Font Size: a A A

Fingerprint Authentication' Application Research In The Network Data Exchange

Posted on:2010-01-13Degree:MasterType:Thesis
Country:ChinaCandidate:K ZhaoFull Text:PDF
GTID:2178360278481533Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Today, science and technology are more and more widespread and developed, the network occupies a pivotal position. Therefore, identity authentication and access control needs to become more and more urgent in the network to society. In this case, the fingerprint identification biometric technology as a method for the above deficiencies provided a good solution. This paper put fingerprint identification to the data exchange network based on referring to large numbers of domestic and international aspects of the basic references of fingerprint identification, and replaced the network authentication method of "user name + password". Implemented the algorithm of the fingerprint identification system for each module on PC by using Visual C + + programming .To registered users, the fingerprint information stored into the database directly, and through matching information between the client user fingerprint authentication fingerprint information and the server-side database fingerprint template to determine whether this user is alegitimate user.In the first part of this paper, introduced the fingerprint recognition technology steps including: pre-processing, refining, after processing, feature extraction, feature matching and so on. In accordance with the above steps, obtained the direction map according to the direction information of the fingerprint image, then filtered and denoised the original image by taking advantage of this direction map, this method solved the problem which appears the break and the fork in the fingerprint image .In the next step, used the different algorithms targeted to remove the various pseudo-characteristic structure of the fingerprint image after refinement one by one inaccordance with their characteristics,so obtained the clear and accurate fingerprint characteristic points, and made foundation for the next step fingerprint matching.In the last part of this paper, combinated the fingerprint identification system and the network,achived fingerprint identification system in the network'application, and described the information exchange process between the XML documents which fingerprint authentication of user information is converted and the Web Services database.First,in this paper, introduced the framework and work flow of XML and Web Service architecture, give the design for the data exchange platform system modules, and then described mapping rules from the fingerprint database to XML file. Fingerprint Identification System has provided a more reliable protection for network security, efficient and stable operation on network. At present, the fingerprint identification technology applications is still relatively small based on network, this paper has done a little research on this.Experiments show that using the fingerprint technology can protect personal'important information better than the traditional "user name + password" network authentication technology in the network. Lost and stolen information can not be easy, so that information transfer and exchange more secure and reliable.
Keywords/Search Tags:Preprocessing, Post-processing, Thinning, Data Exchange, XML, Web Services
PDF Full Text Request
Related items