期刊文献+

一种改进的BioHashing指纹模板保护方法 被引量:1

Method for fingerprint template protection based on improved Bio Hashing
下载PDF
导出
摘要 针对用户令牌泄露导致Bio Hashing识别性能严重退化的问题,给出了一种改进的Bio Hashing指纹模板保护方法,在量化过程中采用非线性的方法产生固定长度的二值序列,离散过程采用非线性的处理方法,有效提高了算法的安全性。理论分析和仿真结果表明,改进方法产生的二值序列能有效保护指纹模板的敏感数据,提高系统的识别性能。 As for the main drawback of the original form of Bio Hashing is low performance when an imposter obtains a legitimate token and uses it to claim as a genuine. This paper,is circumvented the problem by an improved Bio Hashing for protection of fingerprint template,which could generate fixed long binary sequences nonlinearly in the process of quantitative. It improved the security of the algorithm by comparing the nonlinear process. The results of theory analyzing and simulation show that the proposed schemes can effectively protect the security of the fingerprint template of sensitive data and increase the recognition performance of the system.
出处 《计算机应用研究》 CSCD 北大核心 2016年第5期1542-1545,共4页 Application Research of Computers
基金 国家自然科学基金资助项目(61301091)
关键词 BioHashing 非线性量化 模板保护 BioHashing nonlinear quantization template protection
  • 相关文献

参考文献21

  • 1Maltoni D, Maio D, Jain A K, et al. Handbook of fingerprint recog- nition[M]. 2nd ed. London:Springer-Verlag, 2009:8-11.
  • 2Li S, Kot A C. An improved scheme for full fingerprint reconstruction [J]. IEEE Trans on Information Forensics and Security, 2012, 7(6) :1906- 1912.
  • 3Juels A, Wattenberg M. A fuzzy commitment scheme [ C ]//Proc of the 6th ACM Conference on Computer and Communications Security. New York: ACM Press, 1999: 28-36.
  • 4Juels A, Madhu S. A fuzzy vault scheme[J]. Designs, Codes and Cryptography, 2006, 38(2): 237-257.
  • 5谭台哲,章红燕.一种改进的指纹Fuzzy Vault加密方案[J].计算机应用研究,2012,29(6):2208-2210. 被引量:5
  • 6Ratha N K, Connell J H, Blolle R M. Enhancing security and privacy in biometrics-based authentication systems[ J]. IBM Systems dour- nal, 2001,40(3) : 614-634.
  • 7Ratha N K, Chikkerur S, Connell J H, et al. Generating cancelable fingerprint templates [ J]. IEEE Trans on Pattern Analysis Ma- chine intelligence, 2007, 29(4): 561-572.
  • 8Tulyakov S, Farooq F, Mansukhani P, et al. Symmetric hash func- tions for secure fingerprint biometric systems [ J ]. Pattern Recogni- tion Letters, 2007, 28(16): 2427-2436.
  • 9Ang R, Rei S, Luke M. Caneelable key-based fingerprint templates [J]. Lecture Notes in Computer Science, 2005, 74(35): 242- 252.
  • 10Jin A T B, Ling D N C, Goh A. BioHashing: two factor authentica- tion featuring fingerprint data and tokenised random number[J]. Pat- tern Recognition, 2004, 37( 11 ): 2245-2255.

二级参考文献20

  • 1LIU Hai-lun, SUN Dong-mei, XIONG Ke, et al. Is fuzzy vault scheme very effective for key binding in biometric cryptosystems [ C ]//Proc of International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery. 2011:279-284.
  • 2JUELS A, SUDAN M. A fuzzy vault scheme [ C ]//Proc of Internation- al Symposium on Infonnation Theory. [ S.L ] :IEEE Press ,2002:408- 426.
  • 3CLANCY T C, KIYAVASH N, LIND J. Secure smartcard-based fingerprint authentication [ C ]// Proc of ACM SIGMM Muhimedia, Biometrics Methods and Applications Workshop. New York:ACM Press, 2003:45-52.
  • 4ULUDAG U, JAIN A. Securing fingerprint template:fuzzy vault with helper data [ C ]// Proc of CVPR Workshop on Privacy Research in Vision. Washington DC : IEEE Computer Society,2006 : 163-169.
  • 5BRINDHA V E. Biometric template security using fuzzy vault[ C]// Proc of the 15th International Symposium on Consumer Electronics. 2011:384-387.
  • 6MERKLE J, NIESING M, SCHWAIGER M, et al. Provable security for the fuzzy [ C ]//Proc of the 5th International Conference on Internet Monitoring and Protection. Washington DC:IEEE Computer Society, 2010:65-73.
  • 7ULUDAG U,PANKANTI S,JAIN A K.Fuzzy vault for fingerprints[C]//Proc of Audio and Video-based Biometric Person Authentication.Berlin:Springer,2005:310-319.
  • 8JUELS A,SUDAN M.A Fuzzy Vault scheme[J].Designs,Codes and Cryptography,2006,38(2):237-257.
  • 9JUELS A,WATTENBERG M.A fuzzy commitment scheme[C]//Proc of the 6th ACM Conference on Computer and Communications Security.New York:ACM Press,1999:28-36.
  • 10JIN A T B,LING D N C,SONG O T.An efficient fingerprint verification system using integrated wavelet and Fourier-Mellin invariant transform[J].Image and Vision Computing,2004,22(6):503-513.

共引文献6

同被引文献5

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部