期刊文献+

基于指纹自动配准的多重控制模糊金库方案 被引量:3

Multiple-control fuzzy vault based on auto-aligned fingerprint
原文传递
导出
摘要 模糊金库是一种绑定生物特征和密钥的典型加密框架,与指纹结合可作为一种生物加密系统.但是,在指纹模糊金库实现中,多数方案针对单一指纹模板,匹配时需要提前配准.针对这些局限性,提出一种基于指纹自动配准的多重控制模糊金库,采用多个指纹对系统的秘密信息进行不同程度的控制,并运用几何哈希技术,变换指纹信息,使之不再以原始状态存储,同时实现自动配准.实验结果分析表明,所提出的方案在匹配度,攻击复杂度方面都有较好的性能,使具有不同安全级别的系统更加可靠. Fuzzy Vault is a typical encryption framework which binds biological characteristics and key. Combined with fingerprint, Fuzzy Vault can be used as a biometric encryption system. However, most of the fuzzy fingerprint vault implementations only included single fingerprint template, and the features need to be pre-ali ligned fingerprint tiple fingerprint t gned. According to these is proposed, which can co limitations, a multiple-control fuzzy ntrol keys of application system in dif emplates, and use geometric hashing tec vault based on au ferent degrees by to-a- hnique to transform fingerprint, achieve auto- state. The analysis of experimental results in- to matching, attack complexity and makes the matic alignment and store fingerprint without its original dicates that the proposed scheme has better performance i application system with different level of security be more reliable.
出处 《四川大学学报(自然科学版)》 CAS CSCD 北大核心 2014年第6期1205-1210,共6页 Journal of Sichuan University(Natural Science Edition)
基金 保密通信重点实验室基金项目(9140C110401140C11053)
关键词 指纹 自动配准 多重控制模糊金库 Fingerprint Auto-aligned Multiple-control fuzzy vault
  • 相关文献

参考文献12

  • 1Fouad M, E1 Saddik A, Zhao J Y, et al. A fuzzy vault implementation for securing revocable iris tem- plates [C]//Proceedings of 2011 IEEE International Conference on Systems. Montreal, QC: IEEE, 2011.
  • 2Liu H L, Sun D M, Xiong K, etal. A new fuzzy vault method using cubic spline interpolation[C]// Proceedings of 2010 International Conference on Ar- tificial Intelligence and Computational Intelligence (AICI). Sanya, China: IEEE, 2010.
  • 3Juels A, Sudan M. A fuzzy vault scheme [C]//Pro- eeedings of 2002 IEEE International Symposium on Information Theory. Lausanne, Switzerland: IEEE, 2002.
  • 4Uludag U, Pankanti S, Jain A K. Fuzzy vault for fingerprints[C]//Audio-and Video-Based BiometricPerson Authentication. Berlin Heidelberg: Spring- er, 2005.
  • 5邓见光,袁华强.指纹Fuzzy Vault加密方案[J].科技创新导报,2009,6(12):248-250. 被引量:1
  • 6Liu H W, Wang Y F. A new fuzzy fingerprint vault using multivariable linear function based on Lorenz Chaotic System[C]//Proceedings of 2012 IEEE In- ternational Conference on Computer Science and Au- tomation Engineering (CSAE). Zhangjiajie, China: IEEE ,2012.
  • 7张镕麟,刘而云,赵恒,庞辽军.改进的可撤销指纹Fuzzy Vault方案[J].西安电子科技大学学报,2011,38(4):173-180. 被引量:5
  • 8谭台哲,章红燕.一种改进的指纹Fuzzy Vault加密方案[J].计算机应用研究,2012,29(6):2208-2210. 被引量:5
  • 9Hirschbichler M, Boyd C, Boles W. A multiple- control fuzzy vault [C]//Proceedings of Sixth An- nual Conference on Privacy, Security and Trust (PST08). Fredericton, New Brunswick, Canada: IEEE ,2008.
  • 10Chung Y, Moon D, Lee S, et al. Automatic align- ment of fingerprint features for fuzzy fingerprint vault [C]//Information Security and Cryptology. Berlin Heidelberg: Springer, 2005.

二级参考文献39

  • 1Cavoukian A, Stoianov A. Biometric Encryption: a Positive-sum Technology That Achieves Strong Authentication, Security and Privacy [ R/OL]. [2010-05-20]. http://www, ipc. on. ca.
  • 2Bodo A. Method for Producing a Digital Signature with Aid of a Biometric Feature. German Patent DE 42 43 908 A1 [ P/OL]. 1994[2010-05-20]. http://depatisnet, dpma. de/ipc/recherchex, do.
  • 3Juels A, Wattenberg M. A Fuzzy Commitment Scheme [ C]//Proceedings of 6th ACM Conference on Computer and Communications Security. New York: ACM Press, 1999: 28-36.
  • 4Dodis Y, Ostrovsky R, Reyzin L, et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data [J]. SIAM Journal on Computing, 2008, 38(1): 97-139.
  • 5Linnartz J P, Tuyls P. New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates [ C]//4th Conference on Audio and Video Based Person Authentication. New York: Springer-Verlag, 2003: 393-402.
  • 6Hao F, Anderson R, Daugman J. Combining Crypto with Biometrics Effectively [J]. IEEE Trans on Computers, 2006, 55(9) : 1081-1088.
  • 7Juels A, Sudan M. A Fuzzy Vault Scheme [ C]//Proceedings of IEEE International Symposium on Information Theory. Lausanne: IEEE, 2002: 408.
  • 8Uludag U, Pankanti S, Jain A K. Fuzzy Vault for Fingerprints [ C]//Proceedings of the 5th Conference on Audio-and Video- based Biometric Person Authentication. New York: Springer-Verlag, 2005: 310-319.
  • 9Nandakumar K, Jain A K, Pankanti S. Fingerprint-Based Fuzzy Vault: Implementation and Performance [ J]. IEEE Trans on Information Forensics and Security, 2007, 2(4): 744-757.
  • 10Lee Y J, Park K R, Lee S J, et al. A New Method for Generating an Invariant Iris Private Key Based on the Fuzzy Vault System [J]. IEEE Trans on Systems, Man, and Cybernetics--Part B: Cybernetics, 2008, 38(5) : 1302-1313.

共引文献7

同被引文献21

  • 1陈昭智,郑建德.一种基于身份分层结构加密算法的广播加密方案[J].厦门大学学报(自然科学版),2006,45(3):342-346. 被引量:8
  • 2贾英涛,郑建德.J2EE平台双因素认证的设计与实现[J].厦门大学学报(自然科学版),2007,46(1):43-46. 被引量:2
  • 3SOUTAR C,ROBERGE D,STOIANOV A,et al.Biometric encryption.ICSA guide to cryptography[EB/OL].[1999-11-13].http:∥www.bioscrypt.com/assets/BiometricEncryption.pdf.
  • 4JUELS A,WATTENBERG M.A fuzzy commitment scheme[C]∥ACM Computer and Comm Security(CCCS).New York:ACM,1999:28-36.
  • 5OJHA D B,SHARMA A.A fuzzy commitment scheme with McEliece cipher[J].Surveys in Mathematics & Its Applications,2010,5:73-83.
  • 6JUELS A,SUDAN M.A fuzzy vault scheme [J].Designs,Codes and Cryptography,2006,38(2):237-257.
  • 7ULUDAG U,PANKANTI S,JAIN A K.Fuzzy vault for fingerprints[M].Heidelberg:Springer,2005:310-319.
  • 8CLANCY T C,KIYAVASH N,LIN D J.Secure smartcard-based fingerprint authentication[C]∥ACM Workshop on Biometrics:Methods and Applications.New York:ACM,2003:45-52.
  • 9ULUDAG U,JAIN A.Securing fingerprint template:fuzzy vault with helper data[J].Proceedings of Cvpr Workshop on Privacy Research in Vision,2006,163:17-22.
  • 10JEFFERS J,ARAKALA A.Fingerprint alignment for a minutiae-based fuzzy vault[C]∥Biometrics Symposium,2007.Baltimere:IEEE,2007:1-6.

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部