Design and Implementation of Identity Authentication System Based on Fingerprint Recognition and Cryptography

被引:0
作者
Feng Fujun [1 ]
Li Xinshe [1 ]
Wang Litao [1 ]
机构
[1] Rocket Force Univ Engn, Elementary Command Coll, Xian, Shaanxi, Peoples R China
来源
2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC) | 2016年
关键词
fingerprint recognition; cryptography; identity authentication; MD5;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A new scheme based on fingerprint recognition and cryptography technology is proposed. The scheme verifies the user's identity using the unique, reliable and stable fingerprint information, and realizes identity authentication to "person". It provides the design and implementation of user register and authentication, encrypts some important information using MD5, and realizes the double authentication, which includes username/password and fingerprint recognition. The testing results show it is more available, reliable and secure.
引用
收藏
页码:254 / 257
页数:4
相关论文
共 8 条
  • [1] Chen Hongsong, 2010, NETWORK SECURITY MAN
  • [2] Chen Li-ding, 2011, Automation & Instrumentation, V26, P60
  • [3] Hashad Fatma G., 2010, [Pattern Recognition and Image Analysis (Advances in Mathematical Theory and Applications), Pattern Recognition and Image Analysis. (Advances in Mathematical Theory and Applications)], V20, P360
  • [4] Huang HL, 2011, 2011 INTERNATIONAL CONFERENCE ON APPLIED SOCIAL SCIENCE (ICASS 2011), VOL V, P15
  • [5] A new median filter based fingerprint recognition algorithm
    Kizrak, Ayyuce M.
    Ozen, Figen
    [J]. WORLD CONFERENCE ON INFORMATION TECHNOLOGY (WCIT-2010), 2011, 3
  • [6] Li Zhenshan, 2011, NETINFO SECURITY, P12
  • [7] A multilevel structural technique for fingerprint representation and matching
    Shalaby, M. A. Wahby
    Ahmad, M. Omair
    [J]. SIGNAL PROCESSING, 2013, 93 (01) : 56 - 69
  • [8] Yan Weiwei, 2010, CHINESE COMPUTER SYS, V31, P2453