期刊文献+

基于Fuzzy Vault方案的指纹特征保护

Fingerprint Characteristics Protection based on Fuzzy Vault Method
原文传递
导出
摘要 为了进一步增强用户指纹特征信息的安全性,提高处理效率,文中提出了一个典型的用户指纹特征模板信息保护方案,文中分析了该方案存在的安全隐患和运行效率问题,指出了其存在的缺陷,针对存在的缺陷提出了一种新的改进方案,并对改进方案进行了详尽的阐述。改进方案能大大提高用户指纹特征信息的安全性,同时能显著提高运行效率。改进方案适用于对安全性以及运行效率要求均较高的应用场合。 In order to further enhance the security of user's fingerprint characteristics and improve processing efficiency, a typical user's fingerprint feature information protection scheme is proposed, its security risk and operational efficiency analyzed, and defect pointed out. And for these, a new improved scheme is proposed and described in detail. The improved scheme could greatly enhance the information security of the user's fingerprint characteristics and significantly raise the operation efficiency. This improved scheme is suitable for the applications with high security and operational efficiency
出处 《信息安全与通信保密》 2013年第4期92-94,共3页 Information Security and Communications Privacy
关键词 指纹 秘密信息 模糊金库 fingerprint secret information fuzzy vault
  • 相关文献

参考文献7

二级参考文献26

  • 1李家春,李之棠.动态网络安全模型的研究[J].华中科技大学学报(自然科学版),2003,31(3):40-42. 被引量:16
  • 2Khan M K, Zhang J S, Improving the Security of 'A Flexible Biometrics Remote User Authentication Scheme' [J]. Computer Standards &Interfaces, 2007, 29(01):82-85.
  • 3Messerges T S, Dabbish E A, Sloan R H. Examining Smart-card Security Under the Threat of Power Analysis Attacks[J]. IEEE Transactions on Computers, 2002, 51(05):541-552.
  • 4Yang W H, Shieh S P. Password Authentication Schemes with Smart Cards[J]. Computers and Security, 1999, 18(08):727-733.
  • 5Needham R M, Schroeder M D. Using Encryption for Authentication in Large Networks of Computers[J]. Communications of the ACM, 1978, 21(12):993-999.
  • 6Uludag U, Pantanki S, Prabhakar S, et al. Biometric cryptosystems:Issues and challenges[J].Proceedings of the IEEE,2004,92 (6):948-960.
  • 7Feng Hao,Anderson R,Daugman J.Combining crypto with biometrics effectively[J].IEEE Transactions on Computers,2006,55 (9): 1081-1088.
  • 8Ari Juels,Madhu Sudan.A fuzzy vault scheme[CJ.Proceedings of the 2002 International Symposium on Information Theory.IEEE Press,2002:408-426.
  • 9Uludag U, Jain A. Fuzzy fingerprint vault [C]. Cambridge, UK: Proceedings of the Workshop, Biometrics, Challenges Arising from Theory to Practice,2004:13-16.
  • 10Nandakumar K,Jain A,Pankanti S.Fingerprint-based fuzzy vault: Implementation and performance [J]. IEEE Transactions on Information Forensics and Security,2007,2(4):744-757.

共引文献36

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部