当前位置:网站首页>A privacy protection and authentication method for fingerprint biometrics
A privacy protection and authentication method for fingerprint biometrics
2022-07-18 09:15:00 【Robert's house of Technology】
pick want :
In recent years , More and more intelligent terminals and information systems have integrated biometric technology , And in Finance 、 Widely used in security and other fields . Once the biometric information of users is leaked , It will seriously threaten the vital interests of users . Relying on Fuzzy extraction technology 、 Error correction algorithm and secure hash algorithm , A privacy protection and authentication method of fingerprint biometrics is proposed . In this method , The fingerprint image is not saved in the fingerprint registration stage 、 Details, features and other original information , Only the auxiliary data generated by the error correction coding algorithm and the secure hash algorithm are retained , So as to achieve the purpose of privacy protection . When authenticating , Through the auxiliary data and error correction operation, the image acquisition error is removed and the secure hash operation ciphertext comparison is carried out , Complete user identification .
Content catalog :
0 lead said
1 Privacy protection of biometric information
1.1 Transformation based biometric protection scheme
1.2 Biometric protection scheme based on auxiliary data
2 Privacy protection methods of fingerprint biometrics
2.1 Fingerprint feature binarization method based on fine node distribution
2.2 Privacy protection of fingerprint feature information
3 test result
4 junction language
00 lead said
In recent years , With the wide application of biometric recognition technology , People are increasingly worried about the safety of their own biometrics . Whatever the occasion , As long as you provide your own biometric information , This biometric information has the risk of being copied and stolen . and , Generally speaking, human biological characteristics will not change , Once leaked, it cannot be modified or reset like a password . When the same biometric information is applied to multiple information systems , The disclosure of biometric information in one system will affect the security of other systems .2020 year 10 month , China Academy of communications 、 Telecommunication terminal Industry Association 、 China Internet association and other units jointly published 《 Biometric Privacy Protection Research Report 》. The report points out the need to improve China's biometric privacy protection standard system , Accelerate the development of key standards , Establish an evaluation mechanism , Improve protection , At the same time, we need to innovate biometrics on the technical level
边栏推荐
- Input device drive process
- HMS Core图形图像技术展现最新功能和应用场景,加速构建数智生活
- Analysis of quantum secure communication
- 代码庆端午--粽你心意
- BTC与科技股相关性减弱 市场不确定性增强?53%投资者将转向另类资产
- lscale主题emlog后台管理面板主题源码
- 用户登录和注册功能带验证码
- [unity] skill sharing: how to change the default download resource location of the unity asset store
- 移动应用的专项测试【转载~测试工程师全栈技术进阶与实践】
- 学习经验分享之六:干货博士经验分享
猜你喜欢

【C语言初阶】函数学习报告
![[unity] skill sharing: how to change the default download resource location of the unity asset store](/img/1e/08c937d6f0cc948fe9b8c50843b7b2.png)
[unity] skill sharing: how to change the default download resource location of the unity asset store

HybridCLR——划时代的Unity原生C#热更新技术

《学习的底层逻辑》精华

ROS (25): release a static odometer Odom information

Steam课堂教育理念的延伸与扩展

小目标检测2_OHEM

Cloud document management software docuware cloud how to solve five it problems

Without training code, the reasoning performance is improved by 1.4 ~ 7.1 times, and the industry's first automatic model compression tool is open source!

【LeetCode】10. Maximum Subarray·最大子数组和
随机推荐
VS2019+CUDA11.1新建项目里没有CUDA选项
MySQL 版本升级心得
用户登录和注册功能带验证码
USB driver development process
代码庆端午--粽你心意
解析现代化创客教育的出发点
kingbaseES V8R6集群备份恢复案例之---备库作为repo主机执行物理备份
国内开源镜像网站汇总
Edusoho enterprise training version does not connect to the cloud and starts double speed playback
KingbaseES V8R6 ksql 关闭自动提交
推荐系统究竟是什么?
Win10开启沙盒功能和使用
实现有效的机器人教育培训管理模式
SSH 学习杂记
浅谈脑机接口
HCIP第八天笔记
[Unity]技巧分享:更改Unity Asset Store 默认下载资源位置的方法
ROS(功能包重命名)
云文档管理软件 DocuWare Cloud 如何解决 5 大 IT 难题
GET 请求和 POST 请求的区别和使用