首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 125 毫秒
1.
李恒建  张家树 《中国物理 B》2010,19(4):40505-040505
Based on a coupled nonlinear dynamic filter (NDF), a novel chaotic stream cipher is presented in this paper and employed to protect palmprint templates. The chaotic pseudorandom bit generator (PRBG) based on a coupled NDF, which is constructed in an inverse flow, can generate multiple bits at one iteration and satisfy the security requirement of cipher design. Then, the stream cipher is employed to generate cancelable competitive code palmprint biometrics for template protection. The proposed cancelable palmprint authentication system depends on two factors: the palmprint biometric and the password/token. Therefore, the system provides high-confidence and also protects the user's privacy. The experimental results of verification on the Hong Kong PolyU Palmprint Database show that the proposed approach has a large template re-issuance ability and the equal error rate can achieve 0.02%. The performance of the palmprint template protection scheme proves the good practicability and security of the proposed stream cipher.  相似文献   

2.
Attacks to biometric data are the primary danger to the self-security of biometrics. To improve the iris feature template data security, a data hiding approach based on bit streams is proposed, in which an iris feature template is embedded into a face image. The proposed approach is applicable to present dominant techniques of iris recognition. With the low computation cost and the zero decoding-error-rate, this data hiding approach, embedding target biometrie data into other biometrie data for improving the security of target data in identity recognition, data storage and transmission, can deceive attackers more effectively. Furthermore, it does not degrade the iris recognition performances. Experimental results prove that the proposed approach can be used to protect iris feature templates and enhance the security of the iris recognition system itself.  相似文献   

3.
Biometric systems are gaining importance because of increased reliability for authentication and identification. A biometric recognition technique has been proposed earlier, in which biohashing code has been generated by using a joint transform correlator. The main drawback of the base biohashing method is the low performance of the technique when an “impostor” steals the pseudo-random numbers of the genuine and tries to authenticate as genuine. In the proposed technique, soft biometrics of the same person has been used to improve the discrimination between the genuine and the impostor populations. The soft biometrics are those characteristics that provide some information about the individual, but lack the distinctiveness and permanence to sufficiently differentiate between any two individuals. In the enrolment process, biohash code of the target face images has been integrated with the different soft biometrics of the same person. The obtained code has been stored for verification. In the verification process, biohash code of the face image to be verified is again diffused with the soft biometric of the person. The obtained code is matched with the stored code of the target. The receiving operating characteristic (ROC) curve and the equal error rate (EER) have been used to evaluate the performance of the technique. A detailed study has been carried out to find out the optimum values of the weighting factor for the diffusion process.  相似文献   

4.
一种基于数字全息技术的盲音频水印算法   总被引:1,自引:0,他引:1  
刘薇  顾济华  尉迟亮  陶智 《光子学报》2006,35(11):1788-1792
提出了一种基于数字全息技术的盲音频水印算法.水印图像经随机相位调制形成物光波,该物光波的傅里叶变换与参考光波发生干涉,形成傅里叶变换全息图.再利用离散余弦变换的能量压缩能力,通过量化算法把降维的水印,即傅里叶变换全息图嵌入音频信号中,在水印提取过程中不需要原始音频信号的参与.仿真实验表明,该算法对低通滤波、噪音干扰特别是剪裁具有一定的稳健性.  相似文献   

5.
In a cancelable iris recognition technique, all enrollment patterns are masked using a transformation function, and the invertibility process for obtaining the original data should not be possible. A novel cancelable iris authentication approach in the encrypted domain is presented in this paper. The double random phase encoding (DRPE) algorithm in the Fractional Fourier Transform (FrFT) Domain is utilized to generate the optical masked IrisCodes. For the transmitter side, two encryption keys (RPM1 and RPM2) are utilized, while the second phase mask is proposed to be the right iris feature vector of the same user. As a result, mixing the feature vectors of the left and right iris patterns of the same subject to an encrypted IrisCode results in enhancing the privacy and preserving the system performance. This proposed system success is attributed to the fact that the iris authentication issue is transformed to a key authentication process. Experimental results conducted on CASIA-IrisV3-Interval dataset achieve a significant gain for both privacy and performance proving the superiority of the proposed approach.  相似文献   

6.
In this paper we applied differential evolution (DE) algorithm to balance the tradeoff between robustness and imperceptibility by exploring multiple scaling factors in image watermarking. First of all, the original image is partitioned into blocks and the blocks are transformed into Discrete Cosine Transform (DCT) domain. The DC coefficients from each block are collected to construct a low-resolution approximation image and apply Singular Value Decomposition (SVD) on this approximation image. After that watermark is embedded by modifying singular values with the singular values of the watermark. The role of DE algorithm is to identify the best multiple scaling factors for embedding process in order to achieve the best performance in terms of robustness without compromising with the quality of the image. To enhance the security, watermark is scrambled by Arnold transform before embedding. Experimental results show that the proposed scheme maintains a satisfactory image quality and watermark can still be identified from a seriously distorted image.  相似文献   

7.
基于数字全息及离散余弦变换的图像数字水印技术   总被引:30,自引:9,他引:21  
尉迟亮  顾济华  刘薇  陶智 《光学学报》2006,26(3):55-361
提出了一种以数字全息和离散余弦变换为基础的数字水印技术,实现了在原始图像中嵌入数字全息水印。考虑到数字全息图的不可撕毁性,使得数字全息水印本身就具有良好的抗剪切能力,并且与传统的二维灰度水印相比嵌入的信息更多。数字全息图通过傅里叶变换全息的方法获得,为了提高抗有损压缩能力,在数字全息水印嵌入过程中采用了基于(JPEG模型和分解离散余弦变换(DCT)系数的方法。实验表明,通过该算法获得的数字全息水印对JPEG有损压缩和剪切等图像处理操作均有很好的稳健性,并且采用密钥加强了水印的安全性。因此该算法能成为数字多媒体产品版权保护的有效方案。  相似文献   

8.
小目标检测是声呐图像理解中最引人瞩目,同时又极具挑战性的任务之一。该文基于离散余弦变换和K-近邻聚类,提出了一种快速检测方法。离散余弦变换用于生成图像的指纹,是原始图像在二维频域的一种稀疏表达;改进的K-近邻模型对于带有标签数据的需求量相对较低,提升了算法的处理效率和对弱监督场景的适应性。经试验验证,该方法可在准确率和召回率之间达到一个恰当的平衡点,同时在实时成像的合成孔径声呐图像小目标检测中,获得了较为可靠的结果。  相似文献   

9.
This paper proposed a new algorithm which compresses holographic signals captured or generated as digital data. A captured digital hologram is partitioned into multiple subregions with the same size. Next, if the Discrete Cosine Transform (DCT) is applied to these subregions, information that is visually similar to the original object is derived. Then the correlated subregions are organized into a single video stream and applied with Motion-Compensated Temporal Filtering (MCTF). Lastly, the streams are compressed using a lossy coding algorithm. This paper executed compression from 10:1 to 200:1 of digital holograms and observed the result after the reconstruction process. The numerical results represented about 11% increased compression efficiency compared to the previous researches.  相似文献   

10.
It is known that a variant of Ising model, called Seeded Ising Model, can be used to recover the information content of a biometric template from a fraction of information therein. The method consists in reconstructing the whole template, which is called the intruder template in this paper, using only a small portion of the given template, a partial template. This reconstruction method may pose a security threat to the integrity of a biometric identity management system. In this paper, based on the Seeded Ising Model, we present a systematic analysis of the possible security breach and its probability of accepting the intruder templates as genuine. Detailed statistical experiments on the intruder match rate are also conducted under various scenarios. In particular, we study (1) how best a template is divided into several small pieces called partial templates, each of which is to be stored in a separate silo; (2) how to do the matching by comparing partial templates in the locked-up silos, and letting only the results of these intra-silo comparisons be sent to the central tallying server for final scoring without requiring the whole templates in one location at any time.  相似文献   

11.
蔡加祥  洪旗  杨斌 《中国物理 B》2017,26(10):100202-100202
Local structure-preserving algorithms including multi-symplectic, local energy-and momentum-preserving schemes are proposed for the generalized Rosenau–RLW–Kd V equation based on the multi-symplectic Hamiltonian formula of the equation. Each of the present algorithms holds a discrete conservation law in any time–space region. For the original problem subjected to appropriate boundary conditions, these algorithms will be globally conservative. Discrete fast Fourier transform makes a significant improvement to the computational efficiency of schemes. Numerical results show that the proposed algorithms have satisfactory performance in providing an accurate solution and preserving the discrete invariants.  相似文献   

12.
Fusion of multiple biometrics for human authentication performance improvement has received considerable attention. This paper presents a novel multimodal biometric authentication method integrating face and iris based on score level fusion. For score level fusion, support vector machine (SVM) based fusion rule is applied to combine two matching scores, respectively from Laplacianface based face verifier and phase information based iris verifier, to generate a single scalar score which is used to make the final decision. Experimental results show that the performance of the proposed method can bring obvious improvement comparing to the unimodal biometric identification methods and the previous fused face-iris methods.  相似文献   

13.
In this article, we propose a novel finger multimodal biometric authentication that combines finger vein, fingerprint, finger shape and finger knuckle print features of a single human finger. The proposed multimodal biometrics provides score-level fusion approach based on triangular norm with four finger biometric traits, instead of two or three ones combined in the previous approaches. The experimental evaluations and analysis are conducted on a merged multimodal biometrics database. The results show that the proposed score-level fusion approach using triangular norm obtains a larger distance between genuine and imposter score distribution as well as achieves lower error rates. Moreover, the comparison results suggest that the proposed score level fusion of finger biometrics using triangular norm outperforms the state-of-the-art approaches.  相似文献   

14.
廖骎  郭迎  黄端 《中国物理 B》2017,26(9):90302-090302
With the increasing popularity of fingerprint identification technology, its security and privacy have been paid much attention. Only the security and privacy of biological information are insured, the biological technology can be better accepted and used by the public. In this paper, we propose a novel quantum bit(qbit)-based scheme to solve the security and privacy problem existing in the traditional fingerprint identification system. By exploiting the properties of quantum mechanics, our proposed scheme, cancelable remote quantum fingerprint templates protection scheme, can achieve the unconditional security guaranteed in an information-theoretical sense. Moreover, this novel quantum scheme can invalidate most of the attacks aimed at the fingerprint identification system. In addition, the proposed scheme is applicable to the requirement of remote communication with no need to worry about its security and privacy during the transmission. This is an absolute advantage when comparing with other traditional methods. Security analysis shows that the proposed scheme can effectively ensure the communication security and the privacy of users' information for the fingerprint identification.  相似文献   

15.
We implement a first practical holographic security system using electrical biometrics that combines optical encryption and digital holographic memory technologies. Optical information for identification includes a picture of face, a name, and a fingerprint, which has been spatially multiplexed by random phase mask used for a decryption key. For decryption in our biometric security system, a bit-error-detection method that compares the digital bit of live fingerprint with of fingerprint information extracted from hologram is used.  相似文献   

16.
In order to improve the recognition accuracy of the unimodal biometric system and to address the problem of the small samples recognition, a multimodal biometric recognition approach based on feature fusion level and curve tensor is proposed in this paper. The curve tensor approach is an extension of the tensor analysis method based on curvelet coefficients space. We use two kinds of biometrics: palmprint recognition and face recognition. All image features are extracted by using the curve tensor algorithm and then the normalized features are combined at the feature fusion level by using several fusion strategies. The k-nearest neighbour (KNN) classifier is used to determine the final biometric classification. The experimental results demonstrate that the proposed approach outperforms the unimodal solution and the proposed nearly Gaussian fusion (NGF) strategy has a better performance than other fusion rules.  相似文献   

17.
基于gyrator变换和矢量分解的非对称图像加密方法   总被引:1,自引:0,他引:1       下载免费PDF全文
姚丽莉  袁操今  强俊杰  冯少彤  聂守平 《物理学报》2016,65(21):214203-214203
本文结合矢量分解和gyrator变换的数学实现得到了一种新的非对称图像加密算法,它将待加密图像先通过矢量分解加密到两块纯相位板中,然后利用从gyrator变换的数学实现中推导出来的加密算法加密其中一块相位板,获得最终的实值密文.另一块相位板作为解密密钥.算法的解密密钥不同于加密密钥,实现了非对称加密,加密过程中产生的两个私钥增大了算法的安全性.数值模拟结果验证了该算法的可行性和有效性.  相似文献   

18.
为了获取复杂涂层目标的光学散射特性,介绍了一套全自动偏振双向反射分布函数测量系统,可以测量半球空间内几乎所有角度下的偏振双向反射分布函数。采用双波片旋转法实现了对光的偏振调制,利用离散傅里叶变换反演出了涂层目标的Muller矩阵。给出了某涂层样品的测量结果与模型的计算比较。结果表明,这种方法是一种测量涂层目标偏振双向反射分布函数的有效方法。  相似文献   

19.
In this work a novel method is proposed for simultaneous determination of refractive index n and geometrical thickness d. Transmittance spectra of dielectric films, exhibiting weakly absorbance in 14,285–14,492 cm−1 region, were exposed to Discrete Fourier Transform (DFT) whereby {n,d} values were extracted at the same time. Refractive index variation of films is assumed to be constant in the measurement range. Obtained results revealed favourable accordance with the literature and mechanical micrometer readings.  相似文献   

20.

The study explores the implementation of watermarking schemes for quantum audio signals based on quantum Discrete Cosine Transform (qDCT). Dual Quantum Audio Watermarking (QAW) schemes, i.e. QAW-I and QAW-II, are proposed by utilizing the property of strong energy compaction of the qDCT. The qDCT transforms the host quantum audio signal which is encoded as an FRQA (Flexible Representation for Quantum Audio) content from time to frequency domain. To retain the high imperceptibility of the dual QAW schemes, the quantum watermark is embedded into the high-frequency portions of host quantum audio signal after the qDCT operation. The circuit networks to execute the embedding and extraction procedures of QAW-I and QAW-II schemes are designed. In addition, simulation-based experiments are conducted to demonstrate their implementation and conclude their advantages in terms of imperceptibility and robustness.

  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号