版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
1、With the large-scale proliferation of biometrics-based personal authenticationsystems, its security and privacy concerns have emerged as a hot research issue. A lotof researches have been conducted on the pattern recogni
2、tion area of biometrics regime,unfortunately; the critical security and privacy issues to attain the reliable andtrustworthy identity authentication are being ignored. A biometrics system, even withsignificant recognitio
3、n performance, is only universally acceptable if it is secure,reliable, robust against attacks and threats, and protects a user's privacy in efficientmanner. To overcome the biometrics security challenges and to all
4、eviate the biometricsprivacy issues, in this thesis, we investigate the methods and techniques aiming atthwarting the aforementioned problems inherent in biometrics systems. For the secure transmission of biometrics
5、 data over insecure network channel, twodifferent modes of data hiding schemes are proposed. The first method, which isimage-based hidden transmission of biometrics template, hides the biometric data intoa group of diffe
6、rent images. Secret keys are generated by the biometric image andencryption is applied on the biometric templates before hiding into the host images.Decoding performance of hidden templates is encouraging and outperforms
7、 in the caseof transmission attacks on the cover image. The second proposed method is an audiosignal-based covert-transmission scheme of biometric templates, in which we used anovel chaos and NDFT-based template hiding s
8、cheme, and proved that the combinationof encryption, encoding, modulation, and data hiding of biometric template in audiosignal could not affect the identification performance of the biometric recognitionsystem. The biom
9、etric data extraction performance of the system is efficiently capableof identifying a person without stringent compromise of matching accuracy. To obstruct the non-liveness and retransmission issues of biometrics i
10、mages, achallenge/response-based biometrics image scrambling system and method is proposed.In contrast to general challenge/response systems, which issue challenges to the user,our scheme is based on a novel architecture
11、 of intelligent biometrics sensor that hascomputational power to receive challenges from the authentication server and generateresponse to the challenge with the encrypted biometric image. The encryption anddecryption pe
12、rformance of the proposed system is encouraging to use in the real-timesystems of biometrics image transmission. In order to strengthen the privacy of biometrics data, an efficient and tokenlesstechnique is presente
13、d. Firstly, this scheme extracts features from the capturedbiometrics face images to generate the face feature vector and then, pseudorandomnumbers without using the tokens e.g. USB or smart card are generated, which can
14、 becombined with the face feature set to attain a binary FaceHash code. This schemeeliminates the fear of using biometrics for the cross matching applications, andprovides a remedy for non-revocable biometrics data.
15、 Finally, an efficient and practical chaotic hash-based fingerprint biometric remoteuser authentication scheme on mobile devices, e.g. cell phone and PDA, is investigated.This scheme is completely based on one-way collis
16、ion free chaotic hash functions, anddoes not maintain password tables and biometrics database on the remote server.Furthermore, users can choose their passwords freely and change or update themsecurely whenever they want
17、. This scheme is encouraging and better than using thelarge exponential functions or discrete logarithm problems on mobile devices, becauseof their low computational power and speed. Hence, the contribution of this
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 眾賞文庫僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- Security Analysis of Industrial Control Systems.pdf
- security and privacy in cyber-physical systems foundations, principles, and applications
- Research on Intelligent Control for Marine Power Systems.pdf
- The Research on Reduction of Peak-to-Average Power Ratio of Ofdm Systems.pdf
- Research on Technical Characteristics of Impulse-based UWB radio systems.pdf
- Improving Security Using a Biometrics Approach and Encryption.pdf
- Methods for Enhancing E-Commerce Security.pdf
- Comparative Financial Systems.pdf
- consumer perceptions of privacy and security risks for online shopping
- On Lie Triple Systems.pdf
- Comparative Financial Systems.pdf
- cloud computing and network security research
- The Analysis for Regenerative Braking Systems.pdf
- Development of Automated Fixture Planning Systems.pdf
- 2018版-opportunistic networks mobility models, protocols, security, and privacy
- Adaptive Control of Nonlinear Switched Systems.pdf
- Power Electronics in Wind Turbine Systems.pdf
- Development of Automated Fixture Planning Systems.pdf
- Estimates of the Operational Reliability of Fire Protection Systems.pdf
- Study on Channel Estimation Methods in Ofdm Systems.pdf
評(píng)論
0/150
提交評(píng)論