Font Size: a A A

The Study Of Methods And Applications Of Fingerprint-Based Secure Authentication

Posted on:2013-08-15Degree:DoctorType:Dissertation
Country:ChinaCandidate:R L ZhangFull Text:PDF
GTID:1228330395957235Subject:Pattern Recognition and Intelligent Systems
Abstract/Summary:PDF Full Text Request
Biometric recognition technology has become a kind of identity authenticationtechnology accepted by all of us. From the most basic to the most secure technology,there exist various security branches, which are defined by different secure degrees.Biometric recognition technology is the most secure one in all of the branches. It ismuch more secure to authenticate an identity by the way of “what you are”(e.g.,fingerpring, iris, voice and so on) than “what you own”(ID card) and “what youknow”(password). Biometric identity authentication technology will ultimately changethe way of life and the model of business.In recent years, global biometric recognition technology has turned from the phaseof pure research to the phase of research and application. Particularly, after the9-11inUS, with the enforcement of security consciousness, people exhibit great interest onbiometric recognition technology, which makes expansive market potential of thistechnology. With the gradual boost of the need of identity authentication in informationsociety, the importance of biometric recognition technology will be seen in the nearfuture.However, with the application of the biometric recognition technology in adeepgoing way, its drawback and limitation is exposed gradually, in which the mostserious one is the security and privacy involved with the biometric modality. Biometricmodalities are related with people tightly. Once it is lost and used for ulterior motives bysomeone else, the identity or the account will be threatened. The security and privacyissue of biometric modality itself arise many research interests. Biometric encryptiontechnology is the emerging method to solve this kind of problems.This thesis is based on the above background and proposes several fingerprint andkey based biometric encryption technologies. And then the technologies are applied intothe field of finance, particularly this thesis designs a scheme of fingerprint bank identityauthentication system.1.Propose an improved cancelable fingerprint fuzzy vault scheme. A passwordbased minutiae changing function is constructed, and then the transformed fingerprintminutiae are used to construct the fuzzy vault system. Different systems use differentpasswords. When a vault is attacked, we can issue a new vault by changing the randomnumber. As the module operation is employed in the changing process, thus thetransformation process can be thought invertible. If the attacker can obtain the transformed minutiae, he still could not know the information of the real minutiae.Therefore, it can lower the security risk involved with the cross matching betweendifferent vaults and improve the security of the whole system.2.Propose a biometric and password based composite authentication scheme. Thisscheme can effectively makeup the limitation of authenticating identities solely bybiometrics by the way of providing password based authentication. User can provide thepassword as the necessary complementarity when he cannot provide the completebiometrics, so that the legal user can pass the authentication process.3.Design a fingerprint bank authentication scheme. This scheme is based on theabove fuzzy vault scheme and composite authentication scheme. Considering thespecific need in the financial circumstances, we design a practical and secure fingerprintbank authentication scheme. This scheme is separated into two sub-systems: fingerprintbank client authentication system and fingerprint bank inner control authenticationsystem, which aim at bank clients and bank worker, respectively. And more, thefingerprint bank client authentication system can operate in two modes: the mode basedon network application and the mode based on card application.
Keywords/Search Tags:Biometric, Biometric encryption, Fingerprint, Secure authentication, Fuzzy Vault
PDF Full Text Request
Related items