期刊文献+

基于特征点分类的模糊金库方案 被引量:2

Fuzzy Vault Scheme Based on Classification of Fingerprint Features Scheme
下载PDF
导出
摘要 为解决传统指纹认证方案中指纹模板信息泄露以及指纹和密钥无法融合等问题,提出一种基于指纹特征点分类的模糊金库方案(CFM-FV).该方案中,使用指纹奇异点作为辅助数据对指纹图像进行预对齐,将指纹细节点特征应用于模糊金库方案进行密钥绑定.验证时,提取查询指纹奇异点作为辅助数据对指纹预对齐,然后提取指纹细节点特征信息进行多项式的重构.本方案将指纹特征点分类方法与模糊金库方案相结合,一定程度上解决了传统模糊金库方案中无法实现指纹盲对齐带来的影响问题. For the purpose of solving fingerprint template leakage problem and the inability of combining fingerprints and traditional keys in the traditional fingerprintidentification,fuzzy vault scheme based on classification of fingerprint features scheme(CFM-FV)is proposed in this paper.In our scheme,singularities will be as helper data for pre-align the fingerprint,while the minutia features will be used to encode the vault in this scheme.In the stage of verification,singularities will be extracted as helper data for fingerprint pre-aligned,then the extracted minutia features will be used to reconstruct the polynomial.In this scheme,the problem that the traditional scheme cannot align the fingerprint blind will be solved to some extent by combining classification method of fingerprint features with fuzzy vault scheme.
出处 《厦门大学学报(自然科学版)》 CAS CSCD 北大核心 2016年第2期266-271,共6页 Journal of Xiamen University:Natural Science
关键词 指纹认证 模糊金库方案 指纹特征点 fingerprint authentication fuzzy vault scheme fingerprint features
  • 相关文献

参考文献18

  • 1陈昭智,郑建德.一种基于身份分层结构加密算法的广播加密方案[J].厦门大学学报(自然科学版),2006,45(3):342-346. 被引量:8
  • 2郑建德,郑杭杰,杨静.一种口令、令牌与生物认证技术通用集成框架[J].厦门大学学报(自然科学版),2011,50(1):42-46. 被引量:2
  • 3贾英涛,郑建德.J2EE平台双因素认证的设计与实现[J].厦门大学学报(自然科学版),2007,46(1):43-46. 被引量:2
  • 4SOUTAR C,ROBERGE D,STOIANOV A,et al.Biometric encryption.ICSA guide to cryptography[EB/OL].[1999-11-13].http:∥www.bioscrypt.com/assets/BiometricEncryption.pdf.
  • 5JUELS A,WATTENBERG M.A fuzzy commitment scheme[C]∥ACM Computer and Comm Security(CCCS).New York:ACM,1999:28-36.
  • 6OJHA D B,SHARMA A.A fuzzy commitment scheme with McEliece cipher[J].Surveys in Mathematics & Its Applications,2010,5:73-83.
  • 7JUELS A,SUDAN M.A fuzzy vault scheme [J].Designs,Codes and Cryptography,2006,38(2):237-257.
  • 8ULUDAG U,PANKANTI S,JAIN A K.Fuzzy vault for fingerprints[M].Heidelberg:Springer,2005:310-319.
  • 9CLANCY T C,KIYAVASH N,LIN D J.Secure smartcard-based fingerprint authentication[C]∥ACM Workshop on Biometrics:Methods and Applications.New York:ACM,2003:45-52.
  • 10ULUDAG U,JAIN A.Securing fingerprint template:fuzzy vault with helper data[J].Proceedings of Cvpr Workshop on Privacy Research in Vision,2006,163:17-22.

二级参考文献50

  • 1Dodis Y, Reyzin L, Smith A. Fuzzy extractors: how to generate strong keys from biometrics and other noisy data[J].SIAM Journal on Computing, 2008,38 ( 1 ) : 79-139.
  • 2Uludag U, Pankanti S, Prabhakar S, et al. Biometric cryptosystems:issues and challenges[J]. Proceedings of the IEEE,2004,92(6) :948-960.
  • 3Drimer S, Murdoeh S J, Anderson R. Thinking inside the box:system-level failures of tamper proofing[C]//Proceedings-IEEE Symposium on Security and Privacy. Oakland, CA: IEEE, 2008 : 281-295.
  • 4Clancy T,Kiyavash N,Lin D. Secure smartcard-based fingerprint authentication[C]//ACM Workshop on Biometrics: Methods and Applications. California:ACM Press, 2003:45-52.
  • 5Shamir A. Identity based cryptosystems and signature schemes[J]. LNCS, 1985,196 : 47-53.
  • 6Bellare M, Namprempre C, Neven G. Security proofs for identity-based identification and signature schemes[J]. Journal of Cryptology, 2009,22(1) : 1-61.
  • 7Xavier Boyen. Reusable cryptographic fuzzy extractors [C]//Proceedings of the ACM Conference on Computer and Communications Security. New-York: ACM Press, 2004:82-91.
  • 8Rivest R L, Shamir A, Adleman L. Method for obtaining digital signatures and public-key cryptosystems[J-]. Communications of the ACM, 1978,21(2) : 120-126.
  • 9Kim M, Koc C K. A simple attack on a recently introduced hashbased secure user authentication scheme[J]. International Journal of Computer Science and Network Security, 2006,6 (5): 157-160.
  • 10Yin YL, Ning XB, Zhang XM. Development and application of automatic fingerprint identification technology. Journal of Nanjing University (Natural Sciences Edition), 2002,38(1):29-35 (in Chinese with English abstract).

共引文献26

同被引文献9

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部