Font Size: a A A

Design And Implementation On Network Identity Verification System Based On Information Hiding And Fingerprint Recognition

Posted on:2012-06-07Degree:MasterType:Thesis
Country:ChinaCandidate:J LuoFull Text:PDF
GTID:2218330371452123Subject:Software engineering
Abstract/Summary:PDF Full Text Request
During the prevalence of the internet in our society, the security problem is becoming more important. Identity verification system is the first protection for the security of the internet information system. it works as an un-substitutable element and is an important research field in information era.The fingerprint recognition and information hiding technology are introduced in detail. Then the identity verification and some kinds of frequently used identity authentication methods are reviewed, their characteristics and drawbacks are also analyzed. The feasibility research of the identity verification by using fingerprint recognition and information hiding is verified. This identity verification method uses the unique, non-variable and durable characteristics of the identities'fingerprint. Then a network identity verification system based on information hiding and fingerprint recognition is proposed. The details of this paper are as follows:1. A kind of network identity verification system based on information hiding and fingerprint recognition is proposed: The client acquire the user's fingerprint image, then the user's ID information is embedded into the fingerprint image by using the designed information hiding algorithm, the carrier image withhold user's ID information is transmitted to the server. The server part retrieves the user's ID information using the detection algorithm, and then searches the center fingerprint database to get the user's fingerprint pattern. After the fingerprint recognition step, the system can verify this user's real identity;2. To overcome the slow network environment problem, an improved real-time quantization information hiding algorithm based on JPEG2000 loss compression is proposed.3. The realized system is tested under some situations.
Keywords/Search Tags:information hiding, identity verification system, fingerprint recognition
PDF Full Text Request
Related items