首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
研究脱机签名认证的特征抽取和比较决策。针对脱机手写签名验证特点,提出一种主成分特征提取和径向基神经网络相结合的脱机手写签名认证方法。首先使用主成分特征提取算法对签名图像进行特征提取和降维处理,然后基于主成分特征设计径向基神经网络识别签名的真伪。实验结果表明该方法可取得较好的识别效果。  相似文献   

2.
研究脱机签名认证的特征抽取和比较决策.针对脱机手写签名验证特点,提出一种主成分特征提取和径向基神经网络相结合的脱机手写签名认证方法.首先使用主成分特征提取算法对签名图像进行特征提取和降维处理,然后基于主成分特征设计径向基神经网络识别签名的真伪.实验结果表明该方法可取得较好的识别效果.  相似文献   

3.
Perceptual hashing is used for multimedia content identification and authentication through perception digests based on the understanding of multimedia content. This paper presents a literature review of image hashing for image authentication in the last decade. The objective of this paper is to provide a comprehensive survey and to highlight the pros and cons of existing state-of-the-art techniques. In this article, the general structure and classifications of image hashing based tamper detection techniques with their properties are exploited. Furthermore, the evaluation datasets and different performance metrics are also discussed. The paper concludes with recommendations and good practices drawn from the reviewed techniques.  相似文献   

4.
Large-scale deployment of biometric systems for web-based services has to tackle technological issues related to security, interoperability and accuracy, and social issues related to privacy protection and biometric acquisition process acceptance. The variety of biometric traits, capturing devices, targeted populations and working scenarios makes the development of a universal solution for all-purpose deployment quite a difficult task. This paper describes the design, implementation and applicability of an open framework for distributed biometric authentication oriented to access-control in web environment. The open principle makes this framework a novel and practical development tool for testing and integrating biometric algorithms and devices from third parties. Special attention has been paid to security and interoperability standards to ease concurrent integration and testing of biometric trait matchers developed by different laboratories or companies. Finally, in order to demonstrate the versatility and usability of the framework, we describe the construction process for a distributed multibiometric database acquisition tool based on this framework.  相似文献   

5.
A touch of money [biometric authentication systems]   总被引:1,自引:0,他引:1  
《Spectrum, IEEE》2006,43(7):22-27
This paper suggests the use of a new authentication system for credit cards based on biometric sensors that could dramatically curtail identity theft. The proposed system uses fingerprint sensors, though other biometric technologies, either alone or in combination, could be incorporated. It could be economical, protect privacy, and guarantee the validity of all kinds of credit card transactions, including ones that take place at a store, over the telephone, or with an Internet-based retailer. By preventing identity thieves from entering the transaction loop, credit card companies could quickly recoup their infrastructure investments and save businesses, consumers, and themselves billions of dollars every year.  相似文献   

6.
传统多模态生物特征识别方法当出现生物特征缺失时,识别性能会明显下降。针对此问题,提出一种融合人脸、虹膜和掌纹的自适应并行结构多模态生物识别方法。该方法在设计融合策略时,考虑到所有可能的输入缺失,构造并行结构的融合函数集,在实际应用时根据输入状态自适应的选择融合策略进行识别。实验仿真结果表明该方法既可提高识别可靠性又可实现当有生物特征缺失时的性能稳定。  相似文献   

7.
Various user authentication schemes with smart cards have been proposed. Generally, researchers implicitly assume that the contents of a smart card cannot be revealed. However, this is not true. An attacker can analyze the leaked information and obtain the secret values in a smart card. To improve on this drawback, we involve a fingerprint biometric and password to enhance the security level of the remote authentication scheme Our scheme uses only hashing functions to implement a robust authentication with a low computation property. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   

8.
基于密码的用户远程认证系统已被广泛应用,近年来的研究发现,单一口令系统容易遭受字典分析、暴力破解等攻击,安全性不高.生物特征与密码相结合的认证方式逐渐加入远程认证系统中,以提高认证系统的安全水平.但现有认证系统通常工作在单一服务器环境中,扩展到多服务器环境中时会遇到生物特征模板和密码容易被单点突破、交叉破解的问题.为了克服以上问题,提出了一种基于生物特征和混沌映射的多服务器密钥认证方案,该方案基于智能卡、密码和生物特征,可明显提高多服务器身份认证系统的安全性及抗密码猜解的能力.  相似文献   

9.
With the growing accessibility and usability of internet there is a growing concern over content protection of digital images. Recently, to eliminate the traditional use of passwords and to ensure that the access to the image is restricted only to legitimate users, security solutions are increasingly combined with biometrics. Consequently, biometric-based watermarking algorithms, that involve embedding the identity of the owner, are proposed to solve ownership disputes. This paper presents a new scheme for protecting and authenticating invisibly watermarked digital images. It applies Independent Component Analysis to the cover image and enables the insertion of two independent watermarks based on fingerprint and iris biometrics. In this approach biometric techniques are used for watermarks generation and for owners authentication. The main advantage of proposed algorithm is construction of ICA based watermarking domain to enable insertion of two independent watermarks, that improve authentication accuracy and makes scheme more robust.  相似文献   

10.
In the post-quantum era, the password-based authentication key exchange (PAKE) protocol on lattice has the characteristics of convenience and high efficiency, however these protocols cannot resist online dictionary attack thatis a common method used by attackers. A lattice-based two-factor ( biometric and password) authentication keyexchange (TFAKE) protocol based on key consensus (KC) is proposed. The protocol encapsulates the hash valueof biometric information and password through a splittable encryption method, and compares the decapsulatedinformation with the server's stored value to achieve the dual identity authentication. Then the protocol utilizes theasymmetric hash structure to simplify the calculation steps, which increases the calculation efficiency. Moreover,KC algorithm is employed in reducing data transmission overhead. Compared with the current PAKE protocol, theproposed protocol has the characteristics of hybrid authentication and resisting online dictionary attack. And itreduces the number of communication rounds and improves the efficiency and the security of protocol application.  相似文献   

11.
Biometric traits offer direct solutions to the critical security concerns involved in identity authentication systems. In this paper, a systematic analysis of the electrocardiogram (ECG) signal for application in human recognition is reported, suggesting that cardiac electrical activity is highly personalized in a population. Features extracted from the autocorrelation of healthy ECG signals embed considerable diacritical power, and render fiducial detection unnecessary. The central consideration of this paper is the evaluation of an identification system that is robust to common cardiac irregularities such as premature ventricular contraction (PVC) and atrial premature contraction (APC). Criteria concerning the power distribution and complexity of ECG signals are defined to bring to light abnormal ECG recordings, which are not employable for identification. Experimental results indicate a recognition rate of 96.2% and render identification based on ECG signals rather promising.  相似文献   

12.
张亚英  梁坚  尤晋元 《通信学报》2002,23(1):103-110
本文提出认证协议的相关性问题,并引入关联因子的概念,从消息相关和协议相关两个层次上对相关性进行描述,同时将协议的运行看作是攻击者和协议环境交互的模型。我们用CSP的模型检查工具FDR2对该模型进行形式化描述,以著名的Needham-Schroeder公钥协议为例分析其相关性,得出了理想的结果。  相似文献   

13.
全极化合成孔径雷达多视图像的极化特征分析   总被引:1,自引:0,他引:1  
该文基于乘性相干斑模型,对全极化合成孔径雷达多视图像的极化特征参数(同极化比、交叉极化比和同极化相位差)进行了分析,利用实际的模拟数据对特征参数的PDF进行了拟合测试,分析了多视极化特征参数的统计特性对极化相干斑抑制算法的影响。利用极化比和相位差的特点,对地物进行分类,所得分类精度与利用最优极化分类法的分类精度具有可比性。  相似文献   

14.
15.
The accuracy of a biometric matching algorithm relies on its ability to better separate score distributions for genuine and impostor subjects. However, capture conditions (e.g. illumination or acquisition devices) as well as factors related to the subject at hand (e.g. pose or occlusions) may even take a generally accurate algorithm to provide incorrect answers. Techniques for face classification are still too sensitive to image distortion, and this limit hinders their use in large-scale commercial applications, which are typically run in uncontrolled settings. This paper will join the notion of quality with the further interesting concept of representativeness of a biometric sample, taking into account the case of more samples per subject. Though being of excellent quality, the gallery samples belonging to a certain subject might be very (too much) similar among them, so that even a moderately different sample of the same subject in input will cause an error. This seems to indicate that quality measures alone are not able to guarantee good performances. In practice, a subject gallery should include a sufficient amount of possible variations, in order to allow correct recognition in different situations. We call this gallery feature representativeness. A significant feature to consider together with quality is the sufficient representativeness of (each) subject’s gallery. A strategy to address this problem is to investigate the role of the entropy, which is computed over a set of samples of a same subject. The paper will present a number of applications of such a measure in handling the galleries of the different users who are registered in a system. The resulting criteria might also guide template updating, to assure gallery representativeness over time.  相似文献   

16.
In this paper, we describe an attack against one of the most efficient authentication protocols for low-cost RFID tags recently proposed by Song and Mitchell. A weak attacker, i.e. an attacker that has no access to the internal data of a tag, is able to impersonate a legitimate reader/server, and to desynchronize a tag. The attack is very efficient and has minimal computational complexity. Finally, we propose a simple solution to fix the flaw.  相似文献   

17.
In this paper, a dual iris-based biometric identification system that increases the accuracy and the performance of a typical human iris recognition system is proposed. This system detects, isolates, and extracts the iris region from the eye images and maps the circular regions into rectangular polar coordinates according to the preset radial and angular resolutions. The phase responses, obtained from convolving the polar images with 1D log Gabor filter, are quantized to generate the binary iris templates which are compared using the hamming distance. Unlike the conventional method which examines a single eye, the proposed method takes images from both eyes simultaneously. Using it on CASIA Iris database V3, false positive rate and false negative rate were found to be 0 and 9.96 %, respectively, while the overall accuracy was 99.92 %.  相似文献   

18.
Multidimensional Systems and Signal Processing - The use of electrocardiograms (ECGs) as a modality for biometric recognition has received increasing interest. Whereas ECGs are capable of providing...  相似文献   

19.
Recently, Chang et al. proposed an authentication and key agreement protocol for satellite communications, and they claimed that their scheme could withstand various attacks. However, in this paper, we will show that their scheme is vulnerable to the denial of service attack and the impersonation attack. Moreover, we also point out that the adversary could compute the session key through the intercepted message. The analysis shows the scheme of Chang et al. is not secure for practical applications. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   

20.
2.SecureCode 万事达于2002年9月推出了新的网上交易方式——SecureCode,适用于MasterCard 和Maestro 品牌的信用卡和借记卡,它利用了UCAF(此隐藏域为持卡人的认证信息)域和SPA算法(基于发卡行的远程交易安全方法)。为了支持VISA的3-D,它还提供了一种3-D的认证方式,修改了3-D的部分内容来兼容UCAF和SPA运算,但对其定义、消息、协议未做任何改变。下面分别讨论这两种模式。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号