A Cancelable Fuzzy Vault Algorithm Based on Transformed Fingerprint Features

来源 :Chinese Journal of Electronics | 被引量 : 0次 | 上传用户:fijihi
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Juels and Sudan proposed in 2002 an algorithm for computing a fuzzy vault that binds a user’s biometric template with his secret.It was suggested that this vault could be used to securely store one’s secret or a cryptographic key without losing his biometric information.However,in this classical fuzzy vault,if an attacker captures multiple vaults generated from one biometric template,he is able to obtain some biometric template information by cross-matching,and then he can use it to illegally recover the secret message.To overcome this disadvantage,in this paper,a cancelable fuzzy vault algorithm is proposed based on the user’s transformed fingerprint features which are used to generate a fuzzy vault.Our novel fuzzy vault is secure and can overcome the cross-matching attack without intensive computational complexity.Also,the use of three check values makes our vault have a much higher probability to detect a false query fingerprint template than some other vault versions,and it will highly improve the probability whether the reconstructed polynomial is correct or not. Juels and Sudan proposed in 2002 an algorithm for computing a fuzzy vault that binds a user’s biometric template with his secret. It was suggested that this vault could be used to securely store one’s secret or a cryptographic key without losing his biometric information. Still, in this classical fuzzy vault, if an attacker captures multiple vaults generated from one biometric template, he is able to obtain some biometric template information by cross-matching, and then he can use it to illegally recover the secret message. To overcome this disadvantage, in this paper, a cancelable fuzzy vault algorithm is proposed based on the user’s transformed fingerprint features which are used to generate a fuzzy vault. Our novel fuzzy vault is secure and can overcome the cross-matching attack without intensive computational complexity. Also, the use of three check values ​​makes our vault have a much higher probability to detect a false query fingerprint template than some other vault versions, and it will hi ghly improve the probability whether the reconstructed polynomial is correct or not.
其他文献
期刊
目的研究α-生育酚(α-tocopherol, α-T)对亚硝胺诱导人食管上皮细胞癌变早期NFκB和Nrf2信号通路的调节作用。方法采用N-甲基苄基亚硝胺(N-nitrosomethylbenzylamine, NMBzA)染毒人正常食管上皮细胞(HET-1A)模拟食管癌变启动,染毒浓度为50、100 μmol/L,染毒时间为24 h。α-T干预组细胞在染毒前3 h加入25、50、100 μmol
1 漂白原理  过氧化氢显弱酸性 ,按下式离解 :H2 O2 H+ +HO2 -  HO- 2 离子具有漂白作用。该反应在 60℃的电离常数K为 9×10 - 1 2 。在中性和弱酸性介质中HO- 2 离子浓度很低 ,
As a meta-heuristic approach,Ant colony optimization(ACO) has many applications.In the algorithm selection of pheromone models is the top priority.Selecting phe
思想政治工作是宣传思想领域的基础工作,面对时代赋予的重大使命,只有用科学发展来统领思想政治工作,以改革创新的精神来推动思想政治工作,才能更加自觉、更加主动地推进思想政治工作的创新。同时,思想政治工作也才能更好地体现时代性,把握规律性,富有创造性,以适应国际背景和国内发展的新形势。因此,思想政治工作者应转变观念,提高认识,加快思想政治工作的改革与创新。这既是时代发展给我们提出的客观要求和迫切任务,也
今年是2014年,即距离辛亥革命的发生已经有100多年的历史。对于任何一个历史事件,我个人认为必须要正确的评价它,客观,公正,辨证的看待它。辛亥革命已经过去100年了,人们对它的评价还是比较客观,诚恳和真实的。  辛亥革命,指的是自1911年10月10日(农历八月十九)夜武昌起义爆发,至1912年元旦孙中山就职中华民国临时大总统前后这一段时间中国所发生的革命事件。可以说,辛亥革命在亚洲打响了民主的
该文从挂篮荷载计算、施工流程、支座及临时固结施工、挂篮安装及试验、合拢段施工、模板制作安装、钢筋安装、混凝土的浇筑及养生、测量监控等方面人手,介绍了S226海滨大桥
目的 检测人前列腺癌细胞(PC-3M)中Omi/HtrA2的表达情况,并构建其小干扰RNA(siRNA)表达载体,探讨Omi/HtrA2对PC-3M凋亡的影响.方法以细胞免疫组织化学和逆转录-聚合酶链反应(RT-PCR)法检测Omi/HtrA2在前列腺癌细胞系(PC-3M)和正常前列腺细胞中的表达.利用软件辅助设计Omi/HtrA2特异性siRNA序列,体外合成后将其克隆入真核表达载体psiRNA
暨第八届中国国际无损检测技术及设备展览会第八届中国国际物理测试与材料试验机展览会第八届中国国际分析仪器与实验室设备展览会本届展会将集中展出当令世界最先进的测试仪
随着信息技术的飞速发展,为不断提高学校的办学质量,更好的为基层部队输送合格人才,采用传统的教学方法已不能满足当前部队教育发展的实际需求。把现代信息技术与教学改革两者结合起来,我们将丰富教学手段、拓宽教学模式、改善教学评价、提升教学管理、推动课程建设,改革传统教学以适应新的教学需求,更为有效地组织好教学,取得教学效果,对提高人才培养质量具有良好的推动作用。