为构建基于DSP(Digital Signal Processor)的虹膜识别系统,需要依据所采用的DSP硬件系统,将现有的虹膜识别算法移植到DSP的开发环境中。本文详细的阐述了虹膜识别算法的DSP移植过程中的关键点,解决了在程序移植过程中所遇到的与硬件系...为构建基于DSP(Digital Signal Processor)的虹膜识别系统,需要依据所采用的DSP硬件系统,将现有的虹膜识别算法移植到DSP的开发环境中。本文详细的阐述了虹膜识别算法的DSP移植过程中的关键点,解决了在程序移植过程中所遇到的与硬件系统相关的一系列问题,特别是针对在DSP存储空间有限的状态下存储器和虹膜代码的优化问题。完成了虹膜识别程序的DSP移植,进而实现了基于TMS320DM642的虹膜识别系统。移植后的虹膜识别系统采用DSP/BIOS内核,使用多任务调度,提高了程序执行效率。展开更多
介绍了现行的医院信息系统(hospital information system,HIS)以实体卡作为患者身份认证标识的认证方式存在着冒用、盗用的风险,分析了虹膜识别技术在HIS患者管理及院内医务管理中的应用。指出了虹膜识别技术以其安全性高、保密性强、...介绍了现行的医院信息系统(hospital information system,HIS)以实体卡作为患者身份认证标识的认证方式存在着冒用、盗用的风险,分析了虹膜识别技术在HIS患者管理及院内医务管理中的应用。指出了虹膜识别技术以其安全性高、保密性强、稳定性高和可靠性高的特点,应用于HIS中可提高管理的效率和准确度,提升医院的现代化管理水平。展开更多
The numerical world is under a fast development generating facilities and threats. The recommended solutions are especially the protection of information in all its states. The levels of protection show a discrepancy ...The numerical world is under a fast development generating facilities and threats. The recommended solutions are especially the protection of information in all its states. The levels of protection show a discrepancy from an application to another;governmental, commercial or even cybercriminal. The infrastructure used in modern cryptography is based on public key cryptosystem. The problem is how to make safe the private key and to memorize it without difficulties and damages. This paper introduces a biometric solution of owner signature generating an encryption of the key using the iris recognition kept in a smart card. Several precautions were taken to guarantee the safety and the availability of the use of the private key. They are two essential goals to attest: the quality of the service and the robustness of suggested safety. Being the quality of the service, the used iris recognition is based on a new emerging method founded on Flexible-ICA algorithm. This method offers a better Equal Error rate compared to other methods previously used. This quality of recognition was also reinforced by an encoding of error using a flag and finally Reed Solomon encoder. For recommended safety, a scheme based on block encryption is used. The proposed scheme is Propagating Cipher Block chaining which offers a very propagation of a high level of confusion and diffusion. Indeed, the robustness of this cryptographic process was studied by setting up strict criteria of safety.展开更多
文摘为构建基于DSP(Digital Signal Processor)的虹膜识别系统,需要依据所采用的DSP硬件系统,将现有的虹膜识别算法移植到DSP的开发环境中。本文详细的阐述了虹膜识别算法的DSP移植过程中的关键点,解决了在程序移植过程中所遇到的与硬件系统相关的一系列问题,特别是针对在DSP存储空间有限的状态下存储器和虹膜代码的优化问题。完成了虹膜识别程序的DSP移植,进而实现了基于TMS320DM642的虹膜识别系统。移植后的虹膜识别系统采用DSP/BIOS内核,使用多任务调度,提高了程序执行效率。
文摘介绍了现行的医院信息系统(hospital information system,HIS)以实体卡作为患者身份认证标识的认证方式存在着冒用、盗用的风险,分析了虹膜识别技术在HIS患者管理及院内医务管理中的应用。指出了虹膜识别技术以其安全性高、保密性强、稳定性高和可靠性高的特点,应用于HIS中可提高管理的效率和准确度,提升医院的现代化管理水平。
文摘The numerical world is under a fast development generating facilities and threats. The recommended solutions are especially the protection of information in all its states. The levels of protection show a discrepancy from an application to another;governmental, commercial or even cybercriminal. The infrastructure used in modern cryptography is based on public key cryptosystem. The problem is how to make safe the private key and to memorize it without difficulties and damages. This paper introduces a biometric solution of owner signature generating an encryption of the key using the iris recognition kept in a smart card. Several precautions were taken to guarantee the safety and the availability of the use of the private key. They are two essential goals to attest: the quality of the service and the robustness of suggested safety. Being the quality of the service, the used iris recognition is based on a new emerging method founded on Flexible-ICA algorithm. This method offers a better Equal Error rate compared to other methods previously used. This quality of recognition was also reinforced by an encoding of error using a flag and finally Reed Solomon encoder. For recommended safety, a scheme based on block encryption is used. The proposed scheme is Propagating Cipher Block chaining which offers a very propagation of a high level of confusion and diffusion. Indeed, the robustness of this cryptographic process was studied by setting up strict criteria of safety.