An Improved Biohashing Algorithm Based on Key Generation Principle

被引:0
|
作者
Li, Huixian [1 ]
Wang, Xuan [1 ]
Pang, Liaojun [2 ]
Wang, Yumin [2 ]
机构
[1] School of Computer Science and Engineering, Northwestern Polytechnical University, Xi'an 710072, China
[2] The Ministry of Education Key Laboratory of Computer, Networks and Information Security, Xidian University, Xi'an 710071, China
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, an improved Biohashing algorithm is proposed, mainly related to the security issue of the base Biohashing algorithm when an impostor steals the Token. At first, based on the principle of the key generation algorithm, an auxiliary data HelperData is generated, which is blended by the biometric data and the Token held by the user. Then the HelperData which is used in place of the Token is fed to the base Biohashing system. Experimental results over FVC2002 DB1show that the improved algorithm can maintain a very low equal error rate when nobody steals the Token, and reach good performance also when an impostor steals the Token. © 2011 Binary Information Press December, 2011.
引用
收藏
页码:5068 / 5075
相关论文
共 50 条
  • [31] Calligraphy generation algorithm based on improved generative adversarial network
    Li Y.-H.
    Duan J.-J.
    Su X.-P.
    Zhang L.-T.
    Yu H.-K.
    Liu X.-R.
    Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2023, 57 (07): : 1326 - 1334+1459
  • [32] An improved algorithm for allocation of reactive compensation devices based on key paths
    Chen, Xing-Hua
    Zhang, Yao
    Wu, Zhi-Gang
    Power System Technology, 2004, 28 (02) : 53 - 55
  • [33] An Improved Public Key Cryptographic Algorithm Based on Chebyshev Polynomials and RSA
    Zhang, Chunfu
    Liang, Yanchun
    Tavares, Adriano
    Wang, Lidong
    Gomes, Tiago
    Pinto, Sandro
    SYMMETRY-BASEL, 2024, 16 (03):
  • [34] An Improved AES Key Expansion Algorithm
    Yan, Junjie
    Chen, Feng
    Proceedings of the 2016 International Conference on Electrical, Mechanical and Industrial Engineering (ICEMIE), 2016, 51 : 113 - 116
  • [35] A key generation algorithm for biometric cryptosystems based on TD-ERCS
    Zhou Qing
    Hu Yue
    Liao Xiao-Feng
    ACTA PHYSICA SINICA, 2009, 58 (07) : 4477 - 4484
  • [36] High Security Speech BioHashing Authentication Algorithm Based on Multi-feature Fusion
    Huang, Yi Bo
    Li, Hao
    Wang, Yong
    Zhang, Qiu Yu
    International Journal of Network Security, 2021, 23 (06) : 962 - 972
  • [37] Adaptive firefly algorithm based optimized key generation for image security
    Sinha, Rupesh Kumar
    Sahu, Sitanshu Sekhar
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2019, 36 (05) : 4437 - 4447
  • [38] Attack Algorithm for a Keystore-Based Secret Key Generation Method
    Chae, Seungjae
    Kim, Young-Sik
    No, Jong-Seon
    Kim, Young-Han
    ENTROPY, 2019, 21 (02):
  • [39] Profiling Attack against RSA Key Generation Based on a Euclidean Algorithm
    de la Fe, Sadiel
    Park, Han-Byeol
    Sim, Bo-Yeon
    Han, Dong-Guk
    Ferrer, Carles
    INFORMATION, 2021, 12 (11)
  • [40] Distributed Physical Layer Key Generation Algorithm Based on Deep Learning
    Geng, Wanting
    Sun, Li
    Du, Qinghe
    2023 IEEE 98TH VEHICULAR TECHNOLOGY CONFERENCE, VTC2023-FALL, 2023,