浏览全部资源
扫码关注微信
1. 武汉大学测绘遥感信息工程国家重点实验室,湖北 武汉 430079
2. 武汉大学地球空间信息技术协同创新中心,湖北 武汉 430079
[ "贾姗(1993-),女,山东莱芜人,武汉大学博士生,主要研究方向为信息安全、生物特征识别。" ]
[ "徐正全(1962-),男,湖北黄冈人,博士,武汉大学教授,主要研究方向为信息安全、隐私保护、图像处理等。" ]
[ "胡传博(1989-),男,黑龙江哈尔滨人,武汉大学博士生,主要研究方向为计算机视觉、空间信息处理。" ]
[ "王豪(1990-),男,河南驻马店人,武汉大学博士生,主要研究方向为数据挖掘、隐私保护。" ]
网络出版日期:2018-02,
纸质出版日期:2018-02-25
移动端阅览
贾姗, 徐正全, 胡传博, 等. 基于重加密的随机映射指纹模板保护方案[J]. 通信学报, 2018,39(2):122-134.
Shan JIA, Zhengquan XU, Chuanbo HU, et al. Fingerprint template protection by adopting random projection based on re-encryption[J]. Journal on communications, 2018, 39(2): 122-134.
贾姗, 徐正全, 胡传博, 等. 基于重加密的随机映射指纹模板保护方案[J]. 通信学报, 2018,39(2):122-134. DOI: 10.11959/j.issn.1000-436x.2018031.
Shan JIA, Zhengquan XU, Chuanbo HU, et al. Fingerprint template protection by adopting random projection based on re-encryption[J]. Journal on communications, 2018, 39(2): 122-134. DOI: 10.11959/j.issn.1000-436x.2018031.
针对基于随机映射(RP
random projection)的生物特征模板保护算法在模板生成和密钥管理中面临易被攻击而泄露用户隐私的问题,提出一种改进RP算法的指纹模板保护方案。首先,在随机映射的基础上,将变换域划分为相互独立的指纹特征匹配域和加噪干扰域;在子域内加噪后利用子随机映射矩阵交叉融合生成模板。同时,引入重加密机制实现对变换密钥(RP矩阵)的安全存储和传输。实验结果和分析表明,与现有的RP模板保护方法相比,所提方案具有更高的抵抗攻击能力并能保持RP算法的匹配性能和模板可撤销性。
In random projection (RP) based biometric template protection methods
the generated template and key are vulnerable to attacks
which may cause the leakage of users’ privacy.To solve this problem
an improved RP-based fingerprint template protection method was proposed.First
based on the RP result
the proposed method divided the projection domain into fingerprint matching domain and noise adding domain that were mutually independent
then fused them with two sub-matrices of the random projection matrix and saved the result as template.In addition
re-encryption mechanism was introduced to realize secure storage and transmission of the key (RP matrix).Experimental results show that the proposed method can achieve stronger ability to resist different attacks than existing RP-based biometric template protection methods
and also guarantee high matching accuracy and revocation.
CAVOUKIAN A , STOIANOV A . Biometric encryption [M ] . Boston,USA : Springer US , 2011 : 90 - 98 .
NAGAR A . Biometric template security [M ] . Switzerland : Springer International Publishing , 2012 .
SANDHYA M , PRASAD M V N K . Biometric template protection:a systematic literature review of approaches and modalities [M ] // Biometric Security and Privacy . Springer International Publishing , 2017 : 323 - 370 .
SANDHYA M , PRASAD M V N K , CHILLARIGE R R . Generating cancellable fingerprint templates based on Delaunay triangle feature set construction [J ] . IET Biometrics , 2016 , 5 ( 2 ): 131 - 139 .
CAVOUKIAN A , SNIJDER M , STOIANOV A , et al . Privacy and biometrics for authentication purposes:a discussion of untraceable biometrics and biometric encryption [M ] // Ethics and Policy of Biometrics . Springer Berlin Heidelberg , 2010 : 14 - 22 .
BOULGOURIS N V , PLATANIOTIS K N MICHELI-TZANAKOU E . Biometric encryption:the new breed of untraceable biometrics [M ] . Biometrics:Theory,Methods,and Applications.John Wiley & Sons,Inc . 2009 : 655 - 718 .
ACHLIOPTAS D , . Database-friendly random projections [C ] // The 12th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Data Base Systems . 2001 : 274 - 281 .
NGO D C L , TEOH A B J , GOH A . Biometric hash:high-confidence face recognition [J ] . IEEE Transactions on Circuits and Systems for Video Technology , 2006 , 16 ( 6 ): 771 - 775 .
JIN Z , GOI B M , TEOH A , et al . A two-dimensional random projected minutiae vicinity decomposition-based cancellable fingerprint template [J ] . Security and Communication Networks , 2014 , 7 ( 11 ): 1691 - 1701 .
TEOH A B J , YUANG C T . Cancelable biometrics realization with multispace random projections [J ] . IEEE Transactions on Systems,Man,and Cybernetics,Part B (Cybernetics) , 2007 , 37 ( 5 ): 1096 - 1106 .
WANG Y , PLATANIOTIS K N . An analysis of random projection for changeable and privacy-preserving biometric verification [J ] . IEEE Transactions on Systems,Man,and Cybernetics,Part B (Cybernetics) , 2010 , 40 ( 5 ): 1280 - 1293 .
KHAN S H , AKBAR M A , SHAHZAD F , et al . Secure biometric template generation for multi-factor authentication [J ] . Pattern Recognition , 2015 , 48 ( 2 ): 458 - 472 .
YANG B , HARTUNG D , SIMOENS K , et al . Dynamic random projection for biometric template protection [C ] // 2010 Fourth IEEE International Conference on Biometrics:Theory Applications and Systems (BTAS) . IEEE , 2010 : 1 - 7 .
ANZAKU E T , SOHN H , RO Y M . Multi-factor authentication using fingerprints and user-specific random projection [C ] // 2010 12th International Asia-Pacific Web Conference (APWEB) . 2010 : 415 - 418 .
PATEL V M , RATHA N K , CHELLAPPA R . Cancelable biometrics:a review [J ] . IEEE Signal Processing Magazine , 2015 , 32 ( 5 ): 54 - 65 .
张宁 , 臧亚丽 , 田捷 . 生物特征与密码技术的融合—一种新的安全身份认证方案 [J ] . 密码学报 , 2015 , 2 ( 2 ): 159 - 176 .
ZHANG N , ZANG Y L , TIAN J . The integration of biometrics and cryptography-a new solution for secure identity authentication [J ] . Journal of Cryptologic Research , 2015 , 2 ( 2 ): 159 - 176 .
DASGUPTA S , GUPTA A . An elementary proof of the Johnson-Lindenstrauss lemma [J ] . International Computer Science Institute,Technical Report , 1999 , 22 ( 1 ): 1 - 5 .
FRANKL P , MAEHARA H . The Johnson-Lindenstrauss lemma and the sphericity of some graphs [J ] . Journal of Combinatorial Theory,Series B , 1988 , 44 ( 3 ): 355 - 362 .
JASSIM S,AL-ASSAM H , SELLAHEWA H . Improving performance and security of biometrics using efficient and stable random projection techniques [C ] // 6th International Symposium on Image and Signal Processing and Analysis . 2009 : 556 - 561 .
ARRIAGA R I , VEMPALA S . An algorithmic theory of learning:Robust concepts and random projection [C ] // 40th Annual Symposium on Foundations of Computer Science . 1999 : 616 - 623 .
BLAZE M , BLEUMER G , STRAUSS M . Divertible protocols and atomic proxy cryptography [J ] . Advances in CryptologyEUROCRYPT'98 , 1998 : 127 - 144 .
AHMED M , HOSSAIN M A . Cloud computing and security issues in the cloud [J ] . International Journal of Network Security & Its Applications , 2014 , 6 ( 1 ): 25 .
LIU S , HU S , WENG J , et al . A novel asymmetric three-party based authentication scheme in wearable devices environment [J ] . Journal of Network and Computer Applications , 2016 , 60 : 144 - 154 .
PIRKER M , SLAMANIG D . A framework for privacy-preserving mobile payment on security enhanced arm TrustZone platforms [C ] // 2012 IEEE 11th International Conference on Trust,Security and Privacy in Computing and Communications (TrustCom) . 2012 : 1155 - 1160 .
周阿转 , 俞一彪 . 采用特征空间随机映射的鲁棒性语音识别 [J ] . 计算机应用 , 2012 , 32 ( 07 ): 2070 - 2073 .
ZHOU A Z , YU Y B . Robust speech recognition by adopting random projection in feature space [J ] . Journal of Computer Applications , 2012 , 32 ( 07 ): 2070 - 2073 .
ATENIESE G , FU K , GREEN M , et al . Improved proxy re-encryption schemes with applications to secure distributed storage [J ] . ACM Transactions on Information and System Security (TISSEC) , 2006 , 9 ( 1 ): 1 - 30 .
XU Z , XIONG L , XU Y . On the provably secure CEW based on orthogonal decomposition [J ] . Signal Processing:Image Communication , 2014 , 29 ( 5 ): 607 - 617 .
MAIO D , MALTONI D , CAPPELLI R , et al . FVC2000:fingerprint verification competition [J ] . IEEE Transactions on Pattern Analysis and Machine Intelligence , 2002 , 24 ( 3 ): 402 - 412 .
JAIN A K , PRABHAKAR S , HONG L , et al . Filterbank-based fingerprint matching [J ] . IEEE transactions on Image Processing , 2000 , 9 ( 5 ): 846 - 859 .
张玉清 , 王晓菲 , 刘雪峰 , 等 . 云计算环境安全综述 [J ] . 软件学报 , 2016 , 27 ( 6 ): 1328 - 1348 .
ZHANG Y Q , WANG X F , LIU X F , et al . Survey on cloud computing security [J ] . Journal of Software , 2016 , 27 ( 6 ): 1328 - 1348 .
0
浏览量
1864
下载量
1
CSCD
关联资源
相关文章
相关作者
相关机构