Font Size: a A A

Blind Identity-based Biometric Authentication Protocol Research

Posted on:2015-02-28Degree:MasterType:Thesis
Country:ChinaCandidate:Z B LuoFull Text:PDF
GTID:2298330431487303Subject:Information security
Abstract/Summary:PDF Full Text Request
Along with the development of the internet, the information on the Internet increases exponentially, the application functions become more and more complex, and the information security problem is increasingly outstanding. The information security generally includes several aspects:authentication, database security, computer virus protection, operating system security, data encryption, access control and so on. This article mainly focuses on authentication security and the identity authentication is an important part of Internet authentication security. Because the biological characteristics is unique and directly relate to individuals, also is non-repudiation and convenience, so the biological certification is considered to improve the security of authentication.This thesis studied and summarized the existing remote authentication scheme based on biological characteristics, and analyzed the safety defects in the scheme, then proposes a new blind identity authentication scheme based on biological characteristics. The scheme can effectively solve issues on user privacy, template protection and trust. The blind certification is so called because it would not give the authentication server any information by plaintext other than the user ID.The protocol would encrypt the biological data based on the asymmetric cryptographic system. It has the advantages of both biological authentication and public key cryptography system. The authentication protocol could run on the public network, and can provide can’t denial identification system.The main work and contributions are as follows:1. This thesis studies the emerging biometric encryption techniques of biometric authentication domain and introduces its emergence and development process in the introduction of this article. Then this thesis detailed introduces the most typical and representative biometric template protection methods.2. This thesis also explored the network encryption system and identity authentication technology. And based on the researches, this thesis designed a kind of blind identity authentication scheme based on biological characteristics, and starting from the security requirements of protocol, describes the protocol registration and certification process, and analyzed the security of the protocol at the same time. This thesis also puts forward an improved blind identity authentication scheme based on kernel function.On the basis of blind certification scheme, this thesis also constructed a prototype system based on palmprint identification.3. In order to improve the solution on the contradiction between fuzziness and accuracy, the prototype of palmprint used the feature extraction algorithm for the palmprint features extraction based on KFDA to improve the classification accuracy. The palmprint blind certification prototype system is divided into client and remote server, and includes user registration module and certification interface module. This thesis also expounded the network communication between the client and server, and designed a security background database, finally, tested the security of the system and function.4. Finally, this paper summarized the researches and works that has done in it, and proposed the further research direction and the system’s improvement direction.
Keywords/Search Tags:Biometrics, Identity authentication, Blind authentication, Classifier
PDF Full Text Request
Related items