Research on Enhancing the Security and Privacy of Biometrics Systems

来源 :西安电子科技大学 | 被引量 : 0次 | 上传用户:ws1984003
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
With the large-scale proliferation of biometrics-based personal authenticationsystems, its security and privacy concerns have emerged as a hot research issue. A lotof researches have been conducted on the pattern recognition area of biometrics regime,unfortunately; the critical security and privacy issues to attain the reliable andtrustworthy identity authentication are being ignored. A biometrics system, even withsignificant recognition performance, is only universally acceptable if it is secure,reliable, robust against attacks and threats, and protects a users privacy in efficientmanner. To overcome the biometrics security challenges and to alleviate the biometricsprivacy issues, in this thesis, we investigate the methods and techniques aiming atthwarting the aforementioned problems inherent in biometrics systems. For the secure transmission of biometrics data over insecure network channel, twodifferent modes of data hiding schemes are proposed. The first method, which isimage-based hidden transmission of biometrics template, hides the biometric data intoa group of different images. Secret keys are generated by the biometric image andencryption is applied on the biometric templates before hiding into the host images.Decoding performance of hidden templates is encouraging and outperforms in the caseof transmission attacks on the cover image. The second proposed method is an audiosignal-based covert-transmission scheme of biometric templates, in which we used anovel chaos and NDFT-based template hiding scheme, and proved that the combinationof encryption, encoding, modulation, and data hiding of biometric template in audiosignal could not affect the identification performance of the biometric recognitionsystem. The biometric data extraction performance of the system is efficiently capableof identifying a person without stringent compromise of matching accuracy. To obstruct the non-liveness and retransmission issues of biometrics images, achallenge/response-based biometrics image scrambling system and method is proposed.In contrast to general challenge/response systems, which issue challenges to the user,our scheme is based on a novel architecture of intelligent biometrics sensor that hascomputational power to receive challenges from the authentication server and generateresponse to the challenge with the encrypted biometric image. The encryption anddecryption performance of the proposed system is encouraging to use in the real-timesystems of biometrics image transmission. In order to strengthen the privacy of biometrics data, an efficient and tokenlesstechnique is presented. Firstly, this scheme extracts features from the capturedbiometrics face images to generate the face feature vector and then, pseudorandomnumbers without using the tokens e.g. USB or smart card are generated, which can becombined with the face feature set to attain a binary FaceHash code. This schemeeliminates the fear of using biometrics for the cross matching applications, andprovides a remedy for non-revocable biometrics data. Finally, an efficient and practical chaotic hash-based fingerprint biometric remoteuser authentication scheme on mobile devices, e.g. cell phone and PDA, is investigated.This scheme is completely based on one-way collision free chaotic hash functions, anddoes not maintain password tables and biometrics database on the remote server.Furthermore, users can choose their passwords freely and change or update themsecurely whenever they want. This scheme is encouraging and better than using thelarge exponential functions or discrete logarithm problems on mobile devices, becauseof their low computational power and speed. Hence, the contribution of this thesis is envisaged in enhancing the usersconfidence and trust to use biometrics systems without having a fear of security breachand privacy compromise for the depen.dable and trustworthy personal authentication.
其他文献
目的:探讨临床护理路径在重症路脑损伤患者急救中的应用效果.方法:在2015年2月至2016年2月期间,选取我院收治的84例重症颅脑损伤患者,随机分为实验组(42例)与对照组(42例),对
本文详细论述了MPEG-1第三层音频编码算法的原理、关键技术和算法流程以及LAME算法的硬件实现和优化,用以实现音频的实时编码。论文的主要内容如下:第一,从原理上阐述了MP3音
无线局域网(WLAN)以其移动性和灵活性的特点得到了广泛应用。随着网络速率的不断提高以及多媒体应用的发展,人们更希望无线网络能够提供更好的服务质量(Quality of Service,QoS
随着上世纪50年代前苏联的“月球一号”卫星发射,人类进入了深空探测的新时代。进入21世纪以来,由于航天相关技术的快速发展与经济政治军事等方面的需求,各个航空大国纷纷推
目的:研究和分析肿瘤型假体在老年股骨上段转移瘤治疗中的应用效果.方法:对来我院就诊的30例股骨上段转移瘤老年患者进行回顾性分析,所有患者均行肿瘤部位骨切除和肿瘤型假体
目的:为了探究门冬胰岛素对妊娠期糖尿病患者的临床治疗效果,进一步完善妊娠期糖尿病患者的临床用药方法.方法:根据我院2014年1月-2016年6月所收治的82例妊娠期糖尿病患者的
目的:分析优质护理在呼吸内科临床护理中的应用价值.方法:本院根据随机对照、平行、单盲的原则,选取呼吸内科患者76例为本研究对象,其中将采用一般护理的患者设为常规组.将采
近年来,移动通信技术的发展推动了移动通信市场的高速发展。我国移动用户的数量已经超过了两亿。随着应用领域的不断扩大,移动通信服务正由单纯的语音通信占主导,逐步转向语音通
本文主要探讨基于小波域的数字图像水印技术,介绍了数字水印的基本原理、水印基本特征、性能评价。文中结合小波变换、标志序列随机产生、SVD变换、自适应调节和视频帧变换等
目的:研究老年吸入性肺炎的临床护理要点.方法:本次研究选取的研究对象为2014年3月~2015年5月期间在我院进行治疗的老年吸入性肺炎患者60例.对比老年吸入性肺炎患者实施临床护