JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2014, Vol. 49 ›› Issue (09): 17-23.doi: 10.6040/j.issn.1671-9352.2.2014.146

Previous Articles     Next Articles

Research on multi-fuzzy vault algorithm based on random vaules of fingerprint characteristics

L Yang, ZHANG Gong-xuan, YANG Wen, WANG Tian-shu   

  1. School of Computer Science and Engineering, Nanjing University of Science And Technology, Nanjing 210094, Jiangsu, China
  • Received:2014-04-28 Revised:2014-08-27 Online:2014-09-20 Published:2014-09-30

Abstract: The security of Fuzzy Vault algorithm depends on the fingerprint template and the locking algorithm. By using the functions with variable parameters to transform the original values of fingerprint characteristics, a random value of fingerprint characteristic was generated. Also the multi-fuzzy vaults were formed by the key separation which allows more users to manage the fuzzy vaults together. Thus, the revocability of the fingerprint template was achieved and then the security of the original algorithm was improved.

Key words: variable parameters, revocability, key separation, muti-fuzzy vault, fingerprint

CLC Number: 

  • TP309
[1] 林文峰,杨帆,陈国民.基于指纹的数字信息加密算法[J].计算机工程,2010, 36(8):132-134. LIN Wenfeng, YANG Fan, CHEN Guomin. Digital information encryption algorithm based on fingerprint[J]. Computer Engineering, 2010, 36(8): 132-134.
[2] JUELS A, SUDAN M. A fuzzy vault scheme [C]//Proceedings of the 2002 International Symposium on Information Theory. Piscataway: IEEE, 2002:408-426.
[3] 游林,杨玲.基于指纹改进的模糊金库算法[J].杭州电子科技大学学报,2012, 32(5):49-52. YOU Lin, YANG Ling. Modified fuzzy vault scheme based on fingerprints [J]. Journal of Hangzhou Dianzi University, 2012, 32(5): 49-52.
[4] HIEP D V, TRAN Q D, NGUYEN THI H L. A multibiometric encryption key algorithm using fuzzy vault to protect private key in BioPKI based security system[C]// Proceedings of 2010 IEEE RIVF International Conference on Computing and Communication Technologies, Research, Innovation, and Vision for the Future (RIVF). Piscataway: IEEE, 2010:1-6.
[5] 滕旭.基于二维码的证件管理研究与应用[D].西安:西安科技大学,2011. TENG Xu. Research and application of identification management based on two dimensional barcode[D]. Xi'an: Xi'an University of Science and Technology, 2011.
[6] 刘艳涛,游林.一种改进的随机性模糊金库算法[J].科技通报,2011, 27(2):288-292. LIU Yantao, YOU Lin. An improved randomness fuzzy vault scheme[J]. Bulletin of Science and Technology, 2011, 27(2): 288-292.
[1] ZHAO Jun-sheng1,2, WANG Xiu-li1,2, GAO Ming-wei1,2, WANG Jia-bao1,2, WANG Yong-cui1,2, CHEN Ying1,2, JIANG Hui1,2, YANG Jing1,2, WANG Liu-mi. Construction and application of SSR fingerprints of hybrid #br# cotton variety Lu 05H9 with red-corolla marker trait [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(1): 44-49.
[2] GUO Wen-juan, YANG Gong-ping*, DONG Jin-li. A review of fingerprint image segmentation methods [J]. J4, 2010, 45(7): 94-101.
[3] ZHANG Xiao-mei,JIA Tong-hui,YIN Yi-long,ZHAN Xiao-si . Ridge distance estimation methods based on multi-peak detection and energy weight [J]. J4, 2008, 43(3): 34-39 .
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!