全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

基于二进制加密电路的无预对齐指纹匹配

DOI: 10.13190/j.jbupt.2014.06.017, PP. 81-85

Keywords: 加密二进制电路,隐私保护,无对齐,指纹匹配

Full-Text   Cite this paper   Add to My Lib

Abstract:

针对在加密域中进行指纹匹配时指纹模板和现场样本整体对齐的困难性,提出了一种免对齐的指纹匹配方案.采用具有旋转和平移不变性的细节点纹线方向特征和细节点局部结构,设计实现了相应的加密二进制电路,使得服务器能验证用户指纹,而不会泄露各自的数据.实验结果表明,所提方案在FVC2002-DB2指纹库上具有较高的匹配精度.

References

[1]  Rappe D K. Homomorphic cryptosystems and their applications [D]. Dortmund, Germany: University of Dortmund, 2004.
[2]  Lindell Y, Pinkas B. A proof of Yao's protocol for secure two-party computation [J]. Journal of Cryptology, 2009, 22(2): 161-188.
[3]  Huang Yan, Malka L, Evans D, et al. Efficient privacy-preserving biometric identification [C]//18th Network and Distributed System Security Conference, San Diego, California: Internet Society, 2011: 6-9.
[4]  冯全, 杨梅, 康立军, 等. 基于二进制加密电路的指纹细节点匹配 [J]. 四川大学学报: 工程科学版, 2013, 45(2): 75-80. Feng Quan, Yang Mei, Kang Lijun, et al. Minutiae matching based on garbled circuits [J]. Journal of Sichuan University: Engineering Science Edition, 2013, 45(2): 75-80.
[5]  Nandakumar K, Jain A K, Pankanti S. Fingerprint-based fuzzy vault: implementation and performance [J]. IEEE Trans. on Information Forensics and Security, 2007, 2(4): 744-757.
[6]  Tico M, Kuosmanen P. Fingerprint matching using an orientation-based minutia descriptor [J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2003, 25(8): 1009-1014.
[7]  Kisel A, Kochetkov A, Kranauskas J. Fingerprint minutiae matching without global alignment using local structures [J]. INFORMATICA, 2008, 19(1): 31-44.
[8]  Naor M, Pinkas B. Efficient oblivious transfer protocols [C]//Twelfth Annual ACM-SIAM Symposium On Discrete Algorithms (SODA), Washinton DC, Association for Computing Machinery, Inc., 2001: 448-457.
[9]  Kolesnikov V, Sadeghi A, Schneider T. Improved garbled circuit building blocks and applications to auctions and computing minima[C]//8th International Conference on CANS'09, Kanazawa, Japan: Springer, 2009: 1-20.
[10]  Huang Yan, Evans D, Katz J, et al. Faster secure two-party computation using garbled circuits [C]//20th USENIX Security Symposium, San Francisco, California: USENIX Association, 2011: 1-16.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133