Font Size: a A A

Identity Verification System Using Data Hiding And Fingerprint Recognition

Posted on:2007-05-13Degree:MasterType:Thesis
Country:ChinaCandidate:D JiangFull Text:PDF
GTID:2178360182478497Subject:Pattern Recognition and Intelligent Systems
Abstract/Summary:PDF Full Text Request
This paper "Identity Verification System Using Data Hiding and Fingerprint Recognition" researches into the fundamentals, implementation and performance of the identity verification system using data hiding and fingerprint recognition. Main work is summarized as follows:1. Feasibility research of the identity verification system using data hiding and fingerprint recognition;2. Two versions of the identity verification system using data hiding and fingerprint recognition are proposed: at user's home, the client's account information is encrypted and embedded into the fingerprint image via data hiding method secretly. Then the fingerprint image with embedded data is transferred to the bank server over Internet. At bank server side, the client's account information is extracted. It is used to retrieve the client's registered fingerprint from central database, which is then matched with extracted fingerprint via fingerprint recognition method to verify user's identity. If the two fingerprints match, the user is authorized for further operation;3. Design and implement the identity verification system using integer wavelet data hiding and fingerprint recognition (LL-DHFR);4. Design and implement the identity verification system using JPEG 2000 real-time quantization watermark data hiding and fingerprint recognition (LS-DHFR);5. The performance evaluation of the identity verification system on FVC 2000 benchmark fingerprint database and database from AI Lab of Tongji University shows a good result: SHA-256 digest is adopted in LL-DHFR, so the integrity of the original fingerprint image can be ensured, and the system has a strong security advantage;JPEG 2000 lossy compression is adopted in LS-DHFR, and original fingerprint image can be compressed to 1/4-1/20 of its original size, so the amount of data to be transferred is much smaller, and the system has a better interaction performance in low bandwidth situation;6. Two versions of the identity verification system are being used in a pensiondistribution system in Northeast China.
Keywords/Search Tags:data hiding, fingerprint recognition, identity verification, lossless data hiding, integer wavelet, JPEG 2000
PDF Full Text Request
Related items