期刊文献+

基于指纹细节点的可撤销比特串模板生成算法 被引量:1

Cancelable bit strings template generation algorithm based on fingerprint minutiae
下载PDF
导出
摘要 针对指纹模板算法安全性能较低的问题,给出了一种基于指纹细节点的可撤销比特串模板生成算法。在对指纹图像进行预处理后,提取指纹全部细节点特征,进行量化和映射生成比特串模板,结合用户PIN码生成可撤销指纹模板,提高了算法的安全性。在指纹数据库FVC2002-DB1和DB2上的实验表明,改进的算法具有更好的安全性和认证性能,满足可撤销性、多样性和不可逆性。 In order to solve the problem of low security performance of fingerprint template algorithm,this paper designed a generation algorithm of cancelable bit strings based on fingerprint minutiae.After the preprocessing of the fingerprint image,it extracted,quantized and mapped all the minutiae of fingerprint to generate the bit strings template and combined the user PIN code to generate the cancelable fingerprint template.It improved the security of the algorihhm.The experiment results based on FVC2002-DB1 and DB2 show that the proposed algorithm has better security and authentication performance,and can satisfy the requirements of revocation,diversity and irreversibility.
作者 闫然 张雪锋 Yan Ran;Zhang Xuefeng(School of Communication&Information Engineering,Xi’an University of Posts&Telecommunications,Xi’an 710061,China)
出处 《计算机应用研究》 CSCD 北大核心 2018年第5期1550-1554,共5页 Application Research of Computers
基金 国家自然科学基金资助项目(61301091)
关键词 指纹 细节点 可撤销模板 fingerprint minutiae cancelable template
  • 相关文献

参考文献2

二级参考文献18

  • 1邬向前,王宽全,张大鹏.一种用于掌纹识别的线特征表示和匹配方法(英文)[J].软件学报,2004,15(6):869-880. 被引量:28
  • 2李文新,夏胜雄,张大鹏,许卓群.基于主线特征的双向匹配的掌纹识别新方法[J].计算机研究与发展,2004,41(6):996-1002. 被引量:34
  • 3李艳来 ,王宽全 ,李涛 ,张大鹏 .基于平移不变Zernike矩和模块化神经网络的掌纹识别方法[J].高技术通讯,2005,15(12):19-23. 被引量:2
  • 4接标,吴仕勇,齐怀峰,刘冠晓,杨秀国.基于ICA的在线掌纹识别[J].计算机工程与设计,2006,27(18):3433-3435. 被引量:4
  • 5Rappe D K. Homomorphic cryptosystems and their applications [ D ]. Dortmund, Germany: University of Dort- mund, 2004.
  • 6Lindell Y, Pinkas B. A proof of Yao's protocol for secure two-party computation [ J]. Journal of Cryptology, 2009, 22(2) : 161-188.
  • 7Huang Yan, Malka L, Evans D, et al. Efficient privacy- preserving biometric identification [ C ] //18^th Network and Distributed System Security Conference, San Diego,California: Internet Society, 2011: 6-9.
  • 8Nandakumar K, Jain A K, Pankanti S. Fingerprint-based fuzzy vault: implementation and performance [ J]. IEEE Trans. on Information Forensics and Security, 2007, 2 ( 4 ) : 744-757.
  • 9Tico M, Kuosmanen P. Fingerprint matching using an orientation-based minutia descriptor [ J ]. IEEE Transac-tions on Pattern Analysis and Machine Intelligence, 2003, 25(8) : 1009-1014.
  • 10Kisel A, Kochetkov A, Kranauskas J. Fingerprint minu- tiae matching without global alignment using local struc- tures [J]. INFORMATICA, 2008, 19(1): 31-44.

共引文献63

同被引文献9

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部