06. Taiwan.. Association for Computing Machinery, 2007:182-188.
  • 6Chang E C, Li Q. Hiding Secret Points Amidst Chaff[C]//24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2006. St Petersburg:[s. n. ],2006: 59-72.
  • 7Bringer J, Chabanne H , Kindarji B. The Best of Both Worlds: Applying Secure Sketches to Cancelable Biometries[J]. Science of Computer Programming, 2008, 74(1-2): 43-51.
  • 8Li O, Chang E C, Robust. Short and Sensitive Authentication "Fags Using Secure Sketch[C]//Multimedia and Security Workshop 2006, MM and Sec' 06. Switzerland: Association for Computing Machinery,2006:56-61.
  • 9Li Q M, Sutcu Y, Memon N. Secure Sketch for Biometric Templates[C]//12th International Conference on the Theory of Application of Cryptology and Information Security. Shanghai:[s. n. ], 2006:99-113.
  • 10Jain A K, Prabhakar S, Hong L, et al. Filterbank based Fingerprint Matching[J]. IEEE Transactions on Image Processing, 2000, 9(5): 846-859.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部