期刊文献+

基于保守超混沌系统的虹膜特征提取算法

Iris Feature Extraction Algorithm Based on Conservative Hyperchaotic System
下载PDF
导出
摘要 虹膜特征与其他生物特征相比具有独特优势,因其可以为加密算法生成足够长的密钥。虹膜特征提取是虹膜识别过程中的关键问题。针对密钥安全性和计算效率两大问题,提出了一种新颖的基于保守超混沌系统的虹膜特征提取方法,并结合局部二进制模式(Local Binary Pattern,LBP)和高斯函数差分(Difference of Gaussian,DOG)技术。首先,选择五维保守超混沌系统,验证其保守性和超混沌性质;其次,根据375位虹膜特征码和上述系统,产生特征矩阵,并对该矩阵进行图像增强处理;最后,通过提取DOG极值点和LBP特征,并根据提出的特征融合规则生成128位密钥。实验表明,生成的密钥可以通过美国国家标准与技术研究院(National Institute of Standards and Technology,NIST)随机性测试,且对虹膜特征码极其敏感。 The iris feature has unique advantages over other biometric features because it can generate sufficiently long keys for encryption algorithm.Iris feature extraction is a key issue in iris recognition process.In response to the two major issues of key security and computational efficiency,a novel iris feature extraction method based on conservative hyper-chaotic system is proposed,which combines LBP(Local Binary Pattern)and DOG(Difference of Gaussian)technology.First,a five-dimensional conservative hyper-chaotic system is selected and its conservatism and hyper-chaotic properties are verified.Then,according to 375-bit iris feature code and the above system,a feature matrix is generated and the matrix is subjected to image enhancement processing.Finally,DOG extreme points and LBP features are extracted from the above matrix,and 128 final keys are generated according to the feature fusion rules proposed in this paper.The experimental results indicate that the generated keys can pass the NIST(National Institute of Standards and Technology)randomness test and are extremely sensitive to iris feature codes.
作者 赵中军 杜久龙 邓雷升 涂清 ZHAO Zhongjun;DU Jiulong;DENG Leisheng;TU Qing(No.30 Institute of CETC,Chengdu Sichuan 610041,China)
出处 《通信技术》 2024年第2期132-138,共7页 Communications Technology
关键词 超混沌系统 保守系统 虹膜特征提取 局部二进制模式LBP hyper-chaotic system conservative system iris feature extraction LBP
  • 相关文献

参考文献2

二级参考文献26

  • 1田启川,潘泉,程咏梅,张洪才.不完全虹膜模式唯一性实验研究[J].计算机应用研究,2006,23(2):237-239. 被引量:3
  • 2杨建国.小波分析及其工程应用[M].北京:机械工业出版社,2007. 被引量:15
  • 3RichardSpillman.经典密码学与现代密码学[M].叶阮健,曹英,张长富,译.北京:清华大学出版社,2005. 被引量:9
  • 4D.G.Abraham,G.M.Dolan,G.P.Double,and J.V. Stevens,Transaction security system [J],IBM Systems Journal, 1991,30(2),206-229. 被引量:1
  • 5F.Monrose,M.K.Reiter, Q.Li,et al.and S.Wetzel, Cryptographic key generation from voice [J].IEEE Symposium on Security and Privacy, 2001:202-213. 被引量:1
  • 6F.Monrose,M.K.Reiter, and R.Wetzel,Password hardening based on keystrokedynamics,Proc.Of Sixth ACM Conference of Computer and Communication Security [C].USA: ACM Press,1999:73-82. 被引量:1
  • 7Charles C,Negar K.Dermis J L.Secure Smartcard -Based Fingerprint Authentication [c].2003 ACM Workshop on Biometrics Methods and Application[C], Berkeley, California, 2003:45-52. 被引量:1
  • 8K.Bowyer and K.Hollingsworth and P.Flynn. Image understanding for iris biometrics:a survey.Computer Vision and Image Understanding [C],2008.,110 (2), 281-307. 被引量:1
  • 9John Daugman.New Methods in Iris Recognition. IEEE Transactions on Systems,Man,and Cybemectics-- Part B:Cybemectics,2007,37(5), 1167-1174. 被引量:1
  • 10ZHANG YI,LI Jianping.Overview on Thresho- lding Functions of Wavelet Shrinkage [C]//Proc of the Int'l Conference on Information Computing and Autom- ation,2007:102 - 103. 被引量:1

共引文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部