期刊文献+

基于口令和中国剩余定理的模糊金库算法

Fuzzy Vault Algorithm Based on Password and Chinese Remainder Theorem
下载PDF
导出
摘要 模糊金库算法易受到位置攻击、暴力攻击及相关攻击。为了增强模糊金库算法抵抗这些攻击的能力,该文提出了基于口令和中国剩余定理的模糊金库算法。理论分析表明,该算法在抵抗这些攻击方面都有所提高。利用FVC2002-DB1指纹数据库,对该算法进行实验仿真。实验结果表明,该算法的GAR与FAR未受到损耗。 The fuzzy vault algorithm is easily vulnerable to the location based attack, the brute force attack and the correlation attack. To enhance the ability of the fuzzy vault algorithm on resisting those there attacks, this paper proposes a new fuzzy vault algorithm based on password and Chinese remainder theorem (CRT). Theory analysis shows that the ability of the new algorithm on resisting those three attacks has improved. In ad- dition, by using the FVC2002-DB1 to stimulate proposed algorithms, and the experimental results show that proposed GAR is not decreased and proposed FAR is not increased.
作者 游林 黄艳红
出处 《杭州电子科技大学学报(自然科学版)》 2012年第3期29-32,共4页 Journal of Hangzhou Dianzi University:Natural Sciences
基金 国家自然科学基金资助项目(60763009) 浙江省自然科学基金杰青团队资助项目(R1090138)
关键词 指纹细节点 中国剩余定理 口令 模糊金库 fingerprint minutiae Chinese remainder theorem password fuzzy vault
  • 相关文献

参考文献5

  • 1李鹏,田捷,杨鑫,时鹏,张阳阳.生物特征模板保护[J].软件学报,2009,20(6):1553-1573. 被引量:22
  • 2Nandakumar K, Jain A, Pankanti S. Fingerprint -Based fuzzy vault: Implementation and pertbrmanee [ J J. IEEE Trans. on Information Forensics and Security, 2007, 2 (4) : 744 -757.
  • 3Scheirer W J, Bouh T. Cracking fuzzy vaults and biometric encryption [ C ]. Baltirore : Biometric Symposium, 2007 : 1 - 6.
  • 4Orencik C, Pedersen T B, Savas E. Securing fuzzy vault schemes through biometric hashing E J ]. Turkish Journal Electri- cal Engineering & Computer Sciences, 2010, 18 (4) :515 - 539.
  • 5Orencik C, Pedersen T B, Savas E. Improved fuzzy vault scheme for fingerprint verification [ C ]. Seville : Spain ICETE, 2008 : 37 - 43.

二级参考文献1

共引文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部