共查询到20条相似文献,搜索用时 125 毫秒
1.
针对单一生物特征身份识别由于传感器噪音及特征破损等缺陷导致识别率低的问题,从信息融合角度出发,提出一种基于语音和人脸的多生物特征身份识别方法.分别提取语音特征和人脸特征作为识别的依据,并用神经网络在特征层上进行融合识别.实验证明,该方法相对单一生物特征身份识别,在同等条件下具有更高的识别率. 相似文献
2.
3.
4.
5.
6.
RFID技术和生物特征识别得到了快速发展,为进一步提高身份识别的精度和效率,该文介绍了一种融合RFID和多生物特征的身份认证系统模型。该系统模型可以应用在很多领域如公共场所的安全检测、工作区域的出入口等,具有非常重要的实际应用价值。 相似文献
7.
RFID技术和生物特征识别得到了快速发展,为进一步提高身份识别的精度和效率,该文介绍了一种融合RFID和多生物特征的身份认证系统模型。该系统模型可以应用在很多领域如公共场所的安全检测、工作区域的出入口等,具有非常重要的实际应用价值。 相似文献
8.
9.
基于单一生物特征模糊金库证易于受到相关攻击而导致生物特征模板泄露的安全性问题,提出一种基于两枚不同手指指纹的特征融合模糊金库的身份认证方案。这种身份认证方案采用了分别来自两枚不同手指指纹的细节点与方向场进行融合的方法,基于Diffie-Hellman密钥交换协议思想。实验结果表明该身份认证方案在指纹特征模板的安全性保护上比基于单一指纹特征模板有显著提高。 相似文献
10.
11.
Marcel S Millán Jdel R 《IEEE transactions on pattern analysis and machine intelligence》2007,29(4):743-752
In this paper, we investigate the use of brain activity for person authentication. It has been shown in previous studies that the brainwave pattern of every individual is unique and that the electroencephalogram (EEG) can be used for biometric identification. EEG-based biometry is an emerging research topic and we believe that it may open new research directions and applications in the future. However, very little work has been done in this area and was focusing mainly on person identification but not on person authentication. Person authentication aims to accept or to reject a person claiming an identity, i.e., comparing a biometric data to one template, while the goal of person identification is to match the biometric data against all the records in a database. We propose the use of a statistical framework based on Gaussian mixture models and maximum a posteriori model adaptation, successfully applied to speaker and face authentication, which can deal with only one training session. We perform intensive experimental simulations using several strict train/test protocols to show the potential of our method. We also show that there are some mental tasks that are more appropriate for person authentication than others 相似文献
12.
In the digital authentication system, the emerging technology is fingerprint authentication, which have been concentrated more attraction towards security and control. Existing authentication systems such as Biometric cryptosystems, Cancellable templates, and Bio-hashing provide a solution for addressing these vulnerabilities. To implement the fingerprint authentication with more accuracy, a novel FPGA based authentication system has proposed in this paper and the performance has evaluated with the help of the previous scheme. First, finger code template (FCT) is generated by applying transformation function on finger code and biometric key created from the randomization process. While in the second phase, 40-bit binary string (ofc), 40-bit binary time stamp, random numbers 0 and 40 (r1, r2, r3, and r4) are generated from TRSG (True Random and Time Stamp Generator) which is converted into 80-bit efc. Based on the obtained efc, the person details are compared with primary data stored in the database. The simulation result shows that the proposed method reduces the LUT utilization to 0.17% and complexity as 14%. Hence, FPGA based fingerprint authentication shows its excellence with the lowest complexity value and thereby enhance the presentation of the biometric authentication system. 相似文献
13.
Behzad Helli Author Vitae Author Vitae 《Pattern recognition》2010,43(6):2199-2209
The style of people's handwriting is a biometric feature that is used in person authentication. In this paper, we have proposed a text independent method for Persian writer identification. In the proposed method, pattern based features are extracted from data using Gabor and XGabor filter. The extracted features are represented for each person by using a graph that is called FRG (feature relation graph). This graph is constructed using relations between extracted features by employing a fuzzy method. The fuzzy method determines the similarity between features extracted from different handwritten instances of each person. In the identification phase, a graph similarity approach is employed to determine the similarity of the FRG generated from the test data and the FRGs generated by training data. The experimental results were satisfactory and the proposed method got about 100% accuracy on a dataset with 100 writers when enough training data was used. However, this method has been applied on Persian handwritings but we believe it can be extended on other languages especially in data representation and classification parts. 相似文献
14.
可逆信息隐藏技术一方面能够对图像的原始性和完整性进行认证和保护,同时还能够确保无失真地恢复原始图像,近年来在公安、司法等领域受到越来越多的关注。基于可逆信息隐藏的认证方案需要同时满足可逆和认证两个方面的要求,在实际中具有较大挑战性,目前成功案例较少。在文献[1]中,Hong等人提出了一种新的基于可逆信息隐藏技术的认证方法,该方法借助IPVO(Improved pixel-value-ordering)和LSB(Least significant bit)替换等技术,可以有效地对图像进行认证。本文我们对Hong等人的方法进行了深入研究,指出在该方法中仅有部分像素参与认证码的生成且攻击方能够很容易地获知这部分像素,因此在安全性上还存在不足。针对该方法存在的安全漏洞,我们提出了一种针对性的攻击方案,即攻击方可选择对图像中未参与认证码生成和嵌入的像素进行修改。该攻击方案可以在不影响所嵌入认证码提取的同时,实现有意义篡改。为了提高认证算法的安全性,本文还针对Hong等人算法的缺陷提出了相应的改进方案,即将更多像素引入认证码的生成过程中并在嵌入前对图像块进行置乱。理论分析和实验结果验证了本文提出的... 相似文献
15.
This paper proposes a novel scalable authentication scheme that utilizes the progressive enhancement functionality in JPEG 2000 scalable image coding. The proposed method first models the wavelet-based quality scalable coding to identify the effect of the quantization and de-quantization on wavelet coefficient magnitudes and the data embedded within such coefficients as a watermark. A relationship is then established between the watermark extraction rule and the embedding rule, using the magnitudes of the reconstructed and original coefficients. It ranks the wavelet coefficients according to their ability to retain the embedded watermark data intact under various quantization levels corresponding to quality enhancements. Then watermark data is embedded into wavelet coefficients according to their rank followed by JPEG 2000 embedded coding. At the decoder as more and more quality and resolution layers are decoded the authentication metric is improved, thus resulting in gradually increasing complexity of the authentication process according to the number of quality and resolution enhancements. The low complexity authentication is available at low quality low resolution decoding, enabling real-time authentication for resource constrained applications without affecting the authentication metric. Compared to the existing methods, the proposed method results in highly robust scalable authentication of JPEG 2000 coded images. 相似文献
16.
基于用户击键特征的身份认证比传统的基于口令的身份认证方法有更高的安全性,现有研究方法中基于神经网络、数据挖掘等算法计算复杂度高,而基于特征向量、贝叶斯统计模型等算法识别精度较低。为了在提高识别精度的同时有效降低计算复杂度,在研究现有算法的基础上提出了一种基于遗传算法与灰色关联分析的击键特征识别算法。该算法利用遗传算法根据用户训练样本确定表征用户击键特征的标准特征序列,通过对当前用户击键特征序列与标准特征序列进行灰色关联分析实现用户身份认证。实验结果表明,该算法识别精度达到神经网络、支持向量机等算法的较高水平,错误拒绝率与错误接受率分别为0%与1.5%。且计算复杂度低,与基于特征向量的算法相近。 相似文献
17.
The paper presents a modified dynamic time warping (DTW) technique for person authentication based on time series matching obtained from handwriting. The online data has been acquired by a biometric smart pen device. The proposed method allows fast and accurate classification of human individuals based on handwritten PIN words or signature samples. Although classic DTW provides robust distance measurements essential for accurate classification of sequences, it is computationally expensive. To speed up computations we introduce area bound dynamic time warping (AB_DTW) that divides time series into several areas bounded by segments of consecutive zero crossings including local peaks and valleys. Unlike classic DTW which compares whole signals, the proposed AB_DTW warps areas bounded by the local regions. Two kinds of data abstraction formats of area bound—1 dimensional and 2 dimensional—are evaluated. Experimental results show that because of a higher-level data abstraction, the proposed approach is several times faster than classic DTW. Moreover, AB_DTW does not offer substantial loss of accuracy which is required for authentication performance using handwritten PIN words and signatures sampled by biometric pen device. 相似文献
18.
无线体域网是实现智慧健康的重要基础,但其采集的生理状态等敏感信息在开放的无线信道传输,攻击者容易伪装成合法用户获取用户隐私数据,因而身份认证成为挑战。对此,提出了一种将无线信道特征CSI与递归神经网络(RNN)相结合的身份认证方法,实现体域网中节点的有效身份认证。利用无线体域网中无线信道的物理层特征CSI作为合法节点认证的指纹特征。为了加快认证速度与效率,通过取特定环境下CSI的数据包,将数据包中子载波的特性作为RNN的输入量,训练出RNN模型来快速识别合法节点。通过实验将所提出的身份认证方法与利用RSS作为指纹特征的认证方法进行比较,结果表明所提方法的认证速度更快、准确率更高。 相似文献
19.
该文应用RSA密码机制既可对数据加密又可对私钥拥有者进行身份认证的原理,对挑战/应答方式的动态口令身份认证系统进行了改进。改进后的系统通过对在网络上传输的认证数据进行加密确保了数据在传输过程中的安全性,同时实现了用户和服务器间的双向认证。另外,改进方案利用软件来产生随机挑战大大节省了开销成本。 相似文献
20.
Many cutting-edge methods are now possible in real-time commercial settings and are growing in popularity on cloud platforms. By incorporating new, cutting-edge technologies to a larger extent without using more infrastructures, the information technology platform is anticipating a completely new level of development. The following concepts are proposed in this research paper: 1) A reliable authentication method Data replication that is optimised; graph-based data encryption and packing colouring in Redundant Array of Independent Disks (RAID) storage. At the data centre, data is encrypted using crypto keys called Key Streams. These keys are produced using the packing colouring method in the web graph’s jump graph. In order to achieve space efficiency, the replication is carried out on optimised many servers employing packing colours. It would be thought that more connections would provide better authentication. This study provides an innovative architecture with robust security, enhanced authentication, and low cost. 相似文献