期刊文献+

基于虹膜特征的密钥生成研究 被引量:4

Study for key generation based on iris feature
下载PDF
导出
摘要 生物特征密钥很好地解决了密钥过长不易记忆、来自于外部所带来的安全问题,而在众多生物特征中,虹膜特征能够生成足够长的密钥用于加密算法。针对现有虹膜特征密钥提取方法中密钥的安全性问题,提出一种直接从虹膜特征中提取密钥的方法。在虹膜预处理基础上,利用Haar小波提取虹膜特征;应用随机映射函数从虹膜特征中提取密钥。实验结果表明提取的密钥通过了NIST随机性测试标准,能够满足加密算法的需求。 Biometric key solves the security problem which is not easy to remember and from external caused by the length of key.In numerous biological characteristics,enough length key can be extracted from iris feature to be used in the encryption algorithm.In allusion to the security problem existing in iris feature extraction method,a kind of key extraction method directly from iris feature is proposed.On the basis of iris preprocessing,iris feature is extracted by using Haar wavelet.The key is generated from the iris feature by using stochastic mapping function.The experimental results show that the extracted key gets through NIST random testing standard,which can meet the needs of the encryption algorithm.
出处 《计算机工程与应用》 CSCD 2012年第21期31-34,44,共5页 Computer Engineering and Applications
基金 国家自然科学基金(No.70801062)
关键词 虹膜特征 提取 随机映射函数 密钥提取 随机测试 iris feature extract stochastic mapping function key extraction random test
  • 相关文献

参考文献13

  • 1周俊,张全慧,许铁军,赵中亮.基于虹膜特征密钥的军事图像加密技术[J].国防科技,2011,32(2):14-17. 被引量:3
  • 2Abraham D G, Dolan G M, Double G P, et al.Transaction security system[J].IBM Systems J, 1991,30 (2) : 206-229.
  • 3Monrose F,Reiter M K, Wetzel S.Password hardening based on keystroke dynamics[C]//Proceedings of the 6th ACM Conference on Computer and Communications Se- curity, Singapore, 1999 : 73-82.
  • 4Monrose F,Reiter M K,Li Qi,et al.Cryptographic key generation from voice[C]//IEEE Symposium on Security and Privacy,Oakland,CA,USA,2001:202-213.
  • 5Charles C,Negar K,Dermis J L.Secure smartcard-based fingerprint authentication[C]//2003 ACM Workshop on Bio- metrics Methods and Application, Berkeley, California, 2003: 45-52.
  • 6Hao F, Chan C W.Private key generation from on-line handwritten signatures[J].Information Management & Com- t~uter Security,2002,10(2) : 159-164.
  • 7Hao F, Anderson R, Daugman J.Combining cryptography with biometrics effectively[J].IEEE Transactions on Com- puters,2006,55 (9) : 1081-1088.
  • 8Davida G, Frankel Y, Matt B.On enabling secure appli- cations through offiine biometric identification[C]//Proceed- ings of IEEE Symposium on Security and Privacy, Oak- land,California, 1998: 148-157.
  • 9Rathgeb C, Uhl A.Context-based biometric key genera- tion for iris[J].Computer Vision,2011,5(6) .389-397.
  • 10马争,黄祎.曲线拟合的虹膜定位算法研究[J].电子科技大学学报,2009,38(3):426-430. 被引量:5

二级参考文献22

  • 1田启川,潘泉,程咏梅,张洪才.不完全虹膜模式唯一性实验研究[J].计算机应用研究,2006,23(2):237-239. 被引量:3
  • 2田启川,潘泉,梁彦,程咏梅,张洪才.瞳孔中心指导的虹膜边界快速定位算法[J].系统仿真学报,2006,18(7):1777-1780. 被引量:11
  • 3冯薪桦,丁晓青,方驰,吴佑寿.虹膜内外边界的粗定位方法[J].清华大学学报(自然科学版),2007,47(1):80-83. 被引量:10
  • 4杨建国.小波分析及其工程应用[M].北京:机械工业出版社,2007.
  • 5HE Xiao-fu, SHI Peng-fei. A new segmentation approach for iris recognition based on hand-held capture device[J]. Pattern Recognition, 2007, (40): 1326-1333.
  • 6BASIT A, JAVED M Y. Localization of iris in gray scale images using intensity gradient[J]. Optics and Lasers in Engineering, 2007, 45: 1107-1114.
  • 7DAUGMAN. J. The importance of being random: Statistical principles of iris recognition[J]. Pattern Recognition, 2003, 36(2 ): 279-291.
  • 8WILDES R P. Automated iris recognition: an emerging biometrics technology[J]. Proceedings of the IEEE, 1997, 85(9): 1348-1363.
  • 9MA L, TAN T. Personal identification based on iris texture analysis[J]. IEEE Trans on Pattern Analysis and Machine Intelligence, 2003, 12(25): 1519-1533.
  • 10John Daugman. Handbook of Biometrics[M]. [S.l.]: Springer US, 2008: 71-90.

共引文献6

同被引文献36

  • 1陈菲,宋志高,陈克非.无线传感器网络中对密钥管理评估指标研究[J].计算机仿真,2005,22(5):137-140. 被引量:17
  • 2杨文安,袁德明.基于混沌序列的密钥生成新方法[J].数学的实践与认识,2006,36(12):160-164. 被引量:3
  • 3Ross A, Jain A. Information fusion in biometries [ J ]. Pattern Recognition letters ,2003,24( 13 ) :2115-2125.
  • 4Zhang Jain-guo,Tan Tieniu, Li Ma. lnvariant texture segmen- tation via circular gabor filters [ C ]//Proceeding of the 16th international conference on pattern recognition. Quebec:lEEE Computer Society,2002:901-904.
  • 5Clerc M. The swarm and the queen: towards a deterministic and adaptive particle swarm optimization[ C]//Proc of 1999 congress on evolutionary computation. Washington DC, USA: IEEE, 1999.
  • 6Clerc M, Kennedy J. The particle swarm explosion, stability, and convergence in a multidimensional complex space [ J ]. IEEE Transactions on Evolutionary Computation ,2002,6( 1 ) : 58 -73.
  • 7van den Bergh F. An analysis of particle swarm optimizers [ D ]. Pretofia : University of Pretoria ,2002.
  • 8CASIA-IrisV1 [ DB/OL]. 2004. http://www, cbsr. ia. ac. cn/ IrisDatabase. htm.
  • 9Nandakumar K,Jain A K, Pankanti S. Fingerprint-based Fuzzy Vault : Implementation and Performance [ J ] IEEE Transactions on Information Forensics and Security, 2007,2(4) :744-757.
  • 10Monrose F, Reiter M K, Li Q, et al. Cryptographic Key Generation from Voice[ C]//Proceedings of IEEE Sym- posium Security and Privacy. Sacramento, USA: IEEE Press,2001:202-213.

引证文献4

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部