基于生物特征信息隐藏与身份认证及其应用研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着计算机网络的蓬勃发展,越来越多的资源和应用都是利用网络远程获取和得到授权的服务,如何确保特定的资源只能被合法、授权的用户访问和使用,即如何正确地鉴别用户的身份是保证通信网和系统数据安全的首要条件。而且,在网络环境下,如何验证生物特征图像的完整性、如何安全可靠地实现远程身份认证、如何确保生物特征的隐私性和秘密数据的安全性、如何确保数字媒体数据的版权等成为开放网络环境下的研究热点。
     本论文主要研究基于生物特征信息隐藏与身份认证方案,该方案是充分利用生物特征识别技术、密码技术和信息隐藏技术来实现远程身份认证,并获得服务器提供的授权服务,而且还能有效地提高秘密数据的安全性和生物特征数据的隐私性。本文所做的主要贡献如下:
     1、提出了基于SVD和脆弱水印的生物特征图像的完整性认证算法。针对奇异值分解理论与脆弱水印的特性,提出了如何在网络环境下对远程用户传输的生物特征图像完整性的认证方法。实验结果表明:基于SVD和脆弱水印的生物特征图像完整性认证方法是行之有效的,可用于生物特征图像完整性认证系统。该认证算法可用于远程身份认证系统中的用户端的用户只负责生物特征图像采集和认证的水印嵌入,而在具有较大运算处理能力的服务器端进行认证水印的提取与认证、特征的提取与匹配,从而确认远端用户的身份。
     2、提出了基于Radon变换和奇异值分解的手指静脉识别算法。该识别算法首先利用Radon变换来提取手指静脉图像的方向信息,并构成投影矩阵;其次,利用奇异值分解来提取投影矩阵的奇异值作为手指静脉模式的特征向量;最后,利用归一化距离来计算其相似度。实验结果表明:提出的识别算法对手指静脉具有不错的识别效果。
     3、提出了基于指纹的远程身份认证与密钥协商。该研究主要采用现有的指纹识别算法与密码技术相结合的方式,实现基于指纹的自认证后释放对存有秘密信息的智能卡的控制权,通过密码协议实现与远端服务器之间的相互认证,克服了集中存放用户指纹特征信息的安全风险。同时,为了对用户指纹特征数据的安全性与隐私性保护,用户的指纹特征数据都是通过密钥加密传输,克服了传统的身份认证和生物特征识别系统的安全问题,提升了在安全威胁的情况下的整个认证体系的安全性和隐私性。
     4、提出了基于双线性对和手指静脉的远程双向认证与密钥协商。该研究主要利用超椭圆曲线上的双线性对性质(计算速度快和安全效率高、密钥大小和带宽要求低)与手指静脉识别算法,构建了在分布式网络环境下的身份认证与密钥协商协议。通过安全分析表明,提出的身份认证协议是合理的、安全的,提升了在安全威胁的情况下的整个认证系统的安全性和隐私性。
     5、提出了基于生物特征信息隐藏与识别的多因子身份认证与密钥协商。首先构造了生物特征信息隐藏的基本模型;然后提出了基于双正交样条小波(bior4.4)的生物特征信息隐藏算法,并用实验验证提出的基于小波域的双正交样条小波对生物特征信息隐藏算法对攻击的有效性和鲁棒性;接着我们还构造了基于生物特征信息隐藏与识别的远程身份认证系统,该系统相比于传统的生物特征认证系统具有更高的安全性,即使攻击者窃取了该隐密的载体图像,也很难判断是否存在隐密特征与提取得到生物特征,体现了对用户生物特征数据的隐私保护;最后给出了基于生物特征信息隐藏与识别的多因子身份认证与密钥协商,该协议充分利用生物特征识别技术、信息隐藏技术、密码技术及智能卡技术来安全实现远程身份认证,并通过安全性分析与功能分析表明,提出的认证协议不但具有高度安全性,而且保护了用户的隐私。
     6、提出了基于人脸图像与虹膜特征的双重水印技术在版权保护中的应用。首先介绍了可见人脸图像水印和不可见虹膜特征水印的产生;接着介绍了双重生物特征水印的算法;最后通过实验验证了提出的双重生物特征水印算法的稳健性与有效性,其中以人脸图像为可见水印起到明显地标示数字媒体图像的所有者,以虹膜特征为不可见水印可以在版权纠纷时起到提供法律依据和确保对数字媒体图像的版权,这对数字媒体数据提供双重保护,从而更加有效地遏制非法复制和篡改。
With the vigorous development of computer network, more and more resourcesand application can be obtained, and the authorized services can be gained through theremote access to the server. How to ensure a particular resource can only be accessedand used for legitimate and authorized users, namely, how to correctly identify theuser’s identity is a primary condition for ensuring communications network andsystem’s data. Moreover, under the open network environment, how to verify theintegrity of biometric images, how to achieve remote authentication, how to ensure theprivacy and security of biometrics and secret data, how to ensure the copyright of digitalmedia data and so on are to attract more attention.
     The main study is based on biometric information hiding and authenticationscheme in the thesis, which is the complete use of biometric technology, cryptographyand information hiding technology to enable remote authentication and the serverproviding the service, and can effectively improve the security of confidential data andthe privacy of biometric data. The main contributions of this thesis are as follows:
     1. A biometric image integrity authentication method using the singular valuedecomposition(SVD) and fragile watermarking is proposed. According to the singularvalue decomposition theory and characteristics of fragile watermarking, a biometricimage integrity authentication method for the remote user transmitted biometric imagesis presented under the environment of network. Experimental results indicate that thefragile watermarking based on the SVD and image integrity of biometric authenticationmethod is effective, and can be used for biometric image integrity verification system.To confirm the identity of the remote user, the proposed authentication scheme can beapplied to the biometric image integrity authentication, in which, the users areresponsible for the biometric image capture and the authenticated watermark embedding,and the server which has a large processing capacity is responsible for the authenticatedwatermark extraction and verification, feature extraction and matching.
     2. A finger-vein recognition algorithm based on Radon transform and singularvalue decomposition is proposed. First of all, the recognition algorithm using the Radon transform extracts finger-vein image orientation information and then constructs aprojection matrix. Second, the projection matrix singular value is extracted usingsingular value decomposition as the finger vein pattern feature vector. Finally,normalized distance used to calculate the similarity. Experimental results indicate thatthe proposed recognition algorithm for finger-vein recognition is effective.
     3. A remote authentication and key agreement protocol based on fingerprint isproposed. The protocol used mainly the current existing fingerprint recognitionalgorithm and cryptography to gain control of the user’s smart card stored secretmessage, and achieved mutual authentication between the user and the server of theproposed authentication system using cryptographic protocols, and overcome thesecurity risks of a centrally stored users’ fingerprint features in the server. Meanwhile,to protect users’ fingerprint features data security and privacy, users’ fingerprint featuresare transmitted after users’ fingerprint features are encrypted using secret keys, so ourproposed authentication protocol can overcome the security issues of traditionalauthentication and biometric identification systems and enhance the security andprivacy of authentication system in case of security threats.
     4. A remote mutual authentication and key agreement protocol based on bilinearpairings and finger-vein is proposed. An authentication and key agreement protocolusing the properties of bilinear pairings on super elliptic curves (i.e., calculation speedof high efficiency and security, key size, and lower bandwidth requirements) andfinger-vein recognition algorithms in a distributed network environment is mainlystudied. The security analyses show that the proposed authentication protocol isreasonable and secure, and then it enhances the security and privacy of authenticationsystem in case of security threats.
     5. A multi-factor authentication and key agreement protocol based biometricinformation hiding and recognition is presented. First, the basic model of biometricinformation hiding is constructed. Second, we propose a biometric information hidingbased on bi-orthogonal spline wavelet, and the robustness and validity of the proposedbiometric information hiding algorithm with suffering some attacks is proved byexperiments. Third, we also constructed a remote authentication system based oninformation hiding and recognition using biometrics, the system has higher securitycompared to traditional biometric authentication system, even the attacker who has stolen the carrier image of hidden biometrics is also difficult to judge whether whichexists hidden biometrics or not, and extract the hidden biometrics in carrier image. Soour proposed authentication system can protect users’ privacy. Finally, we present amulti-factor authentication and key agreement protocol based biometric informationhiding and recognition. The proposed protocol can achieves remote authentication fullyusing the biometric information hiding, cryptography and smartcard technology, and thesecurity and function analyses indicate that the proposed protocol has not only a highdegree of security but protection of users’ privacy.
     6. A dual watermarking technique using facial image and iris feature for thecopyright protection is presented. First we described how to generate visible facialimage watermark and invisible iris feature watermark; then an dual biometricwatermarking algorithm is described; finally, the robustness and effectiveness of theproposed watermarking algorithm by some experiments is proved, in the proposed dualwatermarking algorithm, facial image is visible watermark and can mark an owner ofdigital media image, iris feature is invisible watermark and can provides legal pursuantand ensure owner copyright of digital media image under copyright dispute, so A dualwatermarking technique using facial image and iris feature for the copyright protectioncan be more effectively prevent an illegally copied and tampered digital media image.
引文
[1] D. Zhang. Automated biometrics: technologies and systems. USA: Kluwer Academic Publishers,2000
    [2] A. K. Jain, A. Ross, S. Prabhakar. An introduction to biometric recognition. IEEE Trans. onCircuits and Systems for Video Technology,2004,14(1):4-20
    [3] A. K. Jain, R, Bolle, S. Pankanti. Biometrics: personal identification in networked society.Massachusetts: Kluwer Academic Publishers,1999
    [4] G. Lawton. Biometrics: A new era in security. Computer,1998,31(8):16-18
    [5] S. Pankanti, R. M. Bolle, A. K. Jain. Biometrics: the future of identification. Computer,2000,33(2):46-49
    [6] J. L. Dugelay, J. C. Junqua, C. Kotropoulos, et al. Recent advances in biometrics, speech, andsignal processing, USA: IEEE,2002:4060-4063
    [7] V. Jr. Matyas, Z. Riha. Toward reliable user authentication through biometrics. IEEE Security&Privacy,2003,1(3):45-49
    [8] S. Prabhakar, A. K. Jain. Biometric recognition: security and privacy concerns. IEEE Security&Privacy,2003,1(2):33-42
    [9] http://www.dhs.gov/files/programs/usv.shtm
    [10] N. Ratha, J. H. Connell, R. M. Bone, An analysis of minutiae matching strength. Proc. Int.Conf. Audio and Video-based Biometric Person Authentication, Halmstad, Sweden,2001,223-228
    [11] S.G. Kong, J. Heo, B. R. Abidi, et al. Recent advances in visual and infrared face recognition:A review, CVIU(97),2005, Vol.1:103-135
    [12]田捷,杨鑫.生物特征识别理论与应用.北京:清华大学出版社,2009
    [13] D. Hurley, M. Nixon, J. Carter. Automatic ear recognition by force field transformations.IEEColloquium on Visual Biometrics, UK: IEE,2000:47-51
    [14] M. Burge, W. burger. Ear biometrics in computer vision. Proceedings of the InternationalConference on Pattern Recognition, USA: IEEE,2000:822-826
    [15] K. Chang, K. Bowyer, S. Sarkar, er al. Comparison and combination of ear and face images inappearance-based biometrics. IEEE Trans. Pattern Analysis and Machine Intelligence,2003,25(9):1160-1165
    [16] B. Victor, K, Bowyer, S. Sarkar. An evaluation of face and ear biometrics. Proceedings of theInternational Conference on Pattern Recognition, USA: IEEE,2002:429-432
    [17] Y. Gao, M. Leung. Face recognition using line edge map. IEEE Trans. Pattern Analysis andMachine Intelligence,2002,24(6):764-779
    [18] R. Brunelli, T. Poggio. Face recognition: features versus templates. IEEE Trans PatternAnalysis and Machine Intelligence,1993,15(10):1042-1052
    [19] R. Chellappa, C. L. Wilson, A. Sirohey. Human and machine recognition of faces: A survey.Proceedings of IEEE,1995,83(5):705-740
    [20] R. Ding, G. Su, X. Lin. Face recognition algorithm using local and global information.Electronics Letters,2002,38(8):363-364
    [21] H. Peng, D. Zhang. Dual eigenspace method for human face recognition. Electronics Letters.1997,33(4):283-284
    [22] J. Cross, C. Smith. Thermographic imaging of the subcutaneous vascular network of the backof the hand for biometric identification. Proceedings of the29th annual1995InternationalCarnahan Conference on Security Technology, USA: IEEE,1995:20-35
    [23] R. Wildes. Iris recognition: an emerging biometric technology. Proceedings of the IEEE,1997,85(9):1348-1363
    [24] W. Boles, B. Boashash. A human identification technique using images of the iris and wavelettransform. IEEE Trans. Signal Processing,1998,46(4):1185-1188
    [25] J. Daugman. How Iris Recognition Works. IEEE Trans. Circuits and Systems for VideoTechnology,2004,14(1):21-30
    [26] Williams G. Iris recognition technology. IEEE Aerospace and Electronic Systems Magazine,1997,12(4):23-29
    [27] X. Tan, B. Bhanu. A robust two step approach for fingerprint identification. PatternRecognition Letters,2003,24(13):2127-2134
    [28] A. Sujan, P. Mulqueen. Fingerprint identification using space invariant transforms. PatternRecognition Letters,2002,23(5):609-619
    [29] A. K. Jain, S. Prabhakar, L. Hong, et al. Filterbank-based fingerprint matching. IEEE Trans.Image Processing,2000,9(5):846-859
    [30] D. Maio, D. Maltoni, R. Cappelli, et al. FVC2000: Fingerprint verification competition. IEEETrans. Pattern Analysis and Machine Intelligence,2002,24(3):402-412
    [31] J. Gu, J. zhou, D. Zhang. A combination model for orientation field of fingerprints. PatternRecognition,2004,37(3):543-553
    [32] A. K. Jain, L. Hong, R. Bolle. On-line fingerprint verification. IEEE Trans. Pattern Analysisand Machine Intelligence,1997,19(4):302-313
    [33] L. Coetzee, E. Botha. Fingerprint recognition in low quality images. Pattern Recognition,1993,26(10):1441-1460
    [34] A. K. Jain, L. Hong, P. Harath, et al. Identity-authentication system using fingerprints.Processing of the IEEE,1997,85(9):1365-1388
    [35] A. Roddy, J. Stosz. Fingerprint features: statistical analysis and system performance estimates,Processing of the IEEE,1997,85(9):1390-1421
    [36] D. Zhang, W. Shu. Two novel characteristics in palmprint verification: datum point invarianceand line feature matching. Pattern Recognition,1999,32:691-702
    [37] R. Sanchez-Reillo, C. Sanchez-Avilla, A. Gonzalez-Marcos. Biometric identification throughhand geometry measurements. IEEE Trans. Pattern Analysis and Machine Intelligence,2000,22(18):1168-1171
    [38] R. Sanchez-Reillo, A. Gonzalez-Marcos. Access control system with hand geometryverification and smart cards. IEEE Aerospace and Electronic Systems Magazine,2000,15(2):45-48
    [39] J. Ashbourn. Practical implementation of biometrics based on hand geometry. IEE Colloquiumon Image Processing for Biometric Measurement, Stevenage: IEE,1994:5/1-5/6
    [40] R. Sanchez-Reillo. Hand geometry pattern recognition through Gaussian mixture modeling.Proceedings of the International Conference on Pattern Recognition, USA: IEEE,2000:837-940
    [41] S. K. Im, H. M. Park, Y. W. Kim, et al. A biometric identification system by extracting handvein patterns. Journal of the Korean Physical Society,2001,38(3):268-272
    [42] L. Lee, T. Berger, E. Aviczer. Reliable online human signature verification systems. IEEETrans. Pattern Analysis and Machine Intelligence,1996,18(6):643-647
    [43] V. Nalwa. Automation on-line signature verification. Proceedings of the IEEE,1997,85(9):215-239
    [44] K. Huang, H. Yan. Off-line signature verification based on geometric feature extraction andneural network classification. Pattern Recognition,1997,30(1):9-17
    [45] Newham, Emma. Signature verification technologies. Biometric Technologies Today,2000,8(4):8-11
    [46] M. Fairhurst. New perspectives in automatic signature verification. Information SecurityTechnical Report,1998,3(1):52-59
    [47] A. K. Jain, F. Griess, S. Connell. On-line signature verification. Pattern Recognition,2002,35(12):2963-2972
    [48] D. Xin, Z. Wu. Speaker recognition using continuous density support vector machines.Electronics Letters,2001,37(17):1099-1101
    [49] J. CampbellJr. Speaker recognition: a tutorial. Proceedings of the IEEE,1997,85(9):1437-1462
    [50] K. Chen. Towards better making a decision in speaker verification. Pattern Recognition,2003,36(2):329-346
    [51] D. Reynolds, R. C. Rose. Robust text-independent speaker identification using gaussianmixture speaker models. IEEE Trans. Speech and Audio Processing,1995,3(1):72-83
    [52] W. Campbell, K. Assaleh, C. Broun. Speaker recognition with polynomial classifiers. IEEETrans. Acoustics, Speech, and Signal Processing,2002,10(4):205-212
    [53] L. Wang, T. Tan, H. Ning, et al. Silhouette analysis based gait recognition for humanidentification. IEEE Trans. Pattern Analysis and Machine Intelligence,2003,25(12):1505-1518
    [54] L. Wang, H. Ning, T. Tan, et al. Fusion of static and dynamic body biometrics for gaitrecognition. IEEE Trans. Circuits and Systems for Video Technology,2004,14(2):149-158
    [55] L. Wang, T. Tan, W. Hu, et al. Automatic gait recognition based on statistical shape analysis.IEEE Trans. Image Processing,2003,12(9):1120-1131
    [56] J. Hayfron-Acquah, M. Nixon, J. Carter. Automatic gait recognition by symmetry analysis.Pattern Recognition Letters,2003,24(13):2175-2183
    [57] M. Nixon, J. Carter, J. Shutler, et al. New advances in automatic gait recognition. informationsecurity technical report,2002,7(4):23-35
    [58] http://www.hitachi.co.jp/Prod/comp/fingervein/global/index.htm
    [59] M. Kono, H. Ueki, S. Umemura. A new method for the identification of individuals by using ofvein pattern matching of a finger. Yamaguchi, Japan, Proc. Fifth Symposium on PatternMeasurement,2000:9-12
    [60] Naoto Miura, Akio Nagasaka. Automatic feature extraction from non-uniform finger veinimage and its application to personal identification. MVA2002IAPR Workshop on MachineVision Applications,2002, Nara-ken New Public Hall, Nara, Japan
    [61] Naoto Miura, Akio Nagasaka, Takafumi Miyatake. Feature extraction of finger-vein patternsbased on repeated line tracking and its application to personal identification. Machine Visionand Applications,2004,15:194-203
    [62] J. Hashimoto. Finger vein authentication technology and its future.2006Symposium on VLSICircuits, Digest of Technical Papers,2006:5-8
    [63] E. C. Lee, K. R. Park. Restoration method of skin scattering blurred vein image for finger veinrecognition. Electronics Letters,2009,45(21)
    [64] Jian-Da Wu, Siou-Huan Ye. Driver identification using finger-vein patterns with Radontransform and neural network. Expert Systems with Applications,2009,36:5793-5799
    [65]袁智.手指静脉识别技术研究:[硕士学位论文].哈尔滨:哈尔滨工程大学,2007
    [66]张晓雷.手指静脉图像采集系统设计:[硕士学位论文].哈尔滨:哈尔滨工程大学,2008
    [67]孙艳杰.多小波理论在指纹与手指静脉图像处理中的应用.哈尔滨:哈尔滨工程大学,2009
    [68]管凤旭.基于流形学习及可拓分类器的手指静脉识别研究:[博士学位论文].哈尔滨:哈尔滨工程大学,2010
    [69]秦华锋.手指静脉识别技术研究:[硕士学位论文].重庆:重庆理工大学,2009
    [70]杨树强.手指静脉身份识别智能系统的研究:[硕士学位论文].重庆:重庆理工大学,2009
    [71]张冬梅.低质量手指静脉图像增强:[硕士学位论文].重庆:重庆理工大学,2010
    [72]李彦林.基于OMAPL137嵌入式平台的手指静脉身份识别系统的研制:[硕士学位论文].重庆:重庆理工大学,2011
    [73]洪妍妍.手指静脉识别原型系统的设计与实现:[硕士学位论文].山东:山东大学,2011
    [74]陈玫玫.手指静脉图像的去噪与分割算法研究:[博士学位论文].吉林大学,2010
    [75]余成波,秦华锋.生物特征识别技术——手指静脉识别技术.北京:清华大学出版社,2009
    [76] Desong Wang, Jianping Li, and Gokhan Memik. User identification based on finger-veinpatterns for consumer electronics devices. IEEE Trans. on Consumer Electronics,2010,56(2):799-804
    [77] A. Jain, K. Nandakumar, A. Ross. Score Normalization in Multimodal BiometricSystems.Pattern Recognition,2005,38(12):2270-2285
    [78] D. Bouchaffra, A. Amira. Structural Hidden Markov Models for Biometrics-fusion of Face andFingerprint. Pattern Recognition,2008,41(3):852-867
    [79] S. Palanivel, B. Yegnanarayana. Multimodal Person Authentication Using Speech, Face andVisual Speech. Computer Vision and Image Understanding,2008,109(1):44-55
    [80] A. Kale, A. K. Roychowdhury, R. Chellappa. Fusion of gait and face for human identification.Proceedings of IEEE International Conference of Acoustics, Speech, and Signal Processing.Montreal, Canada: IEEE,2004:901-904
    [81] Y. Yao, X. Jing, H. Wong. Face and palmprint feature level fusion for single samplebiometrics recognition. Neurocomputing Letters,2007,70(7-9):1582-1586
    [82] K. A. Toh. Fingerprint and speaker verification decisions fusion. Proceedings of12thInternational Conference on Image Analysis and Processing. Singapore: IEEE,2003:626-631
    [83] C. Chibelushi, F. Feravi. T. S. D. Mason. A review of speech-based bimodal recognition.IEEE Trans. Multimedia,2002,4(1):23-37
    [84] A. Kumar, D. C. M. Wong, H. C. Shen, et al. Personal verification using palmprint and handgeometry biometric. Proceedings of4th International Conference on Audio and Video-basedBiometric Personal Authentication, Guildford, UK: Springer,2003:668-678
    [85] X. Jing, D. Zhang. A face and palmprint recognition approach based on discriminant DCTfeature extraction. IEEE Trans. System,Man and Cybernetics,2004,34(6):2405-2415
    [86]叶学义.基于虹膜和脸像的多生物特征身份识别及融合算法的研究:[博士学位论文].合肥:中国科学技术大学,2006
    [87]李雪妍.融合指纹和指静脉的多模态生物识别技术的研究:[博士学位论文].吉林大学,2008
    [88]王云新.基于手背静脉与虹膜的生物特征识别方法研究:[博士学位论文].天津:天津大学,2009
    [89] O. Khalifa, M. Islam, S. Khan, et al. Communications cryptography. RF and MicrowaveConference2004(RFM2004), Proceedings,2004,220-223
    [90] A. Kejariwal. Watermarking. IEEE Potentials,2003,22(4):37-40
    [91] P. S. L. M. Barreto, H. Y. Kim, V. Rijmen. Toward secure public key block-wise fragileauthentication watermarking. IEE Proceedings Vision, Image&Signal Processing,2002,148:57-62
    [92] M. U. Celik, G. Sharma, E. Saber, et al. A hierarchical image authentication watermark withimproved localization and security. Proc. IEEE Int. Conf on Image Processing, Thessaloniki,Greece,2001, Vol.2:502-505
    [93] J. Fridrich, M. Goljan, R. Du, Invertible authentication watermark for JPEG images. Proc.IEEE Int. Conf on Information Technology, Las Vegas, NV, USA,2001, Vol.5:223-227
    [94] S. Byun, S. Lee, A. Tewfik, et al. A SVD-based fragile watermarking scheme for imageauthentication. International Workshop on Digital Watermarking, Lecture Notes in ComputerScience,2002, Vol.2613:170-178
    [95] C. T. Li, D. C. Lou, T. H. Chen. Image authenticity and integrity verification viacontent-based watermarks and a public key cryptosystem. Proc. IEEE Int. Conf on ImageProcessing, Vancouver, Canada,2000, Vol.3:694-697
    [96] Hyobin Lee, Jaehyuck Lim, Sunjin Yu, et al. Invertible watermarking algorithm with detectinglocations of malicious manipulation for biometric image authentication.2006ICB,2005,LNCS3832:763-769
    [97] Hyobin Lee, Jaehyuck Lim, Sunjin Yu, et al. Biometric image authentication usingwatermarking.2006SICE-ICASE International Joint Conference, Bexco, Busan, Korea,2006,3950-3953
    [98] S. Pankanti, M. M. Yenng. Verification watermarks on fingerprint recognition and retrieval.Proc. SPIE, Vol.3657,1999:66-78
    [99] B. Gunsel, U. Uludag. A. M. Tekalp. Robust watermarking of fingerprint images. PatternRecognition,2002,35(12):2739-2747
    [100] A. K. Jain, U. Uludag, Hiding fingerprint minutiae in images. Proceedings of the3rdWorkshop on Automatic Identification Advanced Technologies (AutoID),2002,97-102
    [101] A. K. Jain, U. Uludag, Hiding biometric data,IEEE Trans. Pattern Anal. Mach. Intell.,2003,25(11):1292-1198
    [102] A. Noore, R. Singh, M. Vatsa, et al. Enhancing security of fingerprints through contextualbiometric watermarking, Forensic Science International,2007,169:188-194
    [103] M. Vatsa, R. Singh, A. Noore, et al. Robust biometric image watermarking for fingerprint andface template protection,IEICE Electron. Express,2006,3(2):23-28
    [104] M. K. Khan, Jiashu Zhang, Lei Tian. Chaotic secure content-based hidden transmission ofbiometric templates. Chaos, Solitons and Fractals,2007,32:1749-1759
    [105] A. E. Hassanien, A. Abraham, C. Grosan. Spiking neural network and wavelets for hiding irisdata in digital images. Soft Computing,2009,13(4):401-416
    [106]张毅刚,焦玉华,牛夏牧,等.基于指纹特征数字水印算法的身份认证技术研究.电子学报,2003,31(12A):2131-2134
    [107]杨阳,郭银景,唐富华.一种基于网络安全传输的指纹身份认证水印嵌入新算法.计算机应用,2003,24(12):70-73
    [108]赵季中,郗旻,田丽华,等.基于二维条码的指纹特征信息隐藏方法研究.西安交通大学学报,2007,41(2):145-148
    [109]范科峰,莫玮,裴庆祺.一种基于虹膜水印的数字图像内容认证系统.西安电子科技大学学报(自然科学版),2007,34(1):115-121
    [110]路陈红.用于个人身份鉴别的虹膜生物特征识别:[博士学位论文].西安:西安电子科技大学,2008
    [111] L. Lamport. Password authentication with insecure communication. Communications of theACM,1981,24(11):770-772
    [112] A. Shimizu, T. Horioka, H. Inagaki. A password authentication method for contentscommunication on the Internet. IEICE Trans. Communications,1998, E81-B(8):1666-1673
    [113] C. Fan, Y. Chan, Z. Zhang. Robust remote authentication scheme with smart cards. Computers&Security,2005,24:619-628
    [114] W. Juang. Efficient password authenticated key agreement using smart card. Computer&Security,2004,23:167-173
    [115] W. Ku, S. Chen. Weaknesses and improvements of an efficient password based remote userauthentication scheme using smart cards. IEEE Trans. Consumer Electronics,2004,50(1):204-207
    [116] C. Lee, L. Li, M. Hwang. A remote user authentication scheme using hash functions. ACMOperating Systems Review,2002,36(4):23-29
    [117] M. Peyravian, N. Zunic. Methods for protecting password transmission. Computers&Security,2000,19(5):466-469
    [118] W. Ku. A hash-based strong-password authentication scheme without using smart cards. ACMOperating Systems Review,2004,38(1):29-34
    [119] W. Ku, C. Chen, H. Lee. Weaknesses of Lee-Li-Hwang’s hash-based password authenticationscheme. ACM Operating Systems Review,2003,37(4):9-25
    [120] H. Wen, T. Lee, T. Hwang. Provably secure three-party password-based authenticated keyexchange protocol using Weil pairing. IEE Proceedings of Communications,2005,152(2):138-143
    [121] J. K. Lee, S. R. Ryu, K.Y. Yoo. Fingerprint-based remote user authentication scheme usingsmart cards. Electronics Letters,2002,38(12):554-555
    [122] C. H. Lin, Y. Y. Lai. A flexible biometrics remote user authentication scheme. ComputerStandards&Interfaces,2004,27(1):19-23
    [123] W. C. Ku, S. T. Chang, M. H. Chiang. Further cryptanalysis of fingerprint-based remote userauthentication scheme using smart cards. Electronics Letters,2005,41(5):240-241
    [124] M. K. Khan. Jiashu Zhang. Improving the security of ‘a flexible biometrics remote userauthentication scheme. Computer Standards&Interfaces,2007,29:82-85
    [125] D. S. Wang, J. P. Li, Y. Tang, et al. Authentication Scheme of Remote Users by UsingMultimodal Biometric and Smart Cards.2007International Conference on InformationComputing and Automation,2007, Vol.1:98-101
    [126] D. S. Wang, J. P. Li. A new fingerprint-based remote user authentication scheme using mobiledevices.2009International Conference on Apperceiving Computing and Intelligence Analysis,2009,65-68
    [127] D. S. Wang, J. P. Li. A novel mutual authentication scheme based on fingerprint biometric andtwo nonces using smart cards. International Journal of Security and Its Applications,2011,5(4):1-12
    [128] Chun-Ta Li, Min-Shiang Hwang. An efficient biometrics-based remote user authenticationscheme using smart cards. Journal of Network and Computer Applications,2010,33:1-5
    [129] V. Claus, S. Ralf. Approaches to biometric watermarks for owner authentication. Proc. SPIE,2001,23(12):209-219
    [130] A. Noore, R. Singh, M. Vatsa, et al. Enhancing security of fingerprints through contextualbiometric watermarking. Forensic Science International,2007,169(2-3):188-194
    [131] D. S. Wang, J. P. Li, D. K. Hu et al. A Novel Biometric Image Integrity Authentication UsingFragile Watermarking and Arnold Transform.2007International Conference on InformationComputing and Automation,2007, Vol.2:799-802
    [132] D. S. Wang, J. P. Li. Biometric Image Integrity Authentication Based on SVD and FragileWatermarking.2008International Congress on Image and Signal Processing,2008,Vol.5:679-682
    [133] R. Liu, T. Tan. An SVD-based watermarking scheme for protecting rightful ownership. IEEETrans. On Multimedia,2002,4:121-128
    [134]丁玮,齐东旭.数字图像变换及信息隐藏与伪装技术.计算机学报,1998,21(9):838-843
    [135]齐东旭,邹建成,韩效宥.一类新的置乱变换及其在图像信息隐蔽中的应用.中国科学(E辑),2000,30(5):400-447
    [136] Dongxu Qi, Jiancheng Zou, Xiaoyou Han. A new class of scrambling transformation and itsapplication image information covering. Science in China (Series E),2000,43(3):304-312
    [137]丁玮,闫伟齐,齐东旭.基于Arnold变换的数字图像置乱技术.计算机辅助设计与图形学学报,2001,13(4):338-341
    [138] CASIA Iris Image Database. http://www.sinobiometrics.com.
    [139] FVC2004. http://bias.csr.unibo.it/fvc2004/
    [140] J. D. Wu, S. H. Ye. Driver identification using finger-vein patterns with Radon transform andneural network. Expert Syst. Appl.,2009,36:5793-5799
    [141] D. V. Jadhav, R. S. Holambe. Radon and discrete cosine transforms based feature extractionand dimensionality reduction approach for face recognition. Signal Process.,2008,88:2604-2609,
    [142] D. V. Jadhav, R. S. Holambe. Feature extraction using Radon and wavelet transforms withapplication to face recognition. Neurocomputing,2009,72:1951-1959,
    [143] P. A. Rattry, A. G. Lindgren. Sampling the2D radon transform. IEEE Trans. Acoust. SpeechSignal Process.,1981,29:994-999,
    [144] Z. Q. Hong. Algebraic feature extraction of image for recognition. Pattern Recognit.,1991,24:211-219,
    [145] O. K. AI-Shaykh, J. F. Dohcrty. Invariant image analysis based on Radon transform and SVD.IEEE Trans. Circuits Syst.-II: Analog and digital signal processing,1996,43(2):123-133,
    [146] J. Hashimoto. Finger vein authentication technology and its future.2006Symposium on VLSICircuits, Digest of Technical Papers,2006,5-8
    [147] W. S. Juang, S. T. Chen, H. T. Liaw. Robust and Efficient Password-Authenticated KeyAgreement Using Smart Cards. IEEE Trans. Industrial Electronics,2008,55(6):2551-2556
    [148] R. M. Needham, M. D. Schroeder. Using encryption for authentication in large networks ofcomputer. Communication of the ACM,1978,21(12):993-99
    [149]张之津,李胜广,薛艺泽.智能卡安全与设计.北京:清华大学出版社,2010
    [150]王小敏,张家树,张文芳.复合非线性数字滤波器的Hash函数构造.物理学报,2005,54(12):5566-5573
    [151] M. K. Khan, Jiashu Zhang, Xiaomin Wang. Chaotic hash-based fingerprint biometric remoteuser authentication scheme on mobile devices. Chaos, Solitons&Fractals,2008,35:519-524
    [152] E. J. Yoon, K.Y. Yoo. A secure chaotic hash-based biometric remote user authenticationscheme using mobile devices. APWeb/WAIM2007, Huang Shan,2007,612-623
    [153] K. Lauter. The advantages of elliptic curve cryptography for wireless security. WirelessCommun.,2004,11(1):62-67
    [154] J. Daeman, V. Rumen. AES Proposal: Rijndael. First Advanced Encryption Standard (AES)Conference, Ventura, California, USA,1998.
    [155]邱慧敏,杨义先,胡正名.一种新的基于智能卡的双向身份认证方案设计.计算机应用研究,2005,12:103-105
    [156]薛素静,孔梦荣.基于单向哈希函数的远程口令认证方案.计算机应用研究,2008,25(2):512-515
    [157] H. Y. Chien, J. K. Jan, Y. M. Tseng. An efficient and practical solution to remoteauthentication: Smart card. Computers&Security,2002,21(4):372-375
    [158] H. M. Sun. An efficient remote user authentication scheme using smart cards. IEEE Trans.Consumer Electronics,2000,46(4):958-961
    [159] B. Wang, Z. Q. Li. A forward-secure user authentication scheme with smart cards.International Journal of Network Security,2006,3(2):108-111
    [160] S. W. Lee, H. S. Kim, K. Y. Yoo. Efficient nonce-based remote user authentication schemeusing smart cards. Applied Mathematics and Computation,2005,167:355-361
    [161] Jia-Yong Liu, An-Min Zhou, Min-Xu Gao. A new mutual authentication scheme based onnonce and smart cards. Computer Communications,2008,31:2205-2209
    [162]田俊峰,焦洪强,李宁,等.双私钥双随机数认证方案.计算机研究与发展,2008,45(5):779-785
    [163] Dazhi Sun, Jinpeng Huai, Jizhou Sun, et al. Cryptanalysis of a mutual authentication schemebased on nonce and smartcards. Computer Communications,2009,32:1015-1017
    [164] D. Boneh, M. Franklin. Identity-based encryption from the Weil pairing. SIAM Journal onComputing,32(3):585-615
    [165] P. S. L. M. Barreto, H. Y. Kim, B. Lynn, et al. Efficient algorithms for pairing-basedcryptosystems. Advances in Cryptology-CRYPTO2002, LNCS,2002:354-369
    [166] M. Das, A. Saxena, V. Gulati, et al. A novel remote user authentication scheme using bilinearpairings. Computers&Security,2006,25(3):184-189
    [167] T. Goriparthi, M. Das, A. Saxena. An improved bilinear pairing based remote userauthentication scheme. Computer Standards&Interfaces,2009,31:181-185
    [168] W. S. Juang, W. K. Nien. Efficient password authenticated key agreement using bilinearpairings, Math. Compu. Model.,2008,47:1238-1245
    [169]王德松,李建平.基于双线性对和Nonce的智能卡远程用户认证方案.计算机应用研究,2010,27(2):733-736,
    [170] F. Hess. Efficient identity based signature schemes based on pairings. Selected areas incryptography’02, LNCS: Springer-Verlag,2003, Vol.2595:310-324
    [171]罗铭.基于双线性对的签密和密钥协商方案研究:[博士学位论文].沈阳:东北大学,2010
    [172]廖晓峰,肖迪,陈勇,等.混沌密码学原理及其应用.北京:科学出版社,2009
    [173] J. Daugman, High confidence visual recognition of persons by a test of statisticalindependence, IEEE Trans. Pattern Analysis and Machine Intelligence,1993,15(11):1148-1161
    [174] A. Grossmann, J. Morlet, T. Paul. Transforms associated to square integrable grouprepresentation, I: General Results. J. Math. Phys,1985,27:2473-2479
    [175] A. Grossmann, J. Morlet, T. Paul. Transforms Associated to square integrable grouprepresentation, II: Examples. Ann. Inst. H. Poincare,198645:293-309,
    [176] A. Cohen. Ondelettes analyses multiresolutions et filtres miroir en quadrature, Ann. Inst. H.Poincare Anal. Non Linea, ire,1990,(5):439-453,
    [177] Ingrid Daubechies.小波十讲(李建平,译者).北京:国防工业出版社,2004
    [178] Adhemar Bultheel. Wavelets With Applications In Signal And Image Processing.2001,115-118.
    [179]李建平.小波分析与信号处理——理论、应用及软件实现.重庆:重庆出版社,2000
    [180]孙延奎.小波分析及其应用.北京:机械工业出版社,2005,89-117
    [181]彭德云,王嘉祯,徐波,等. VW&IVW双重鲁棒性水印.军械工程学报,2006,18(4):56-59