期刊文献+

一种可撤销的指纹模板保护方案 被引量:3

A Cancelable Fingerprint Template Protection Scheme
下载PDF
导出
摘要 在指纹识别系统中,当用户的指纹模板被攻击者获取时,用户的隐私和安全就可能遭到威胁,因此,保护指纹特征模板已成为一个关键环节。尽管许多指纹模板保护方法已经被提出,但是要设计一个同时满足多样性、可撤销性、不可逆性和高性能的方案仍具有一定的挑战性。文章提出一种可撤销的指纹模板保护方案,将原始指纹细节点信息经过不可逆变换生成可撤销的比特串模板,其主要思想是:任选一个细节点作为基准点,与周围其他所有细节点进行两两比较,得到相对距离和方向场角度差;然后,将其量化并映射到一个定义的二维极坐标网格中;按照一定顺序读取网格单元中的数据,得到一个一维比特串模板。当比特串模板泄露时,通过改变用户口令PIN生成新的比特串模板,达到可撤销的目的。由于变换过程是不可逆的,所以即使攻击者获得比特串模板也不能恢复出原始指纹特征信息,保护了用户的隐私。在实验中,用指纹数据库FVC2004 DB1和FVC2004 DB2对文中方法与S.Wang提出的方法分别进行测试,实验结果显示,文章提出方法的性能优于S.Wang提出的方法,并且具有更高的安全性。 In a tmgerprlnt authentication system, the user's privacy and security would be threatened when attacker obtain user's fingerprint template, therefore, the fingerprint template protection has become a key link.Although many fingerprint template protection methods have been proposed, it is still a challenging task to devise a scheme which satisfies both diversity, revocable, irreversible and high-performance. This paper proposes a cancelable fingerprint template protection scheme which generates a revocable bit-string template from a set of minutiae points. The main idea is to choose a minutiae point as reference point, comparing with all other minutiae points to get relative distance and direction Angle, then, mapping the minutiae into a 2 dimensional polar grid which consist of small cells and finding out which cells include minutiae. Changing the user's password to generate new bit- string template when the bit-string template has been revealed. Because of the transformation process is irreversible, so the attacker can't restore the original fingerprint information by bit-string template.This method could protect the privacy of users. In the experiments,testing this method and S.Wang's method which has been presented by the FVC2004 DB 1 and FVC2004 DB 1 database, the experimental results showed that the proposed method is superior and higher security than S. Wang's method.
出处 《信息网络安全》 2015年第1期72-75,共4页 Netinfo Security
关键词 指纹识别 模板保护 可撤销 比特串 fingerprint authentication template protection cancelable bit-string
  • 相关文献

参考文献2

二级参考文献38

  • 1UPMANYU M, NAMBOODIRI A M, SRINATHAN K, et al. Blind Authentication: A Secure Crypto-Biometric Verification Protocol [J].IEEE Transactions on Information Forensics and Security, 2010, S(2): 255-268.
  • 2GAO Qinghai. Biometric Authentication in Smart Grid[C)11 Proceedings of 2012 International Energy and Sustainability Conference (IESC): March 22-23, 2012. Farmingdale, NY, USA, 2012: 1-5.
  • 3LI Xiong, NIU J W, MA Jian, et al. Cryptanalysis and Improvement of a Biometrics-Based Remote User Authentication Scheme Using Smart Cards[J].Journal of Network and Computer Applications, 2011, 34(1): 73-79.
  • 4LI C T, HWANG M S. An Efficient Biometricsbased Remote User Authentication Scheme Using Smart Cards[J].Journal of Network and Computer Applications, 2010, 33(1): 1-5.
  • 5DAS A K. Analysis and Improvement on an Efficient Biometric-based Remote User Authentication Scheme Using Smart Cards[J].lET Information Security, 2011, 5(3): 145-151.
  • 6FAN Chun, LIN Yihui. Provably Secure Remote Truly Three-Factor Authentication Scheme with Privacy Protection on Biometrics[J].IEEE Transactions on Information Forensics and Security, 2009, 4(4): 933-945.
  • 7HUANG Xinyi, XIANG Yang, CHONKA A, et al. A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems[J].IEEE Transactions on Parallel and Distributed Systems, 2011, 22(8): 1390-1397.
  • 8FENG Yicheng, YUEN P C, JAIN A K. A Hybrid Approach for Generating Secure and Discriminating Face Template[J].IEEE Transactions on Information Forensics and Security 2010, 5(1): 103-107.
  • 9KHAN M K, XIE Ling, ZHANG Jiashu. Chaos and NDFT-Based Concealing of Fingerprintbiometric Data into Audio Signals for Trustworthy Person Authentication[J].Digital Signal Processing 2010, 20(1): 179-190.
  • 10LALITHAMANI N, SOMAN K P. An Efficient Approach for Non-Invertible Cryptographic Key Generation from Cancelable Fingerprint Biometrics[C]// Proceedings of International Conference on Advances in Recent Technologies in Communication and Computing, 2009 (ARTCom 2009): October 27-28, 2009. Kottayam, Kerala, 2009: 47-52.

共引文献3

同被引文献8

引证文献3

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部