用户名: 密码: 验证码:
基于距离映射码的安全指纹认证研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
基于生物特征识别、认证系统以其方便、安全性已经得到人们的广泛认可,成为一种不可或缺的身份识别、认证方式。但是随着人们隐私保护意识的觉醒和对信息保密、信息完整性等更多安全服务的需求增多,传统的生物特征系统已经不能满足社会的需求,而需要求助于比较成熟的密码学理论和信息安全系统。生物特征密码技术就是研究如何将传统的基于生物特征的认证、识别系统和传统的基于数字的信息安全系统有机结合起来的技术。利用生物特征密码技术建立的认证、识别系统就是生物特征密码系统。生物特征密码系统可看作是传统生物特征系统的扩展,不仅发扬了方便的长处,还弥补了泄露隐私的缺点,加强了安全性,为人们的信息安全需求提供重要保障。
     本文对生物特征密码系统和传统的生物特征系统在安全性上进行比较,探讨生物特征密码系统的评价参数,尤其是安全性的衡量标准。对当前基于生物特征密码技术的实现系统进行了比较全面的调研和比较,包括尚未完全解决的问题。
     本文重点关注具有如下性质的生物特征模板保护方案:无需恢复出原始模板的所有信息也可提取密钥;即使知道密钥也不能逆向推出原始模板的内容。在此目标的推动下提出了模糊加密的概念以及具体的方案。该方案的初衷是应用于指纹细节点模板,要完全达到实用,还需要相应的去除细节点高斯噪声的方法。
     为此目的,本文设计了一种能消除高斯噪声的距离映射码,并提出了一个基于距离映射码编码差值的指纹密码方案,最终构建了基于距离映射码的安全指纹认证系统。与模糊保险箱方案相比,该系统在具有较高认证精确度的同时,保持了较高的安全性。
     总之,本文在对生物特征密码技术和系统进行深入研究之后,提出了一个性能较好、能满足实际应用需求的相对完整的安全指纹认证系统。同时将该安全指纹认证技术成功植入了研究组自主开发的生物特征加密系统平台,实现了指纹文件加密系统和安全指纹邮件系统。
Identification and authentication systems based on biometrics have gained more and wider applications because of their conveniences and securities. However, traditional biometric systems are faced with new challenges of stronger security with more and more people are privacy aware, and information confidentiality and integrity are common security necessities for any information systems regardless biometric or non-biometric authentication.
     Biometric cryptosystems refer to biometric authentication systems that utilize techniques of binding biometrics and information security systems together seamlessly. Biometric cryptosystems can also be viewed as security enhanced traditional biometric systems.
     In this paper, security metrics of biometric cryptosystems as well as that of traditional biometric systems are investigated. Current realizations of biometric cryptosystems are also investigated and compared.
     We propose a new primitive fuzzy encryption and specific schemes, with motivation of constructing biometric cryptosystems that ensure privacy of templates even when secret keys extracted from the public helper data are known and the secret keys are retrievable without recovering every exact detail of registered template.
     We also propose a new biometric template recovering scheme based on the designed Distance Projection Coding suitable for set based biometric template which may also introduce white noise on each element in the set, e.g., minutiae based fingerprint. In a word, we propose a full biometric cryptosystem used as secure authentication system for minutiae based fingerprint by combining the two proposals.
引文
[1] Hitachi ID Systems Inc. Password management best practices. http://www.psynch.com/docs/password-management-best-practices.html.
    [2] B. SCHNEIER. Biometrics: Uses and abuses [J]. Inside Risks 110, Communications of the ACM. 1999, 42(8):136-139
    [3] N. RATHA, J. CONNELL, R.M. BOLLE, S. CHIKKERUR. Cancelable biometrics: A case study in fingerprints [C]. 18th International Conferenceon on Pattern Recognition, ICPR. 2006, 4:370-373
    [4] RSA Laboratories. Pkcs5: Password-based cryptography specification.
    [5] UMUT ULUDAG, SHARATH PANKANTI, SALIL PRABHAKAR, ANIL K.JAIN. Biometric cryptosystems: Issues and challenges [J]. Proceedings of the IEEE. 2004, 92(6):948-960
    [6] ANN CAVOUKIAN, ALEX STOIANOV. Biometric encryption: A positive sum technology that achieves strong authentication [R]. Security and Privacy. 2007, 14(3):36-40
    [7] IBG. www.bioprivacy.org, 2007.
    [8] NALINI K. RATHA, JONATHAN H. CONNELL, RUUD M. BOLLE. Ananalysis of minutiae matching strength [C]. AVBPA’01: Proceedings of the Third International Conference on Audio- and Video-Based Biometric Person Authentication, London, UK, 2001:223-228.
    [9] R. CAPPELLI, A. LUMINI, D. MAIO, D. MALTONI. Fingerprint image reconstruction from standard templates [J]. IEEE Transactions on Pattern Analysis and Machine Intelligence. 2007, 29(9):1489-1503
    [10] A. ROSS, J. SHAH, A.K. JAIN. From template to image: Reconstructing fingerprints from minutiae points [J]. IEEE Transactions on Pattern Analysis and Machine Intelligence. 2007, 29(4):544-560
    [11] A.K. JAIN, P.J. FLYNN, A.A. ROSS. Handbook of biometrics [M]. New York: 2007, Springer-Verlag.
    [12] T. KEVENAAR. Security with noisy data: On private biometrics, secure key storage and anti-counterfeiting [M]. Chap.11: Protection of biometric information. 2007, 15(6):169-193
    [13] D. MALTONI, D. MAIO, A.K. JAIN, S.PRABHAKAR. Handbook of fingerprint recognition [M]. 2009, New York: Springer-Verlag.
    [14] ANIL K. JAIN, ARUN ROSS, SHARATH PANKANTI. Biometrics: A tool for information security [J]. IEEE Transactions on Information Forensicsand Security. 2006, 1(2):125-143
    [15] ILEANA BUHAN, JEROEN DOUMEN, PIETER H.HARTEL, RAYMOND N.J. VELDHUIS. Fuzzy extractors for continuous distributions [C]. ASIACCS '07: Proceedings of the 2nd ACM symposium on Information, Computer and Communications Security, Singapore, 2007, 22(3):353-355
    [16] ULRIKE KORTE, MICHAEL KRAWCZAK, ULLRICH MARTINI. A cryptographic biometric authentication system based on genetic fingerprints [J]. International Journal of Information Security. 2008, 46(3):26-35
    [17] YEVGENIY DODIS, RAFAIL OSTROVSKY, LEONID REYZIN, ADAM SMITH. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data [J]. SIAM Journal of Computing. 2008, 38(1):97-139
    [18] FENG HAO, ROSS ANDERSON, AND JOHN DAUGMAN. Combining crypto with biometrics effectively [J]. IEEE Transactions on Computing. 2006, 55(9):1081-1088
    [19] ANIL K. JAIN, KARTHIK NANDAKUMAR, ABHISHEK NAGAR. Biometric template security [J]. EURASIP Journal on Advances in Signal Processing. 2008, 8(2):1-17
    [20] A. JUELS, M. SUDAN. A fuzzy vault scheme [J]. A preliminary version apperas in IEEE International Symposium on Information Theory. IJDCC:Designs, Codes and Cryptography. 2006, 38(2): 237-257
    [21] A. JUELS, M. WATTENBERG. A fuzzy commitment scheme [C]. The 6th ACM Conference on Computer and Communications Security. 1999, ACM Press: 28-36
    [22] ANDREW TEOH BENG JIN, DAVID NGO CHEK LINGA, LWYN GOHB. Biohashing: Two factor authentication featuring fingerprint data and tokenized random number [J]. Pattern Recognition. 2004, 37(4):2245-2255
    [23] N.K. RATHA, J.H. CONNELL, R.M. BOLLE. Enhancing security and privacy in biometrics-based authentication systems [J]. IBM Systems Journal. 2001, 40(3):614-634
    [24] N.K. RATHA, S.CHIKKERUR, J.H. CONNELL, R.M. BOLLE. Generating cancelable fingerprint templates [J]. IEEE Transactions on Pattern Analysis and Machine Intelligence. 2007, 29(4):561-572
    [25] MANUEL R. FREIRE, JULIAN FIéRREZ-AGUILAR, JAVIER GALBALLY, JAVIER ORTEGA-GARCIA. Biometric hashing based on genetic selection and its application to on-line signatures [C]. ICB’07: The 2nd International Conference on Biometrics. 2007, 46(4):1134-1143
    [26] CLAUS VIELHAUER. Biometric user authentication for IT security: From fundamentals to handwriting [M]. 2006 New York: Springer-Verlag.
    [27] YAGIZ SUTCU, HUSREV TAHA SENCAR, NASIR MEMON. A secure biometric authentication scheme based on robust hashing [C]. Proceedings of ACM Multimedia and Security Workshop, MM-SEC '05. 2005, 1(4): 111-116
    [28] SANAUL HOQUE, MICHAEL FAIRHURST, GARETH HOWELLS. Evaluating biometric encryption key generation using handwritten signatures [C]. The 2008 ECSIS Symposium on Bio-inspired, Learning, and Intelligent Systems for Security, Edinburgh, Scotland, UK. 2008, 6(4):17-22
    [29] JEAN-PAUL LINNARTZ, PIM TUYLS. New shielding functions to enhance privacy and prevent misuse of biometric templates [C]. AVBPA'03: Proceedings of the 4th International Conference on Audio-and Video- Based Biometric Person Authentication, Univ Surrey, Guildford, UK. 2003, 11(6): 393-402
    [30] FABIAN MONROSE, MICHAEL K.REITER, SUSANNE WETZEL. Password hardening based on keystroke dynamics [J]. International Journal of Information Security. 2001, 1(2):69-83
    [31] F. MONROSE, M.K. REITER, Q. LI, S. WETZEL. Cryptographic key generation from voice [C]. SP '01: Proceedings of the 2001 IEEE Symposium on Security and Privacy, Oakland, California, USA. 2001, 16(5):12-25
    [32] F. HAO, C.W. CHAN. Private key generation from on-line handwritten signatures [J]. Information Management and Computer Security. 2002, 10(2):159-164
    [33] CLAUS VIELHAUER, RALF STEINMETZ, ASTRID MAYERHOFER. Biometric hash based on statistical features of online signatures [C]. ICPR’02: Proceedings of the 16th International Conference on Pattern Recognition. 2002, 1(5): 123-126
    [34] A. GOHAND D.C.L. NGO. Computation of cryptographic keys from face biometrics [J]. International Federation for Information Processing, LNCS 2828. 2003, 44(3):1-13
    [35] Y. SUTCU, Q. LI, N. MEMON. How to protect biometric templates [J]. Proceedings of SPIE on Security, Steganography and Watermarking of Multi- media Contents IX. 2007, 65(5):13-16
    [36] M. VANDER VEEN, T. KEVENAAR, G.-J. SCHRIJEN. Face biometrics with renewable templates [J]. Proceedings of SPIE on Security, Steganography, and Watermarking of Multimedia Contents VIII. 2006, 60(7):2-6
    [37] COLIN SOUTAR, DANNY ROBERGE, ALEX STOIANOV. ICSA Guide to Cryptography [M], Chapter22: Biometric Encryption. 1999 Mc Graw-Hill.
    [38] T. CHARLES CLANCY, NEGAR KIYAVASH, DENNIS J. LIN. Secure smartcard-based fingerprint authentication [C]. Workshop on Biometrics Methods and Applications-WBMA’03, Berkeley, California, USA. 2003, 8(11):45-52
    [39] U. ULUDAG, S. PANKANTI, A.K. JAIN. Fuzzy vault for fingerprints [C]. Proceedings of Audio- and Video- Based Biometric Person Authentication, LNCS 3546. 2005, 35(9):310-319
    [40] U.ULUDAG, A.K.JAIN. Securing fingerprint template: Fuzzy vault with helper data [C]. Proceedings of the 2006 Conference on Computer Vision and Pattern Recognition Workshop-CVPRW’06, New York, USA. 2006, 22(6):163-163
    [41] S. YANG, I. VERBAUWHEDE. Secure fuzzy vault based fingerprint verification system [C]. The 38th Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, California, USA. 2004, 10(11):577-581
    [42] A. NAGAR, S. CHAUDHURY. Biometrics based asymmetric cryptosystem design using modified fuzzy vault scheme [C]. The 18th International Conference on Pattern Recognition, Hong Kong. 2006, 24(8):537-540
    [43] P. TUYLS, A.H.M. AKKERMANS, T.A.M. KEVENAAR. Practical biometric authentication with template protection [C]. AVBPA’05: Proceedings of the 5th International Conference on Audio-and Video- Based Biometric Person Authentication, New York, USA. 2005, 22(6):436-446
    [44] KARTHIK NANDAKUMAR, ANIL K.JAIN, SHARATH PANKANTI. Fingerprint-based fuzzy vault: Implementation and performance [J]. IEEETransactions on Information Forensics and Security. 2007, 2(4):744–757
    [45] Q. LI, X. NIU, S. SUN. A novel biometric key scheme [J]. Chinese Journal of Electronics. 2005, 15(1): 99-102
    [46] PIM TUYLS, BORIS SKORIC', TOM KEVENAAR. Security with noisy data: On private biometrics, secure key storage and anti-counterfeiting [M]. 2007 New York: Springer-Verlag.
    [47] GEORGE I.DAVIDA, YAIR FRANKEL, BRIAN J.MATT. One enabling secure applications through off-line biometric identification [C]. IEEE Symposium on Security and Privacy, Oakland, California, USA. 1998, 6(5):148-159
    [48] SALIL VADHAN. Randomness extractors and their cryptographic applications [R]. 2008 Tutorial.
    [49] ARATHI ARAKALA, JASON JEFFERS, K.J. HORADAM. Fuzzy extractors for minutiae-based fingerprint authentication [C]. ICB’07: The 2nd International Conference on Biometrics. 2008, 23(10):760-769
    [50] QIMING LI, YAGIZ SUTCU, NASIR D.MEMON. Secure sketch for biometric templates [J]. Advances in Cryptology-ASIACRYPT’06, LNCS 2006, 42(8):99-113
    [51] ANDREW TEOH BENG JIN, DAVID NGO, CHEK LING, ALWYN GOH. Biohashing: Two factor authentication featuring fingerprint data and tokenized random number [J]. Pattern Recognition. 2004, 37(11): 2245-2255
    [52] SANTOSH S.VEMPALA. The random projection method [M]. American Matematical Society. 2005, 13(2):45-49
    [53] A.B.J. TEOH, A. GOH, D.C.L. NGO. Random multi-space quantization as ananalytic mechanism for biohashing of biometric and random identity inputs [J]. IEEE Transactions on Pattern Analysis and Machine Intelligence. 2006, 28(12):1892-1901
    [54] ADAMS KONG, KING-HONG CHEUNG, DAVID ZHANG. Ananalysis of biohashing and its variants [J]. Pattern Recognition. 2006, 39(1):1359-1368
    [55] ANDREW TEOH BENG JIN, TEE CONNIE, DAVID NGO, CHEK LING. Remarks on biohash and its mathematical foundation [J]. Information Processing Letters. 2006, 100(4):145-150
    [56] ANDREW TEOH. Cancelable biometrics: Biohashing and its extensions [R]. Presentation given in Biometrics Engineering Research Center, YonseiUniversity, Seoul, Korea. 2007, (3):19-26
    [57] G. DI CRESCENZO, R. GRAVEMAN, R. GE, G. ARCE. Approximate message authentication and biometric entity authentication [C]. International Conference on Financial Cryptography- FC’05. 2005, 35(7):240-254
    [58] ATALLAH, FRIKKEN, GOODRICH, TAMASSIA. Secure biometric authentication for weak computational devices [C]. International Conference on Financial Cryptography- FC’05. 2005, 35(7):357-371
    [59] XAVIER BOYEN. Reusable cryptographic fuzzy extractors [C]. SIGSAC: Proceedings of the 11th ACM Conference on Computer and Communications Security, Washington. DC, USA. 2004, 29(10):82-91
    [60] WALTER J.SCHEIRER, TERRANCE E.BOULT. Cracking fuzzy vaults and biometric encryption [C]. Proceedings of Biometrics Symposium. 2007, 52(3):1-6
    [61] ALISHER KHOLMATOV, BERRIN YANIKOGLU. Realization of correlation attack against fuzzy vault scheme [J]. Proceedings of SPIE on Security, Forensics, Steganography, and Water-marking of Multimedia Contents X, Electronic Imaging. 2008, 33(7):68-75
    [62] XAVIER BOYEN, YEVGENIY DODIS, JONATHAN KATZ. Secure remote authentication using biometric data [J]. Advances in Cryptology- EUROCRYPT’05. 2005, 34(9):147-163
    [63] YEVGENIY DODIS, JONATHAN KATZ, LEONID REYZIN, ADAM SMITH. Robust fuzzy extractors and authenticated key agreement from close secrets [J]. Advances in Cryptology- CRYPTO’06. 2006, 41(1):232-250
    [64] EE-CHIEN CHANG, QIMING LI. Hiding secret points amidst chaff [J]. Advancesin Cryptology- EUROCRYPT’06. 2006, 40(4):59-72
    [65] ODED GOLDREICH. Modern cryptography, probabilistic proofs and pseudo-randomness [M]. 1998 New York: Springer-Verlag.
    [66] MONI NAOR, OMER REINGOLD. Number-theoretic constructions of efficient pseudo-random functions [J]. Journal of the ACM. 2004, 51(2):231–262
    [67] http://www.neurotechnology.com/verifinger.html.
    [68] D. MAIO, D. MALTONI, R. CAPPELLI, A. JAIN. FVC2002: Second fingerprint verification competition [C]. International Conference on Pattern Recognition. 2002, 16(2):811-814
    [69] J. GOLIC, M. BALTATU. Soft Generation of Secure Biometric Keys [C]. ACISP’07: The 12th Australasian Conference on Information Security and Privacy, Townsville, Australia. 2007, 4(7):107-121

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700