期刊文献+

一种公钥密码体制下指纹识别与数字水印的身份认证协议 被引量:6

An Identity Authentication Protocol of the Public Key Infrastructure Combining Fingerprint Identification with Digital Watermarking
下载PDF
导出
摘要 在公钥密码PKI(Public Key Infrastructure)安全体制下,结合指纹识别与数字水印的各自特性,提出了一种基于指纹特征作为数字水印的网络身份认证协议。由数据交互过程的分析可见,此协议方案能充分保证用户密钥和指纹信息的保密性和真实性,并能有效抵抗Stolen-verifier和Replay Attack两种攻击,可用于电子商务环境下高安全性的身份认证系统。 Combining characterics of fingerprint identification with digital watermarking technology, a novel identity authentication protocol is proposed in the framework of public key infrastructure (PKI) net- work security theory. By the interactive data process, the protocol can fully achieve important perform- ances of the security and authenticity for user key and fingerprint information, and can safely resist for the two common attacks of Stolen-verifier and Replay, therefore the protocol can apply for identity authentica- tion system in network e-commerce environment.
出处 《中山大学学报(自然科学版)》 CAS CSCD 北大核心 2013年第4期51-57,共7页 Acta Scientiarum Naturalium Universitatis Sunyatseni
基金 国家自然科学基金资助项目(61272381) 广东省自然科学基金资助项目(S2012010008639) 广东省科技计划资助项目(2012B010100035)
关键词 指纹识别 数字水印 身份认证 协议 fingerprint identification digital watermarking identity authentication protocol
  • 相关文献

参考文献9

二级参考文献48

  • 1赵慧民,张惠乐,胡学骏.一种基于树结构的高斯分布扩频指纹嵌入技术的方法研究[J].中山大学学报(自然科学版),2006,45(1):42-45. 被引量:3
  • 2赵耀.基于小波变换的抵抗几何攻击的鲁棒视频水印[J].中国科学(E辑),2006,36(2):137-152. 被引量:14
  • 3CAO Chunjie,MA Jianfeng,MOON Sangjae.Provable Efficient Certificateless Group Key Exchange Protocol[J].Wuhan University Journal of Natural Sciences,2007,12(1):41-45. 被引量:8
  • 4MICHAEL Miller.Discovering P2P,sybex-verlag[M].USA:John Wiley & Sons,Inc.,2001.
  • 5KUNDUR D,KARTHIK K.Video fingerprinting and encryption principles for digital rights managrment[J].proceedings of the IEEE,2004,92(6):918-932.
  • 6BLOOM Cox,Miller.Digital Watermarking[M].San Diego:Academic Press,2002.
  • 7TRAPPE W,WU M,WANG Z J,et al.Anti-collusion fingerprinting for multimedia[J].IEEE Trans.Signal Processing,2003,51:1069-1087.
  • 8MACQ M B,QUISQUATER J.Crytology for Digital TV broadcasting[J].Proc.IEEE,1995,83:944-957
  • 9BLOOM J.Security rights management in digital cinema[J].Proc.IEEE Int.Conf.Acoustics,Speech and Signal Processing,2003,4:712-715.
  • 10ANDERSON R,MANIFAVAS C.Chameleon-a new kind of stream cipher[M]// Lecture Notes in Computer Science,Fast Software Encryption.E.Biham,Ed.Heidelberg,Germany:Springer-Verlag,1997:107-113.

共引文献61

同被引文献43

引证文献6

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部