期刊文献+

一种基于数据隐藏和可撤销模板的生物特征信息保护方案

A Biometric Template Protection Scheme Based on Data Hiding and Cancelable Biometric Template
原文传递
导出
摘要 为了抵抗传统生物认证方案中易受的攻击,确保用户信息安全,通过结合用户密码实现双因子生物认证的方法,提出了一种基于数据隐藏和可撤销模板的生物特征信息保护方案,并通过MD5哈希算法和AES-256加密算法,确保了生物信息的完整性。实验证明,本方案有效隐藏了生物特征信息,相比其他方案具有更高的安全性和效率。 In order to resist attacks in traditional users,This paper proposed a biometric cancelable template by using password For The pare verifying the data integrity, MD5 experiment results show that the d with others. template biometrie schemes and ensure the security of protecting scheme based on data hiding and s, and realized a two-factor biometric authentication. hashes are stored followed scheme achieved higher se with AES-256 eneryption. curity and efficiency compared with others.
出处 《武警工程大学学报》 2014年第6期27-30,共4页 Journal of Engineering University of the Chinese People's Armed Police Force
基金 基金项目:国家自然科学基金资助项目(61309008、61309022) 陕西省自然科学基金资助项目(2013JQ8031)
关键词 数据隐藏 可撤销模板 生物特征模板保护 生物特征保险库 data hiding cancelable template biometric template protection biometric vault
  • 相关文献

参考文献11

  • 1任传伦,李新,杨义先.一种基于指纹的身份认证协议[J].通信学报,2003,24(9):66-72. 被引量:5
  • 2李鹏,田捷,杨鑫,时鹏,张阳阳.生物特征模板保护[J].软件学报,2009,20(6):1553-1573. 被引量:22
  • 3Ratha N K, Connell J H, Bolle R M. Enhancing security and privacy in biometrics-based authentication systems[J]. IBM systems Journal, 2001, 40(3) : 614 634.
  • 4Lee C, Choi J Y, Toh K A, et al. Alignment-free cancelahle fingerprint templates based on local minutiae information[J]. systems man and cybernetics Part B: cybernetics, IEEE transactions on, 2007, 37(4): 980-992.
  • 5Juels A, Sudan M. A fuzzy vault scheme[J]. Designs, Codes and cryptography, 2006, 38(2): 237-257.
  • 6Scheirer W J, Boult T E. Cracking fuzzy vaults and biometric en- cryption[C]//Biometrics Symposium, 2007. IEEE, 2007: 1-6.
  • 7Tulyakov S, Farooq F, Govindaraju V. Symmetric hash functions for fingerprint minutiae[M]. Pattern recognition and image analysis springer berlin heidelberg, 2005: 30-38.
  • 8Tulyakov S, Farooq F, Mansukhani P, et al. Symmetric hash functions for secure fingerprint biometric systems[J]. Pattern recognition letters, 2007, 28(16) : 2427-2436.
  • 9Jin A T B, Ling D N C, Goh A. Biohashing: two factor au- thentication featuring fingerprint data and tokenised random numberI-J. Pattern recognition, 2004, 37(11): 2245 2255.
  • 10Maio D, Maltoni D, Cappelli R, et al. FVC2002: Second fingerprint verification competition[C]// Pattern recogni- tion 2002 proceedings. 16th international conference on IEEE, 2002, 3: 811-814.

二级参考文献30

  • 1TANENBAUM A S.计算机网络 第三版[M].北京: 清华大学出版社,1996..
  • 2TANENBAUMAS.计算机网络:第三版[M].北京:清华大学出版社,1996..
  • 3LIN C L, SUN H M, HWANG T. Attacks and solutions on strong-password authentication[J].IEICE Trans Commun,2001.E84-B(9):2622-2627.
  • 4MORRIS R, THOMPSON K. Password security: a case history[J]. Commun ACM, 1979,22(11): 594-597.
  • 5BELLOVIN S M, MERRITT M. Encrypted key exchange: password-based protocols secure against dictionary attacks[A].IEEE Symposium on Research in Security and Privacy[C]. 1992.72-84.
  • 6BELLOVIN S M, MERRITT M. Augmented encrypted key exchange: a password-based protocols secure against dictionary attacks and password file compromise[A]. ACM Conf Comp & Comm Security[C]. 1993.244-250.
  • 7GONG L, LOMAS M, NEEDHAM R, et al. Protecting poorly chosen secrets from guessing attacks[J]. IEEE J Sel Areas Commun,1993, 11(5):648-656.
  • 8GONG L. Optimal authentication protocols resistant to password guessing attacks[A]. Proc 8th IEEE Computer Secunity Foundation Workshop[C]. 1995.24-29.
  • 9STEINER M, TSUDIK G, WAIDNER M. Refinement and extension of encrypted key exchange[J]. ACM Operating Systems Review,1995,29(3):22-30.
  • 10JABLON D. Strong password-only authenticated key exchange[J]. ACM Computer Communications Review, 1996,20(5).-5-26.

共引文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部