期刊文献+

基于移动指纹识别的身份认证系统 被引量:5

Fingerprint recognition on mobile device
在线阅读 下载PDF
导出
摘要 提出一种基于指纹识别的手机身份认证方案。用户通过手机内置的指纹仪获取指纹模板,远程服务器完成指纹比对,用户身份的确认等工作。通过实验证明整个系统的有效性和可靠性。 It introduced the currently research status of automatic fingerprint identification technology,analyse fingerprint feature definition,extraction and matching technologies,then proposed a fingerprint authentication system based on mobile devices.User can use the built-in fingerprint reader of mobile device to capture fingerprint image,and then send it to the server to complete the identity authentication work,the whole process is reliable and security.
作者 黄轩
出处 《南昌大学学报(理科版)》 CAS 北大核心 2011年第2期189-192,共4页 Journal of Nanchang University(Natural Science)
关键词 指纹 生物识别 图像处理 识别模式 Fingerprint Biometric authentication Image process Recognition model
  • 相关文献

参考文献7

  • 1周功业,刘志琴.一种基于指纹识别的远程身份认证方案[J].计算机工程与科学,2004,26(7):52-55. 被引量:11
  • 2尹义龙,宁新宝,张晓梅.自动指纹识别技术的发展与应用[J].南京大学学报(自然科学版),2002,38(1):29-35. 被引量:76
  • 3LIN H.Automatic Personal Identification Using Fingerprints,Michigan State University[M].PhD dissertation,1998.
  • 4ANIL K,JAIN,Yi CHEN et al.Pores and Ridges:HighResolution Fingerprint Matching Using Level 3 Features[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,January,2007,29(1).
  • 5CLARKE N L,FURNELL S M.Advanced User Authentication for Mobile Devices,Plymouth University[EB/OL].Being Revised for Journal of Computer &Security,2007,26:109-119.
  • 6Fingerprint SDK Java 2007,http://www.griaulebiometrics.com/page/en-us/fingerprint_sdk[EB/OL].
  • 7The free fingerprint database from TIMA Laboratoire,available from http://tima.imag.fr/mns/research/finger/fingerprint/index.html is used in the system development phase[EB/OL].

二级参考文献23

  • 1William Stallings 杨明 胥光辉 齐望东 等译.密码编码学与网络安全:原理与实践:第2版[M].北京:电子工业出版社,2001..
  • 2Clarke R. Human identification in information systems: Management challenges and publit policy issues.Information Technology and People, 1994, 7(4 ) : 6-37.
  • 3Davies S G. Touching big brother:How biometric technology will fuse flesh and machine. Information Technology and People, 1994, 7(4):60-69.
  • 4Campbell J,Alyea J L, Dunn J. Biometric security:Government applications and operations, http://www.vitro.bloomington.in. us:8080/~BC/, 1996.
  • 5Miller B. Vital signs of identity. IEEE Spectrum, 1994, 31(2) :22-30.
  • 6Newham E, The biometric report. New York: SJB ,Services. 1995.
  • 7Arnit Y, Gernea D. A computational model for visual Selection. Neural Comp. 1999, 11:1691-1715.
  • 8Daugman j G. High confidence visual recognition of persons by a test of statistical independence. IEEE Trans Pattern .Anal and Machine Intell, 1993, 15(11):1148-1161.
  • 9Campbell Jr J. Speaker recognition: A tutorial. Proceedings of IEEE, 1997, 85(9):1437-1462.
  • 10Nalwa V. Automatic online signature verification. Proceedings of IEEE. 1997, 85(2) :213 -239.

共引文献85

同被引文献27

  • 1赵新伟,李鹤林,罗金恒,霍春勇,冯耀荣.油气管道完整性管理技术及其进展[J].中国安全科学学报,2006,16(1):129-135. 被引量:99
  • 2董少华.管道完整性技术与管理[M].北京:中国石化出版社.2007.
  • 3YANG J C,SHIN J W,MIN M J,et al. Fingerprint matc-hing using global minutiae and invariant moments [ C ] //Congress on Image and Signal Processing, 2008: 599 一602.
  • 4LEE C J, WANG S D. Fingerprint feature reduction byprincipal Gabor basis function [ J ] . Pattern Recognition,2001,34:2245 -2248.
  • 5LEE C H, KIM H H. Cancelable fingerprint templates u-sing minutiae-based bit strings [ J ].Journal of Networkand Computer Applications,2010,33 (3) :236 -246.
  • 6ANDREW B J T, ALWYN G,DAVID C L N. Randommultispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs[ J] . IEEETransactions on Pattern Analysis and Machine Intelli-gence^^ ,28( 12) :1892 - 1901.
  • 7YANG S L,LNGRID Y. Automatic secure fingerprint veri-fication system based on fuzzy vault scheme [ C ] //Acous-tics, Speech, and Signal Processing, Proceedings ( IC-ASSP ’ 05 ),IEEE Interenation Conference, 2005 : 609 -612.
  • 8LIU M H, JIANG X D, KOT A C. Fingerprint reference-point detection [ C]//ICBA 2004, LNCS 3072,2004 : 272-279.
  • 9FABIAN M, MICHAEL K R, LI Q, et al. Cryptographickey generation from voice [ C ]//Security and Privacy2011 IEEE Symposium on Security and Privacy. Oakland,USA,2001:202 -213.
  • 10刘琛.基于动态口令的双向身份认证识别系统的设计与实现[D].西安:西北大学,2008.

引证文献5

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部