首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到18条相似文献,搜索用时 171 毫秒
1.
为了有效改进掌纹模板生成算法的识别率和安全性等性能,提出一种基于安全概略的可撤销掌纹模板生成算法。首先提取掌纹图像不同方向、不同尺度的Gabor幅值特征,并通过主成分分析(PCA)算法对其进行降维;然后将加密后的特征向量与BCH码异或融合,得到基于安全概略的可撤销掌纹模板。对比实验表明,该算法具有良好的识别性能,能较好地满足可撤销性、多样性和不可逆性,即便在单密钥丢失的情况下,也具有较高的识别率。  相似文献   

2.
为了实现对用户生物特征信息的有效保护,提高掌纹身份认证系统的安全性,提出一种掌纹可撤销模板生成方法。首先通过Gabor滤波器获得掌纹数据不同方向、不同尺度的幅值特征,对其提取局部均匀模式LBP特征,然后将二值化的特征直方图序列使用Bloom滤波器进行多对一映射,最后进行不可逆变换,得到可撤销掌纹模板。理论分析和实验结果表明,该方法不仅可以有效保护掌纹特征,而且在密钥丢失时,也具有较高的识别率。  相似文献   

3.
将令牌化随机数作为外部因子的双因子可撤销生物特征认证方法存在令牌泄露、丢失等安全威胁. 本文提出了一种生物特征作为唯一输入的解决方法, 即单因子的可撤销生物特征认证方法. 首先, 利用扩展的特征向量, 通过预定义的滑动窗口和哈希函数随机化生成二进制种子; 然后替换不同的辅助数据来生成可撤销模板; 最后, 由查询生物特征向量对辅助数据进行解码, 提高了性能和安全性. 在指纹数据库FVC2002和FVC2004的实验结果表明, 该方法不仅满足可撤销生物特征识别的4个设计标准, 同时防御了3种安全攻击.  相似文献   

4.
掌纹识别作为一种新兴的生物识别技术近年来得到了广泛研究.鉴于毯子 维(Blanket dimension, BD)的多分辨率特性和掌纹纹理的方向性,本文对比分析了普通毯子维、水平方向扩张 毯子维和垂直方向扩张毯子维对掌纹分形特征的表达性能,提出并研究了一种基于水平扩张 毯子维的掌纹识别新算法.本文算法在香港理工大学掌纹数据库(版本2)进行了实验,实验结 果表明,水平扩张毯子维可以很好地提取掌纹特征,获得的识别率可达99.9%,识别时间 小于287ms,可满足在线掌纹识别.  相似文献   

5.
研究掌纹准确识别问题,由于光照强度、位置移动、采集设备等影响,采集掌纹图像的分辨率较低。单一掌纹特征提取方法难以全面描述掌纹信息,导致掌纹识别率低。为了提高了掌纹识别率,提出一种基于Gabor滤波和LBP算法相融合的掌纹识别方法。首先对采集掌纹进行预处理,然后分别采用Gabor滤波和LBP算法进行特征提取,最后采用神经网络建立掌纹识别器。仿真结果表明,相对于单一特征提取算法,融合特征算法不仅提高了掌纹识别率,同时加快掌纹识别速度,能够很好满足实时掌纹识别系统的要求。  相似文献   

6.
提出了一种有效的基于多模式生物特征识别的嵌入式身份验证系统,介绍了系统的流程和硬件组成,以及虹膜和掌纹两种生物特征的融合算法及其优化.该算法在图像层对虹膜和掌纹两种生物特征图像进行融合,既融合了两种模式的生物特征信息,又有效地减小了特征模版的大小,与其他传统的生物特征识别算法相比,该算法低运算复杂度的特点使其很适合在嵌入式系统实现.实验结果表明,该多模式生物特征识别身份验证系统准确、有效、安全.  相似文献   

7.
掌纹识别作为一种重要的生物特征识别方法,其中的一个重要环节就是掌纹特征的提取,本文提出了一种基于实数形式离散Gabor变换的掌纹特征提取方法,将空域的掌纹图像变换到联合(时间)空间频率域并将其联合(时间)空间频率域的能量分布作为掌纹的特征,以此为基础分别使用欧式距离和支持向量机进行了不同掌纹的匹配识别。实验结果表明,该算法对掌纹图像小的平移、小角度的旋转和小的手掌伸缩具有鲁棒性,并且获得了较高的识别率。  相似文献   

8.
赵欣  欧剑 《测控技术》2015,34(9):38-41
针对采用分形维数作为特征描述掌纹信息不准确的问题,对差分盒子维进行改进提高特征区分性.此外,由于采用单一的特征不足以描述掌纹纹理,引入Gabor变换,提出一种基于Gabor变换与改进差分盒子维(GIDBC,Gabor improved differential box counting)相结合的掌纹识别算法.通过在PolyU掌纹图像库上实验,与传统高性能算法比较,本算法识别率最高可达到99.78%,表明了本文方法的有效性,同时特征提取与匹配时间为338 ms,满足实时性要求.  相似文献   

9.
一种用于掌纹识别的线特征表示和匹配方法   总被引:11,自引:0,他引:11       下载免费PDF全文
作为一种较新的生物特征,掌纹可用来进行人的身份识别.在用于身份识别的诸多特征中,掌纹线,包括主线和皱褶,是最重要的特征之一.本文为掌纹识别提出一种有效的掌纹线特征的表示和匹配方法,该方法定义了一个矢量来表示一个掌纹上的线特征,该矢量称为线特征矢量(1ine feature vector,简称LFV).线特征矢量是用掌纹线上各点的梯度大小和方向来构造的.该矢量不但含有掌纹线的结构信息,而且还含有这些线的强度信息,因而,线特征矢量不但能区分具有不同线结构的掌纹,同时也能区分那些具有相似的线结构但各线强度分布不同的掌纹.在掌纹匹配阶段,用互相关系数来衡量不同线特征矢量的相似性.实验表明,LFV方法无论是在速度、精度,还是在存储量方面都能满足联机生物识别的要求.  相似文献   

10.
针对掌纹在非接触采集时易出现模糊现象从而导致系统识别性能降低的问题,建立了区域到点的特征映射模型,提出了一种基于区域特征映射(Region feature map, RFM)的模糊掌纹识别方法.首先根据图像的模糊原理,建立等价的模糊模型,获取模糊掌纹; 然后使用RFM对模糊掌纹进行操作,将高维的区域特征映射到低维的点特征; 最后,采用归一化相关性分类器对掌纹所属类别进行判定识别.使用模糊模型对PolyU掌纹库进行处理得到PolyU模糊掌纹库,并分别在PolyU掌纹库和PolyU模糊掌纹库上进行测试,识别结果较为稳定. 在模糊掌纹库上,本文算法的等错误率(Equal error rate, EER)最小可达0.9069%,优于传统算法,且进行一次识别的时间为33.95ms,得到的特征数据维数较小,降低了算法复杂度,表明了本文算法的有效性和实时性.  相似文献   

11.
Biometric cryptosystems and cancelable biometrics are both practical and promising schemes to enhance the security and privacy of biometric systems. Though a number of bio-crypto algorithms have been proposed, they have limited practical applicability because they lack of cancelability. Since biometrics are immutable, the users whose biometrics are stolen cannot use bio-crypto systems anymore. Cancelable biometric schemes are of cancelability; however, they are difficult to compromise the conflicts between the security and performance. By embedded a novel cancelable palmprint template, namely “two dimensional (2D) Palmprint Phasor”, the proposed palmprint cryptosystem overcomes the lack of cancelability in existing biometric cryptosystems. Besides, the authentication performance is enhanced when users have different tokens/keys. Furthermore, we develop a novel dual-key-binding cancelable palmprint cryptosystem to enhance the security and privacy of palmprint biometric. 2D Palmprint Phasor template is scrambled by the scrambling transformation based on the chaotic sequence that is generated by both the user's token/key and strong key extracted from palmprint. Dual-key-binding scrambling not only has more robustness to resist against chosen plain text attack, but also enhances the secure requirement of non-invertibility. 2D Palmprint Phasor algorithm and dual-key-binding scrambling both increase the difficulty of adversary's statistical analysis. The experimental results and security analysis confirm the efficiency of the proposed scheme.  相似文献   

12.
Cancellable biometrics is the solution for the trade-off between two concepts: Biometrics for Security and Security for Biometrics. The cancelable template is stored in the authentication system’s database rather than the original biometric data. In case of the database is compromised, it is easy for the template to be canceled and regenerated from the same biometric data. Recoverability of the cancelable template comes from the diversity of the cancelable transformation parameters (cancelable key). Therefore, the cancelable key must be secret to be used in the system authentication process as a second authentication factor in conjunction with the biometric data. The main contribution of this paper is to tackle the risks of stolen/lost/shared cancelable keys by using biometric trait (in different feature domains) as the only authentication factor, in addition to achieving good performance with high security. The standard Generative Adversarial Network (GAN) is proposed as an encryption tool that needs the cancelable key during the training phase, and the testing phase depends only on the biometric trait. Additionally, random projection transformation is employed to increase the proposed system’s security and performance. The proposed transformation system is tested using the standard ORL face database, and the experiments are done by applying different features domains. Moreover, a security analysis for the proposed transformation system is presented.  相似文献   

13.
A novel scheme for generating cancelable palmprint templates is proposed in this paper. Firstly, a chaotic high speed stream cipher is implemented based on coupled nonlinear dynamic filters (CNDF), in which the CNDF are constructed to have flows inverse to each other. Secondly, renewable and privacy preserving palmprint templates are generated using the CNDF chaotic stream cipher with multiple orientation palmprint features obtained from a bank of Gabor filters and encoded in a phase-coding scheme. Compared with the standard palmprint templates, the cancelable templates have greater ability to discriminate palmprints from different hands by increasing the inter-class divergence of different palms more effectively, while maintaining the intra-class distance among palmprints of the same hands. Lastly, the matching stage is performed directly on the cancelable/encryption domain in parallel to accelerate matching and to protect user’s privacy. Several fusion rules are investigated for the matching scores of different directional PalmCodes to obtain the final matching score. Compared with Max, Min, Median and Product fusion rules, the Sum rule can greatly accelerate the speed and improve the performance Experimental results on the Hong Kong PolyU Palmprint Database verify that the proposed cancelable templates can achieve very high performance and security levels with a very strong ability to reissue palmprint templates. The proposed method can also be implemented at high speed, which satisfies the needs of real-time applications.  相似文献   

14.
To ensure the high performance of a biometric system, various unimodal systems are combined to evade their constraints to form a multimodal biometric system. Here, a multimodal personal authentication system using palmprint, dorsal hand vein pattern and a novel biometric modality “palm-phalanges print” is presented. Firstly, we have collected a new anterior hand database of 50 individuals with 500 images at the institute referred to as NSIT Palmprint Database 1.0 by using NSIT palmprint device. Then from these anterior hand images, database for palmprint and palm-phalanges is created. In this biometric system, the individuals do not have to undergo the distress of using two different sensors since the palmprint and palm-phalanges print features can be captured from the same image, using NSIT palmprint device, at the same time. For dorsal hand vein, Bosphorus Hand Vein Database is used because of the stability and uniqueness of hand vein patterns. We propose fusion of three different biometric modalities which includes palmprint (PP), palm-phalanges print (PPP) and dorsal hand vein (DHV) and perform score level fusion of PP-PPP, PP-DHV, PPP-DHV and PP-PPP-DHV strategies. Lastly, we use K-nearest neighbor, support vector machine and random forest to validate the matching stage. The results proved the validity of our proposed modality and show that multimodal fusion has an edge over unimodal fusion.  相似文献   

15.
Fusion of phase and orientation information for palmprint authentication   总被引:1,自引:0,他引:1  
This paper presents a novel approach for palmprint authentication based on the fusion of the phase and orientation information. In the proposed approach, the phase information (called FusionCode or PhaseCode) of a palmprint is extracted by using four 2D Gabor filters with different orientations, and at the same time the orientation information (called OrientationCode) of the palmprint is also extracted. The PhaseCode and the OrientationCode are fused to make a new feature, called the Palmprint Phase and Orientation Code (PPOC). At the matching stage, a modified Hamming distance is defined to measure the similarity of two PPOCs. This approach is tested on a palmprint database containing 7,605 samples and the experimental results show that the accuracy and speed of the PPOC approach can satisfy the requirements of a real time biometric system.  相似文献   

16.
We propose a novel cancelable biometric approach, known as PalmHashing, to solve the non-revocable biometric issue. The proposed method hashes palmprint templates with a set of pseudo-random keys to obtain a unique code called palmhash. The palmhash code can be stored in portable devices such tokens and smartcards for verification. Multiple sets of palmhash codes can be maintained in multiple applications. Thus the privacy and security of the applications can be greatly enhanced. When compromised, revocation can also be achieved via direct replacement of a new set of palmhash code. In addition, PalmHashing offers several advantages over contemporary biometric approaches such as clear separation of the genuine-imposter populations and zero EER occurrences. In this paper, we outline the implementation details of this method and also highlight its potentials in security-critical applications.  相似文献   

17.
This paper describes the design and development of a multimodal biometric personal recognition system based on features extracted from a set of 14 geometrical parameters of the hand, the palmprint, four digitprints, and four fingerprints. The features are extracted from a single high-resolution gray-scale image of the palmar surface of the hand using the linear discriminant analysis (LDA) appearance-based feature-extraction approach. The information contained in the extracted features is combined at the matching-score level. The resolutions of the palmprint, digitprint and fingerprint sub-images, the similarity/dissimilarity measures, the matching-score normalization technique, and the fusion rule at the matching-score level, which optimize the system performance, were determined experimentally. The biometric system, when using a system configuration with optimum parameters, showed an average equal error rate (EER) of 0.0005%, which makes it sufficiently accurate for use in high-security biometric systems.  相似文献   

18.
Generating cancelable fingerprint templates   总被引:5,自引:0,他引:5  
Biometrics-based authentication systems offer obvious usability advantages over traditional password and token-based authentication schemes. However, biometrics raises several privacy concerns. A biometric is permanently associated with a user and cannot be changed. Hence, if a biometric identifier is compromised, it is lost forever and possibly for every application where the biometric is used. Moreover, if the same biometric is used in multiple applications, a user can potentially be tracked from one application to the next by cross-matching biometric databases. In this paper, we demonstrate several methods to generate multiple cancelable identifiers from fingerprint images to overcome these problems. In essence, a user can be given as many biometric identifiers as needed by issuing a new transformation "key". The identifiers can be cancelled and replaced when compromised. We empirically compare the performance of several algorithms such as Cartesian, polar, and surface folding transformations of the minutiae positions. It is demonstrated through multiple experiments that we can achieve revocability and prevent cross-matching of biometric databases. It is also shown that the transforms are noninvertible by demonstrating that it is computationally as hard to recover the original biometric identifier from a transformed version as by randomly guessing. Based on these empirical results and a theoretical analysis we conclude that feature-level cancelable biometric construction is practicable in large biometric deployments  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号