期刊文献+

结合生物特征识别技术的网络安全认证系统设计 被引量:2

Design of Network Security Authentication System Based on Biometrics
下载PDF
导出
摘要 随着信息技术的飞速发展,生物特征识别技术正在被越来越广泛地应用到数据库和商业系统的访问控制中。这些应用需要采用一定的措施来抵御对安全的威胁。在涉及到一个开放的网络环境下的认证问题时,例如非面对面的交易中,加密技术(公钥加密术和数字签名技术)被采用来防止对生物认证信息的无授权的使用,同时保证数据的完整性。该文提出了一种包含可信任的第三方的网络认证结构,其结合了手形认证技术和加密技术。并开发了一种应用于基于网络环境的原型系统。对此模型的初步评估结果是令人满意的。类似的技术可以被应用到更加灵活的应用中。 With the rapid growth of information technologies,biometrics is being used more and more widely in applications for accessing databases or business systems.These applications need to implement measures to counter threats to security.In the case of authentication through an open network,such as non-face-to-face trading,cryptography techniques are adopted(public key cryptography and digital signature)to avoid unauthorized use of the biometric information and guarantee the integrity of data.This paper presents a trusted third party authentication architecture in which hand shapes verification techniques and cryptography techniques are combined.The paper develops a prototype system which is applied to a network-based workflow.Initial evaluation of the prototype system is encouraging.Similar techniques can be used to authenticate people for more flexible application.
出处 《计算机工程与应用》 CSCD 北大核心 2003年第27期196-198,209,共4页 Computer Engineering and Applications
关键词 生物特征识别 认证 加密 手形认证 网络安全 Biometrics,Authentication,Cryptography,Hand shapes verification,Network security
  • 相关文献

参考文献8

  • 1孙冬梅,裘正定.生物特征识别技术综述[J].电子学报,2001,29(z1):1744-1748. 被引量:143
  • 2A K Jain et al.Biometrics:Promising frontiers for emerging identification market[J].Communication ACM,2000;2:91-98.
  • 3Stephen M Matyas Jr,Jeff Stapleton.A Biometric Standard for Informarion Management and Security[J].Computers & Secufity,2000.19: 428--441.
  • 4Sun Dong-mei et al.Automated verification Based on Hand Shapes[C]. In:6^th International Conference on Signal Processing(ICSP'02).
  • 5William Stallings.Network Security Essentials:Application and Standards[M].Prentice-Hall, Inc.
  • 6A K Jain et al.Biometrics-Based Web Access.MSU-CPS-98-33.
  • 7Dario Maio,Davide MahonLA Secure Protocol for Electronic Commerce based on Fingerprints and Eneryption[C].In : ISAS'99, Orlando(USA), 1999-07.
  • 8Jeff Stapleton,KPMG LLP.Biometrics PKI Note.http://www.recogsys. com, 2001-05.

二级参考文献53

  • 1[1]Glossary of biometrics terms [R].1998,Association for biometrics(AfB),Intemational Computer Security Association (ICSA).
  • 2[2]R Chellappa,et al.Humnan and machine recognition of face:a survey[J].Proc.IEEE,1995,83 (5):705-740.
  • 3[3]R Brunelli,T Poggio.Face recognition:features versus templates [J].IEEE Trans.PAMI,1993,15(10):1042-1052.
  • 4[4]D L Swets,J Weng.Using discriminant eigenfeatures for image retrieval[J].IEEE Trans.PAMI,1996,18 (8):831-836.
  • 5[5]B Moghaddam,et al.Probabilistic visual recognition for object recognition [J].IEEE Trans.PAMI,1997,19(7) :696-710.
  • 6[6]S Y Lee,et al.Recognition of humman front faces using knowledgebased feature extraction and neunofuzzy algorithm [J].Pattern Recognition,1996,29(11):1863-1876.
  • 7[7]S Lawtonce,et al.Face recognition:a convolutional neural-network approach [J].IEEE Trans.NN,1997,8(1):98-113.
  • 8[9]J Zhang,et al.Face recognition:eigenface,elastic matching,and neural nets [J].Proc.IEEE,1997,85(9):1422-1435.
  • 9[10]L Wiskott,et al.Face recognition by elastic bunch graph matching [J].IEEE Trans.PAMI.1997,19(6) :775-779.
  • 10[11]N Ratha,et al.A real-time matching system for large fingerprint database [J].IEEE Trans.PAMI,1996,18(8) :799-813.

共引文献142

同被引文献5

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部