期刊文献+

基于模糊循环随机映射的人脸生物特征加密算法

Face-hashing Algorithm Based on Fuzzy Cyclic Random Mapping
下载PDF
导出
摘要 随着生物特征识别技术的广泛应用,其安全性方面的缺陷也逐渐暴露出来。密码技术与生物特征识别技术相结合的生物特征加密技术,就是为了弥补生物特征识别在安全方面的不足而产生的。在研究已有人脸生物特征识别技术的基础上,提出一种兼具安全性及容错能力的人脸生物特征加密算法:模糊循环随机映射(Fuzzy Cyclic Random Mapping,FCRM)。在每次循环中,加密模型使用前一次循环的密钥作为随机种子生成映射矩阵,对用户的人脸特征进行映射,形成一个循环的随机映射过程。加密过程中,还使用了容错技术来减少合法用户人脸图像和特征的随机噪声对识别率的影响,而循环的映射过程能够在不减少认证准确率的前提下,阻止非法用户通过认证。 With the broad application of various biometric technologies,their deficiencies on safety are gradually exposed.The biometric encryption technology,as the combination of biometric recognition and cryptography technology,was proposed to ensure the safe usage of biometrics.Based on our previous researches on face biometrics,we proposed a face-hashing algorithm,i.e.Fuzzy Cyclic Random Mapping(FCRM),which considers both the security and the fault tolerance.In each cycle,the encryption model utilizes the key of the previous cycle as a random seed to generate a mapping matrix and makes random mapping of the face features.Thus the proposed algorithm forms a cyclic random mapping process.We also adopted the fault-tolerant technology in the proposed algorithm to reduce the impact of random noise existing in the face images of the genuine users,while the cyclic mapping process can simultaneously prevent the imposter to authenticate the system without reducing the accuracy.
出处 《计算机科学》 CSCD 北大核心 2012年第5期249-253,共5页 Computer Science
基金 国家自然科学基金(60605012) 上海市自然科学基金(08ZR1408200) 上海市重点学科建设项目(J50103) 模式识别国家重点实验室开放课题资助
关键词 人脸识别 生物特征加密 生物特征哈希 Face recognition Biometric encryption Biometric hashing
  • 相关文献

参考文献11

  • 1Juels A, Wattenberg M. A Fuzzy Commitment Scheme[C]//Proceedings of the 6th ACM Conference on Computer and Communications Security. ACM Press, 1999 : 28-36.
  • 2付波,李建平.人脸特征密钥的容错生成算法[J].计算机应用研究,2008,25(1):260-262. 被引量:3
  • 3Zhao Z,Paul W. A face hashing algorithm using mutual information and feature fusion[C]//Proceedings of the 2007 IEEE International Conference on Networking, Sensing and Control. UK (London) : IEEE, 2007 : 386-391.
  • 4Zhao Z, Paul W. A Novel Face Hashing Method with Feature Fusion for Biometrie Cryptosystems [C]// Proceedings of the Fourth European Conference on Universal Multiservice Networks. France(Toulouse): IEEE, 2007 : 439-444.
  • 5张祥德,唐青松,陆小军,朱和贵.基于神经网络和人脸特征的密钥管理方法[J].东北大学学报(自然科学版),2009,30(6):817-820. 被引量:1
  • 6Juels A, Sudan M. A Fuzzy Vault Scheme [J]. Designs, Codes and Cryptography, 2006,38(6) : 237-257.
  • 7Teoh J, Goh A, Ngo L. Random Multispace Quantization As an Analytic Mechanism for Biohashing of Biometric and Random Identity Inputs [J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2006,28(12) : 1892-1901.
  • 8Ojala T, Pietikainen M, Maenpaa T. Multiresolution Gray-scale and Rotation Invariant Texture Classification with Local Binary Patterns [J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2002,24(7) : 971-987.
  • 9Kong B, Cheung K, Zhang D, et al. An Analysis of Biohashing and Its Variants [J]. Pattern Recognition, 2006,39 (7):1359- 1368.
  • 10冯全,苏菲,蔡安妮.生物加密综述[J].计算机工程,2008,34(10):141-143. 被引量:10

二级参考文献64

  • 1Uludag U, Pankanti S, Prabhakar S, et al. Biometrics cryptosysterrks: issues and challenges[J ]. Proceedings of the IEEE, 2004,92(6) : 948 - 960.
  • 2Soutar C, Roberge D, Stoianov A, et al. Biometrics encryption. ICSA Guide to Cryptography [ EB/OL ]. (2006 -03 - 19) [2007 - 09 - 20]. http: //www. bioscrypt. com/assets/Biometries_ Eneryptoin. pdf.
  • 3Hao F, Anderson R, Daugman J. Combining cryptography with biometrics effectively [ J ]. IEEE Transaction on Computers, 2006,59(9) :1081 - 1088.
  • 4Goh A, Teoh A B J, Ngo D C L. Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs[J ]. IEEE Transaction on Computers, 2006,28(12) : 1892 - 1901.
  • 5Teoh A B J, Ngo D C L, Goh A. Personalized cryptographic key generation based on facehashing [ J ]. Computers & Security, 2004,23(5) :606 - 614.
  • 6Haykin S.神经网络原理[M].叶世伟,史忠植,译.北京:机械工业出版社,1991:199-201.
  • 7Monmse F, Reiter M K, Wetzel R, et al. Cryptographic key generation from voice [ C]//Proceedings of the 2001 IEEE Symposium on Security and Privacy. Oakland, 2001 : 1 -12.
  • 8Clancy T C, Kiyavash N, Lin D J. Secure smart card-based fingerprint authentication [ C ] // Proceedings of the 2003 ACM SIGMM Workshop on Biometrics Methods and Application. Berkley, 2003 : 45 - 52.
  • 9Monrose F, Reiter M K, Wetzel R. Password hardening based on keystroke dynamics[C]//Proceedings of 6th ACM Conference on Computer and Communications Security. Murray Hill, NJ, 1999:73 - 82.
  • 10Hao F, Chan C W. Private key generation from on-line handwritten signatures [ J ]. Information Management & Computer Security, 2002,10(2) : 159 - 154.

共引文献108

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部