A Fingerprint Encryption Scheme Based on Irreversible Function and Secure Authentication

被引:2
作者
Yang, Yijun [1 ]
Yu, Jianping [1 ]
Zhang, Peng [1 ]
Wang, Shulan [1 ]
机构
[1] Shenzhen Univ, ATR Key Lab Natl Def Technol, Shenzhen 518060, Peoples R China
关键词
Cryptography; -; Authentication;
D O I
10.1155/2015/673867
中图分类号
Q [生物科学];
学科分类号
07 ; 0710 ; 09 ;
摘要
A fingerprint encryption scheme based on irreversible function has been designed in this paper. Since the fingerprint template includes almost the entire information of users' fingerprints, the personal authentication can be determined only by the fingerprint features. This paper proposes an irreversible transforming function (using the improved SHA1 algorithm) to transformthe original minutiae which are extracted from the thinned fingerprint image. Then, Chinese remainder theorem is used to obtain the biokey from the integration of the transformed minutiae and the private key. The result shows that the scheme has better performance on security and efficiency comparing with other irreversible function schemes.
引用
收藏
页数:10
相关论文
共 13 条
[1]  
[Anonymous], P COMP VIS PATT REC
[2]  
Caixia Q., 2011, B SCI TECHNOLOGY, V27, P282
[3]   On a mathematical model of immune competition [J].
Cattani, C. ;
Ciancio, A. ;
Lods, B. .
APPLIED MATHEMATICS LETTERS, 2006, 19 (07) :678-683
[4]   On the Fractal Geometry of DNA by the Binary Image Analysis [J].
Cattani, Carlo ;
Pierro, Gaetano .
BULLETIN OF MATHEMATICAL BIOLOGY, 2013, 75 (09) :1544-1570
[5]  
Clancy T.C., 2003, P 2003 ACM SIGMM WOR, P45
[6]   A fuzzy vault scheme [J].
Juels, A ;
Sudan, M .
ISIT: 2002 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2002, :408-408
[7]   Power Spectrum of Generalized Fractional Gaussian Noise [J].
Li, Ming .
ADVANCES IN MATHEMATICAL PHYSICS, 2013, 2013
[8]   A Class of Negatively Fractal Dimensional Gaussian Random Functions [J].
Li, Ming .
MATHEMATICAL PROBLEMS IN ENGINEERING, 2011, 2011
[9]   Power spectrum of generalized Cauchy process [J].
Li, Ming ;
Lim, S. C. .
TELECOMMUNICATION SYSTEMS, 2010, 43 (3-4) :219-222
[10]   Fingerprint-based fuzzy vault: Implementation and performance [J].
Nandakumar, Karthik ;
Jain, Anil K. ;
Pankanti, Sharath .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2007, 2 (04) :744-757