期刊文献+

基于指纹多生物特征的安全身份认证方案 被引量:1

Secure Identity-authentication Scheme Based on Minutiae Classification
下载PDF
导出
摘要 由于多生物特征身份认证的安全稳定性,美国司法部引入指纹汗孔信息来帮助身份认证。然而指纹汗孔信息的泄露可以充分还原出指纹纹路信息。本文提出一种保护指纹汗孔等个人隐私信息的方案。方案采用高分辨率指纹仪提取带有汗孔的指纹数字图像,使用指纹细节点进行预对齐,指纹汗孔进行密钥绑定。现有的模糊金库方案在应用上都假设指纹预先对齐或采用一些准确率不高的对齐方法,本文首次将指纹第三层汗孔信息与模糊金库方案相结合。 As muhi-biometric feature identification can get higher accuracy, the U. S. department of justice launched the next generation identification (NGI) project which will add the fingerprint pore information to help the identification. However, the leaking of personal fingerprint pore information can make it easy to restore the fingerprint ridges. The paper presents a scheme which can protect personal private pore information. The scheme uses high-resolution fingerprint scan device to capture fingerprint digital image with pores, aligns fingerprints by using minutiae, and binds key by using pore. Existing Fuzzy Vault scheme as- sumes fingerprints are pre-aligned or uses inaccurate methods to align fingerprints. The paper firstly combines fingerprint level3 information with Fuzzy Vault scheme.
出处 《计算机与现代化》 2013年第6期64-66,70,共4页 Computer and Modernization
基金 国家自然科学基金资助项目(61161140320 61033014)
关键词 指纹 汗孔 多生物特征 安全 身份认证 fingerprint fingerprint pore multi-biometric feature security identity-based authentication
  • 相关文献

参考文献16

  • 1Maltoni D, Maio D, Jain A K, et al. Handbook of Finger- print Recognition (2nd Edition) [ M]. Springer, 2009.
  • 2He Minwei. The research of security technology on E-com- merce based on the second generation identity ID card and fingerprint [ C]//ISECS ' 09. 2009:394-397.
  • 3Jain A K. Automatic Fingerprint Matching Using Extended Feature Set [ R ]. U.S. Federal Funds Provided by Depart- ment of Justice' s Final Report, Award Number: 2007-RG- CX-K183, 2011.
  • 4Zhe Jin, Andrew Beng Jin Tech. Fingerprint template protec- tion with minutia vicinity decomposition [ C ]// Biometrics (IJCB), 2011 International Joint Conference. 2011 : 1-7.
  • 5Juels A, Sudan M. A fuzzy vault scheme [ C ]// Proceed- ings of 2002 IEEE International Symposium on Information Theory. 2002.
  • 6Clancy T, Kiyavash N, Lin D. Secure smartcard-based fin- gerprint authentication [ C ]// Proc. ACM SIGMM Work- shop on Biometric Methods and Applications. 2003:45-52.
  • 7Uludag U, Jain A. Fuzzy fingerprint vault [ C ]// Proc. Workshop on Biometrics: Challenges Arising from Theory to Practice. 2004 : 13-16.
  • 8Yang S, Verbauwhede I. Automatic secure fingerprint veri- fication system based on fuzzy vault scheme [ C ]//Proc. Int. Conf. on Acoustics, Speech, and Signal Processing ( ICASSP 05). 2005:609-.612.
  • 9Uludag U, Pankanti S, Jain A K. Fuzzy vault for finger- prints[ C]// Proc. Int. Conf. on Audio-and Video-Based Biometric Person Authentication (5th). 2005:310-319.
  • 10Jeffers J, Arakala A. Fingerprint alignment for a minutiae- based fuzzy vault[C]//2007 Biometrics Symposium. Bal- timore, Maryland, 2007.

同被引文献17

  • 1罗斌,裘正定.网络身份认证新技术[J].计算机安全,2005(10):29-31. 被引量:14
  • 2薛辉,王再芊,梁晶,王平,安凯.网络身份认证若干安全问题及其解决方案[J].计算机与数字工程,2007,35(1):81-83. 被引量:6
  • 3Y. Xu, C. Lin, W. Zhao. Producing computationally efficient KPCA- based feature extraction for classification problems[J]. Electronics Letters (SCI), 2010,46(6), 452-453.
  • 4Zarzoso V,Comon P, Robust independent component analysis by iterative maximization of the kurtosis contrast with algebraic optimal step size[J]. IEEE Transactions on Neural Networks . 2010, (21) : 248-261.
  • 5O. Lahdenoja, M. Laiho, A. Paasio, "Reducing the feature vector length in local binary pattern based face recognition" Proc[C]. IEEE International Conference on Image Processing (2005),Genoa, Italy, vol. 2, pp. 914-917.
  • 6Lipton A .,Fujiyoshi H.,Patil R. Moving Target Classification and Tracking from Real Time video[C].In Proceedings of the Workshop on Application of computer Vision,October,1998,47-58.
  • 7孙卓实时人眼跟踪与眨眼检测[D].杭州:浙江大学,2008.
  • 8Lin You,Jie Lu. A Novel Fuzzy Vault Scheme for Secret Key Exchange[C].International Conference on Security and Cryptography, 2012:426-429.
  • 9袁立,穆志纯.一种人耳生物特征模板保护方法[C].第三十一届中国控制会议论文集B卷,2012:5.
  • 10吕品轩,王士林,李生红.基于唇语识别的特征鉴别力分析[J].信息安全与通信保密,2008,30(5):60-62. 被引量:5

引证文献1

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部