期刊文献+

Fingerprint-Based Identity Authentication and Digital Media Protection in Network Environment 被引量:6

Fingerprint-Based Identity Authentication and Digital Media Protection in Network Environment
原文传递
导出
摘要 Current information security techniques based on cryptography are facing a challenge of lacking the exact connection between cryptographic key and legitimate users. Biometrics, which refers to distinctive physiological and behavioral characteristics of human beings, is a more reliable indicator of identity than traditional authentication system such as passwords-based or tokens-based. However, researches on the seamless integration biometric technologies, e.g., fingerprint recognition, with cryptosystem have not been conducted until recent years. In this paper, we provide an overview of recent advancements in fingerprint recognition algorithm with a special focus on the enhancement of low-quality fingerprints and the matching of the distorted fingerprint images, and discuss two representative methods of key release and key generation scheme based on fingerprints. We also propose two solutions for the application in identity authentication without trustworthy thirdparty in the network environment, and application in digital media protection, aiming to assure the secrecy of fingerprint template and fingerprint-based user authentication. Current information security techniques based on cryptography are facing a challenge of lacking the exact connection between cryptographic key and legitimate users. Biometrics, which refers to distinctive physiological and behavioral characteristics of human beings, is a more reliable indicator of identity than traditional authentication system such as passwords-based or tokens-based. However, researches on the seamless integration biometric technologies, e.g., fingerprint recognition, with cryptosystem have not been conducted until recent years. In this paper, we provide an overview of recent advancements in fingerprint recognition algorithm with a special focus on the enhancement of low-quality fingerprints and the matching of the distorted fingerprint images, and discuss two representative methods of key release and key generation scheme based on fingerprints. We also propose two solutions for the application in identity authentication without trustworthy thirdparty in the network environment, and application in digital media protection, aiming to assure the secrecy of fingerprint template and fingerprint-based user authentication.
出处 《Journal of Computer Science & Technology》 SCIE EI CSCD 2006年第5期861-870,共10页 计算机科学技术学报(英文版)
基金 Supported by the National Science Fund for Distinguished Young Scholars of China under Grants No. 60225008, the National Natural Science Foundation of China under Grants No. 60332010 and No. 60575007, the Young Scientists' Fund of National Natural Science Foundation of China under Grant No.60303022, the Natural Science Foundation of Beijing under Grant No.4052026, and the 242 National Information Security Plan.
关键词 BIOMETRICS fingerprint recognition CRYPTOSYSTEM techniques and algorithms information security biometrics, fingerprint recognition, cryptosystem, techniques and algorithms, information security
  • 相关文献

参考文献45

  • 1Biometrics Market and Industry Report 2006 2010. International Biometric Group, http://www.biometricsgroup.com.
  • 2Biometric Systems Lab, Pattern Recognition and Image Processing Laboratory, Biometric Test Center. http://bias.csr.unibo.it / fvc2004/.
  • 3Biometric Systems Lab, Pattern Recognition and Image Processing Laboratory, Biometric Test Center. http://bias.csr.unibo.it/fvc2006/.
  • 4O'Gorman L. Fingerprint verification. Biometrics: Personal Identification in a Networked Society. Jain A K, Bolle R et al. (eds.), Kluwer Academic Publishers, 1999, pp.43-64.
  • 5Shen L L, Kot A, Koo W M. Quality measures of fingerprint images. In Proc. 1st Audio- and Vedio-Based Person Authentication, Halmstad, Sweden, 2001, pp.266- 271.
  • 6Shi Z C, Wang Y C, Qi J, Xu K. A new segmentation algorithm for low quality fingerprint image. In Proc. 3rd Int. Conf Image and Graphics, Hong Kong, China, Dec. 18 20, 2004, pp.314-317.
  • 7Gu J W, Zhow J. Model-based orientation field estimation for fingerprint recognition. In Proc. IEEE Conference on Image Processing, Barcelona, Spain, 2003, pp.899- 903.
  • 8Lin H, Wan Y, Jain A K. Fingerprint image enhancement: Algorithm and performance evaluation. IEEE Trans. Pattern Anal. Machine Intell., 1998, 20(8): 777-789.
  • 9Yang J W, Liu L F, Jiang T Z, Fan Y. A modified Gabor filter design method for fingerprint image enhancement. Pattern Recognition, 2003, 24: 1805-1817.
  • 10Zhu E, Yin J P, Zhang G M. Fingerprint enhancement using circular Gabor filter. In Proc. 1st Int. Conf. Image Analysis and Recognition, Porto, Portugal, 2004, pp.750-758.

同被引文献36

  • 1田野,张玉军,李忠诚.使用对技术的基于身份密码学研究综述[J].计算机研究与发展,2006,43(10):1810-1819. 被引量:16
  • 2李进,张方国,王燕鸣.两个高效的基于分级身份的签名方案[J].电子学报,2007,35(1):150-152. 被引量:13
  • 3He Y,Tian J.Fingerprint matching based on global comprehensive similarity[J].IEEE transactions on pattern analysis and machine intelligence,2006,28(6):850-862.
  • 4Chen X,Tian J,Yang X.An algorithm for distorted fingerprint matching based on local triangle features set[J].IEEE Transactions on Information,Forensics and Security,2006,1(2):169-177.
  • 5Jain A K.Combining multiple matchers for a high security fingerprint verification system[J].Pattern Recognition Latters,1999,20:1371-1379.
  • 6Loris Nanni,Alessandra Lumini.A hybrid wavelet-based fingerprint matcber[J].Patten Recognition,2007,40(11):3146-3151.
  • 7Marius Tico,Pauli Kuosmanen.Fingerprint matching using an orientation-based minutia Descriptor[J].IEEE Transactions on pattern analysis and machine intelligence,2003,25(8):1009-1014.
  • 8Cappelli R,Lumini A,Maio D,et al.Fingerprint image reconstruction from standard templates[J].IEEE transactions on pattern analysis and machine intalligence,2007,29(9):1489-1503.
  • 9Ross A,Shah J,Jain A K.From template to image:reconstructing fingerprint from minutiae points[J].IEEE transactions on pattern analysis and machine intelligence,2007,29(4):544-560.
  • 10Uludag U,Pankanti S,prabhakar S,et al.Biomettic cryptosystems:issues and challenges[J].Proceedings of the IEEE,2004,92(6):948-960.

引证文献6

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部