Font Size: a A A

Biometric-based Identity Authentication Scheme

Posted on:2014-01-17Degree:MasterType:Thesis
Country:ChinaCandidate:J B HuangFull Text:PDF
GTID:2248330392460930Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the popularity of the Internet and the continuous development ofthe economy in China, information security has become a key researchissue in many fields, such as online banking, e-commerce, ATM, etc.Biometric identification application is the most widely using and the mostpotential information security technology. Its study become much morethan before. With the application of biometric technology becoming more,its defects have been exposed. The main defect is the leaking privateinformation of the user who using the biometric technology. Therefore,biometric identification technology which combines biometrics andcryptography technology gets more and more attention, and becomes animportant research direction in the future information security area. Aftermore research and experiments, template protection and multi-biometricfusion encryption method is one of the hotspots of biometric encryptiontechnology.As traditional fingerprint-based identification brought a lot ofproblems such as features are sensitive to image quality, the U.S.Department of Justice launched the Next Generation Identification (NGI)project which will add the fingerprint pore information to help theidentification. However, the leaking of personal fingerprint poreinformation can make it easy to restore the fingerprint ridges. The paperpresents a Multi-biometric identity-based authentication scheme which canprotect personal private pore information. The scheme uses high-resolutionfingerprint scan device to capture fingerprint digital image with pores,aligns fingerprints by using minutiae, and binds key by using pore. Existing Fuzzy Vault scheme assumes fingerprints are pre-aligned or usesinaccurate methods to align fingerprints. The paper presents a realapplication of the Fuzzy Vault scheme and also firstly combines fingerprintlevel3information with Fuzzy Vault scheme.
Keywords/Search Tags:Fingerprint, Fingerprint pore, Fuzzy Vault, Identity-basedauthentication, Security
PDF Full Text Request
Related items