欢迎来到天天文库
浏览记录
ID:52471744
大小:129.95 KB
页数:9页
时间:2020-03-27
《Symmetric Hash Functions for FingerprintMinutiae指纹地对称散列函数 细节点.pdf》由会员上传分享,免费在线阅读,更多相关内容在教育资源-天天文库。
1、SymmetricHashFunctionsforFingerprintMinutiaeSergeyTulyakov,FaisalFarooqandVenuGovindarajuSUNYatBuffalo,BuffaloNY14228,USAAbstract.Thepossibilitythatadatabasewithbiometricdataiscom-promisedisoneofthemainconcernsinimplementingbiometricidentifi-cationsystems.Inthispaperwepresentamethodofhash
2、ingfingerprintminutiainformationandperformingfingerprintidentificationinanewspace.Onlyhasheddataistransmittedandstoredintheserverdata-base,anditisnotpossibletorestorefingerprintminutialocationsusinghasheddata.Wealsopresentaperformanceanalysisoftheproposedalgorithm.1IntroductionTheproblemwe
3、aredealingwithiswelldescribedinsection9.7ofHandbookofFingerprintrecognition[1].Plaintextpasswordscanbehashed,andonlyhashvaluesarestoredinthedatabaseandtransmittedacrossnetworks.Passwordauthenticationrequirescomparisonofthehashedvaluesandnotoriginalpass-words.Ifdatabasewithhashvaluesise
4、vercompromised,allpersonscanbereenrolledusingdifferentpasswordsordifferenthashfunction.Situationisdifferentwhenusingbiometricdataforpersonauthentication.Duetothedifficultyofdevisinghashingfunctionsforbiometricdatabiometrictemplatesareusuallystoredunprotectedinacentraldatabase.Evenifstoredte
5、mplatesareencrypted,matchingisstillperformedusingdecryptedtemplates,anddecryptionprocesscanbecompromisedaswell.Ifthebiometricdatabaseiscompromisedandanintruderobtainsaperson’sbiometrictemplate,usingthisbiometricwillbeimpossiblefortherestofperson’slife.Inthisworkwewanttodeviseamethodfor
6、biometricdata,inparticularfingerprintdata,tobehashed,andthebiometricidentificationtobeperformedusinghashedbiometricdata.Hashingfunctionsareone-wayfunctions,andgiventhehashvaluesitisimpossibletoreconstructoriginaltemplate.Onlythehashvaluesaretransmittedoverthenetworkandstoredinthebiometri
7、cdatabase.Incasethehashvaluesarecompromised,personwillbere-enrolledusingnewhashfunction.Theoriginalbiometric(e.g.fingerprint)issafeandnevercompromised.Figure1presentsadiagramofasystemusingproposedhashingalgorithm.Fingerprintsareobtainedbythescanner,minutialocationsarefoundandhashesofm
此文档下载收益归作者所有