Font Size: a A A

Research On Information Hiding And Authentication Based On Biometrics And Its Application

Posted on:2013-01-18Degree:DoctorType:Dissertation
Country:ChinaCandidate:D S WangFull Text:PDF
GTID:1118330374486965Subject:Information security
Abstract/Summary:PDF Full Text Request
With the vigorous development of computer network, more and more resourcesand application can be obtained, and the authorized services can be gained through theremote access to the server. How to ensure a particular resource can only be accessedand used for legitimate and authorized users, namely, how to correctly identify theuser's identity is a primary condition for ensuring communications network andsystem's data. Moreover, under the open network environment, how to verify theintegrity of biometric images, how to achieve remote authentication, how to ensure theprivacy and security of biometrics and secret data, how to ensure the copyright of digitalmedia data and so on are to attract more attention.The main study is based on biometric information hiding and authenticationscheme in the thesis, which is the complete use of biometric technology, cryptographyand information hiding technology to enable remote authentication and the serverproviding the service, and can effectively improve the security of confidential data andthe privacy of biometric data. The main contributions of this thesis are as follows:1. A biometric image integrity authentication method using the singular valuedecomposition(SVD) and fragile watermarking is proposed. According to the singularvalue decomposition theory and characteristics of fragile watermarking, a biometricimage integrity authentication method for the remote user transmitted biometric imagesis presented under the environment of network. Experimental results indicate that thefragile watermarking based on the SVD and image integrity of biometric authenticationmethod is effective, and can be used for biometric image integrity verification system.To confirm the identity of the remote user, the proposed authentication scheme can beapplied to the biometric image integrity authentication, in which, the users areresponsible for the biometric image capture and the authenticated watermark embedding,and the server which has a large processing capacity is responsible for the authenticatedwatermark extraction and verification, feature extraction and matching.2. A finger-vein recognition algorithm based on Radon transform and singularvalue decomposition is proposed. First of all, the recognition algorithm using the Radon transform extracts finger-vein image orientation information and then constructs aprojection matrix. Second, the projection matrix singular value is extracted usingsingular value decomposition as the finger vein pattern feature vector. Finally,normalized distance used to calculate the similarity. Experimental results indicate thatthe proposed recognition algorithm for finger-vein recognition is effective.3. A remote authentication and key agreement protocol based on fingerprint isproposed. The protocol used mainly the current existing fingerprint recognitionalgorithm and cryptography to gain control of the user's smart card stored secretmessage, and achieved mutual authentication between the user and the server of theproposed authentication system using cryptographic protocols, and overcome thesecurity risks of a centrally stored users' fingerprint features in the server. Meanwhile,to protect users' fingerprint features data security and privacy, users' fingerprint featuresare transmitted after users' fingerprint features are encrypted using secret keys, so ourproposed authentication protocol can overcome the security issues of traditionalauthentication and biometric identification systems and enhance the security andprivacy of authentication system in case of security threats.4. A remote mutual authentication and key agreement protocol based on bilinearpairings and finger-vein is proposed. An authentication and key agreement protocolusing the properties of bilinear pairings on super elliptic curves (i.e., calculation speedof high efficiency and security, key size, and lower bandwidth requirements) andfinger-vein recognition algorithms in a distributed network environment is mainlystudied. The security analyses show that the proposed authentication protocol isreasonable and secure, and then it enhances the security and privacy of authenticationsystem in case of security threats.5. A multi-factor authentication and key agreement protocol based biometricinformation hiding and recognition is presented. First, the basic model of biometricinformation hiding is constructed. Second, we propose a biometric information hidingbased on bi-orthogonal spline wavelet, and the robustness and validity of the proposedbiometric information hiding algorithm with suffering some attacks is proved byexperiments. Third, we also constructed a remote authentication system based oninformation hiding and recognition using biometrics, the system has higher securitycompared to traditional biometric authentication system, even the attacker who has stolen the carrier image of hidden biometrics is also difficult to judge whether whichexists hidden biometrics or not, and extract the hidden biometrics in carrier image. Soour proposed authentication system can protect users' privacy. Finally, we present amulti-factor authentication and key agreement protocol based biometric informationhiding and recognition. The proposed protocol can achieves remote authentication fullyusing the biometric information hiding, cryptography and smartcard technology, and thesecurity and function analyses indicate that the proposed protocol has not only a highdegree of security but protection of users' privacy.6. A dual watermarking technique using facial image and iris feature for thecopyright protection is presented. First we described how to generate visible facialimage watermark and invisible iris feature watermark; then an dual biometricwatermarking algorithm is described; finally, the robustness and effectiveness of theproposed watermarking algorithm by some experiments is proved, in the proposed dualwatermarking algorithm, facial image is visible watermark and can mark an owner ofdigital media image, iris feature is invisible watermark and can provides legal pursuantand ensure owner copyright of digital media image under copyright dispute, so A dualwatermarking technique using facial image and iris feature for the copyright protectioncan be more effectively prevent an illegally copied and tampered digital media image.
Keywords/Search Tags:biometrics, authentication, cryptography, information hiding, copyrightprotection
PDF Full Text Request
Related items