Font Size: a A A

Research On Palmprint Image Compression, Encryption And Secure Authentication

Posted on:2011-07-05Degree:DoctorType:Dissertation
Country:ChinaCandidate:H J LiFull Text:PDF
GTID:1118360305457838Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
As the rapid development of information and network technology, information security has become increasingly important. Compared with other biometric traits, palmprint has the advantages of large palm area for feature extraction, the simplicity of data collection and high user acceptability. Therefore, palmprint recognition has attracted a lot of researchers' attention both home and abroad.However, the palmprint authentication system itself has inherent security threats, such as biological images and the template does not have the secret of openness (Uusually, the biometric recognition algorithms are public), and there is very little study of the domestic and foreign concerns.In this paper, foucsing on the security technology of palmprint authentication, the image compression on recognition performance impact is investigated, and furthermore the conclusions are employed to conduct a technical reference on how to choose image compression methods for both loss and lossless palmprint image compression. Specific tasks are as follows:In chapter 1, a systematic analysis of palmprint image compression, encryption and palmprint template protections has been described.In chapter 2, the evaluation of security palmprint authentication system is given and the possibility of using chaotic cryptography to protect palmprint template is analyzed. Nonlinear Dynamics Filter has a very good security and characters for implementing in parallel. The nonlinear dynamic filter and its variations are given in the following applications:an efficient stream cipher design, as well as the secure arithmetic coding and Exp-colomb coding applications. Compared with the original stream ciphers, secure Exp-colomb coding method has a high coding efficiency and security arithmetic coding can easily lead to error propagation, which has a high safety.In chapter 3, lossless palmprint images compression of the secure storage problems are studied. First of all analysis and test popular lossless image compression algorithms, including those based on transformation (integer achieved JPEG and JPEG2000, as well as the SP-based transform coding method), based on predictive lossless compression algorithms (LJPEG, CALIC and JPEG-LS), dictionary-based compression methods (png and UHA). By testing, analysis and comparison, the JPEG-LS is suitable for lossless palmprint image compression is pointed out for its compression efficiency and speed. Combined with existing secure Exp-colomb encoding algorithm, a secure image scheme based on JPEG-LS is proposed. The encryption algorithm is the image obtained with the incomprehensible nature of the encryption with high efficiency and security.In chapter 4, the impact of using different lossy compression algorithms on the matching accuracy of palmprint recognition systems is investigated, including the the image transform, quantization strategies and coding methods employed in the compression process. Further, through the tests conducted on one of the state-of-the-art palmprint recognition algorithms-CompCode, the image compression on the impact of the palmprint recognition performance is discussed detailly and stated. In addition to that we have found PSNR to be not at all suited to predict the recognition performance in iris recognition systems. For high compression rates>15, the DWT-based compression methods such JPEG2000, SPIHT are well suited to be employed in iris recognition systems. In contrary, the JPEG shows an exciting results/performance.In chapter 5, to represent the highresolution palmprint image with rich orientational texture more effectively, we use directional filter banks to decompose the subbnad of Dual-tree Discrete Wavelet Transform for more and flexible orientations.Experiments show that the proposed scheme provides high efficient representations for palmprint images. Secure storage problems of the high-resolution palmprint images in the context of lossy compression are studied. Using of efficient SPIHT coding, combined with secure arithmetic coding, a scalable palmprint image encryption algorithm is proposed. The adavantage of secure arithmetic coding in the last stage is that even without changing the image coding framework, the provision of security features is very easy to extend, as well as ease of hardware extensions.In chapter 6, to address cross-matching and palmprints template case can not be removed and updated in the token-stolen case, a certified encryption domain matching of dual-factor authentication scheme is presented. Compared with the original palmprint templates, the cancelable ones can strengthen he discriminatory power of palmprints from different hands by increasing the inter-class divergence of different palms more effectively while maintaining the intra-class distance among palmprints of the same hands. At last, the matching stage is directly performed on the encryption domain in parallel to accelerate matching and to protect user's privacy. The final score is obtained by fusing the different directional matching scores via a SUM rule, in which not only is the speed accelerated, but the performance is improved as well.
Keywords/Search Tags:information security, palmprint authentication, palmprint image protection, palmprint feature template protection, chaotic cryptography, directional filter bank
PDF Full Text Request
Related items