期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
双光源虹膜防散焦成像及特征增强方法
1
作者 王晟轶 韩源平 《计算机工程与设计》 北大核心 2023年第6期1775-1780,共6页
为解决特征图像采集过程中的散焦和图像增强问题,研究基于光斑特征分析的自适应图像复原和增强方法,提出一种基于光斑点的人机交互和图像复原解决方案。在不改变成像系统技术结构、不提高成本的前提下,显著降低散焦程度,清除散焦对图像... 为解决特征图像采集过程中的散焦和图像增强问题,研究基于光斑特征分析的自适应图像复原和增强方法,提出一种基于光斑点的人机交互和图像复原解决方案。在不改变成像系统技术结构、不提高成本的前提下,显著降低散焦程度,清除散焦对图像质量的影响;利用约束最小二乘滤波器进行散焦图像的进一步复原,得到有效的适用于编码和识别的排序测度特征。实验结果表明,该方法可以大幅度提升成像图像质量,在增强编码处理后,提供优质的虹膜特征数据,为下一步虹膜图像编码和识别提供支撑。 展开更多
关键词 生物特征 身份认证 虹膜图像编码 散焦 景深 特征增强 交互接口
下载PDF
Biometric Signature of Private Key by Reliable Iris Recognition Based on Flexible-ICA Algorithm
2
作者 Aissa Boukhari Salim Chitroub Imen Bouraoui 《International Journal of Communications, Network and System Sciences》 2011年第12期778-789,共12页
The numerical world is under a fast development generating facilities and threats. The recommended solutions are especially the protection of information in all its states. The levels of protection show a discrepancy ... The numerical world is under a fast development generating facilities and threats. The recommended solutions are especially the protection of information in all its states. The levels of protection show a discrepancy from an application to another;governmental, commercial or even cybercriminal. The infrastructure used in modern cryptography is based on public key cryptosystem. The problem is how to make safe the private key and to memorize it without difficulties and damages. This paper introduces a biometric solution of owner signature generating an encryption of the key using the iris recognition kept in a smart card. Several precautions were taken to guarantee the safety and the availability of the use of the private key. They are two essential goals to attest: the quality of the service and the robustness of suggested safety. Being the quality of the service, the used iris recognition is based on a new emerging method founded on Flexible-ICA algorithm. This method offers a better Equal Error rate compared to other methods previously used. This quality of recognition was also reinforced by an encoding of error using a flag and finally Reed Solomon encoder. For recommended safety, a scheme based on block encryption is used. The proposed scheme is Propagating Cipher Block chaining which offers a very propagation of a high level of confusion and diffusion. Indeed, the robustness of this cryptographic process was studied by setting up strict criteria of safety. 展开更多
关键词 image Processing CRYPTOSYSTEM Public Key iris Recognition code REED SOLOMON Independent Component Analysis (ICA)
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部