基于生物特征的真随机数发生器的研究与设计
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随机数发生器已在各个领域得到了非常广泛的应用,如进程调度、电子游戏、数值分析中的蒙特卡罗方法和统计抽样技术等。随机数发生器也是加密算法和协议的重要组成部分,对称加密的密钥和非对称加密的公钥/私钥对也需要随机生成。在许多加密协议中也要用到随机数发生器。随机数发生器通常分为两种:真随机数发生器(TRNGs)和伪随机数发生器(PRNGs)。真随机数发生器的熵源通常来自于真实的物理世界,如热噪声,大气噪声,放射性衰减甚至掷硬币。一般来说,合格的真随机数发生器产生的随机序列通常被认为是安全的。但是,设计更加便宜方便的真随机数发生器仍然是研究者努力的目标。本论文研究选择了以鼠标轨迹和手写签名为代表的生物特征(主要是人类行为特征)作为随机数发生器的熵源,并结合图像加密、Hash函数、信号处理等不同领域的算法,以此设计出新颖的、便利的随机数发生器。
     本论文的主要工作包括:
     ①提出并研究了基于生物特征的真随机数发生器的设计方法。这种新颖的随机数发生器的优点是便宜、方便且在PC机上具有通用性。同时,这种随机数发生器很容易作为组件与生物特征认证系统和生物特征密码系统方便地进行集成。
     ②设计了基于图像加密和鼠标轨迹图的真随机数发生器。论文对多种图像加密算法产生随机序列的性能进行了分析、研究和实验,为了提高随机序列的产生速度,较为深入地讨论了分块加密模式下图像加密算法的扩散性,并给出了实现严格雪崩效应的理论最少迭代轮数,从而提出了“不碰撞扩散”的思路。基于该思路,设计了两个新的算法,实验对比表明,新算法在速度、敏感性和随机性测试中表现出了良好的性能。
     ③设计了基于Hash函数和鼠标轨迹序列的真随机数发生器。通常Hash函数在处理数据方面快于图像加密算法,且Hash值本身也具有随机性。混沌Hash函数能够帮助消除同一个用户的鼠标轨迹中的相似模式。论文给出了真随机数发生器的算法框架,采用不同的混沌Hash函数进行对比,并改进了其中一种算法。实验证明,基于改进算法的随机数发生器产生的序列具有良好的随机性。
     ④研究了基于在线手写签名的随机数发生器。传统的生物特征认证系统是最大程度提取生物特征的相似模式,抛弃随机性,与之相反,本论文研究着重于提取和放大隐藏于生物特征中的随机信号,从而生成随机性良好的随机序列。在对不同的生物特征、信号处理方法和数位提取方法进行了大量实验的基础上,提出了三种基于信号特征提取的真随机数发生器。该方法生成的随机性序列通过了NIST的部分测试。同时实验结果表明,这类算法的速度明显快于采用图像加密和部分Hash算法产生随机序列。
     ⑤将基于手写签名的真随机数发生器应用在一类生物特征密码系统——模糊保险箱里。其数据处理算法采用了基于TD-ERCS的Hash函数。为了提高算法的性能,对TD-ERCS进行了改进。理论分析和实验结果表明,与本论文提出的所有算法和一些经典算法相比,基于改进TD-ERCS的随机数发生器产生随机序列的速度最快。生成的随机序列通过了所有统计测试。最后,在基于Windows mobile的PDA上实现了这款基于手写签名的真随机数发生器。
     最后对论文进行了总结,并给出了论文的不足和今后研究工作的方向。
Random number generators are widely used in various computer applications such as processes schedule, electronic games, Monte-Carlo methods on numerical analysis and statistical sampling techniques. Moreover, it is a necessary component for cryptographic algorithms and protocols. the keys for symmetric cryptosystems or the public/private key pairs for asymmetric cryptosystems should be generated randomly. RNGs are also used to create challenges, nonces, padding bytes, and blinding values in many cryptographic protocols. There are two basic types of generators used to produce random sequences: true random number generators (TRNGs) or pseudorandom number generators (PRNGs). TRNGs are usually based on physical phenomena such as thermal noise, atmospheric noise, radioactive decay and even coin-tossing. They are considered to generate random sequences with a higher security. However, it is still hard to find cheap and convenient TRNGs. In this paper, a novel type of TRNGs is proposed and researched, which is based on biometric characteristics, especially the mouse movement and handwriting signature of a specific user. Some of the conclusions of this paper are listed as follows.
     First of all, the new type of TRNGs based on biometric characteristics are proposed and discussed. As far as we know, such TRNGs are researched for the first time. It is cheap, convenient and universal for the personal computer (PC) platform. Furthermore, such TRNG can be easily integrated with biometric cryptosystems.
     Secondly, the images encryption algorithms are advised to process the mouse movements traces for the construction of TRNG and production of random numbers. To improve the processing speeds, the diffusion characteristics of image encryption algorithms are studied deeply. Several image encryption algorithms are tested for the generation of random numbers, and two new proposed algorithms perform better than others in sensitivity and randomness test.
     Thirdly, several TRNGs based on mouse movement and hash function are proposed and compared. Hash functions can process data faster usually than encryption algorithms and the hash value is also presented random-like properties. The discretized chaotic maps inside hash functions help a lot to eliminate the common patterns among mouse movements caused by the habit of the same user. Experiments show that the revised hash function based on chaotic tent map passes all 15 NIST statistical tests while achieve satisfactory processing speed.
     Fourthly, TRNGs based on human handwriting signatures are studied. In contrast to signature verification techniques, where the similarity of a person’s signature is extracted, the diversity of the signatures for the same user becomes more interesting for the extraction of randomness. After a great amount of attempt with different signature features, signal processing approaches, and bit extraction methods, three TRNGs based on signature feature extraction are determined, which are demonstrated fast and effective.
     Fifthly, a TRNG based on handwriting signature is integrated with fuzzy vault biometric cryptosystem. The signature is processed by a hash function based on improved TD-ERCS. The theoretical analysis and experiments show that such TRNG has the highest speed than those based on image encryption algorithms or hash functions. This TRNG is also implemented on a window mobile PDA.
     Finally, the dissertation is concluded. Some problems as well as further work are also given.
引文
[1]孔祥维.信息安全中的信息隐藏理论和方法研究[D].博士学位论文,大连理工大学,2003.
    [2] B.Schneier. Secrets & Lies: Digital Security in Networked World[J]. Jone Wiley & Sons, 2000:85-101.
    [3]张咏.随机数发生器和随机数性能检验方法研究[D].硕士学位论文,电子科技大学,2006年.
    [4]张咏,范明钰,王宇飞.对于DES的差分能量攻击及其防范对策[D].电子技术应用. 2005.5.
    [5] Andrew R., Juan S., James N.. A statistical test suite for random and pseudorandom number generators for cryptographic applications[M]. NIST Special Publication, 800-22, 2001.
    [6]朱和贵.密码学中随机序列发生器的研究[D].硕士学位论文,东北大学,2006年.
    [7]白恩健.伪随机序列构造及其随机性分析[D].博士学位论文,西安电子科技大学,2004.
    [8] Fan P, Darnell M. Sequence design for communications Applications[M]. John Wiley, Research Studies Press, Taunton, 1996.
    [9] Pless V. Introduction to the theory of error correcting codes[M]. Second Edition, New York: Wiley, 1989.
    [10]冯登国,裵定一.密码学导引[M].北京:科学技术出版社,1999.
    [11]丁存生,肖国镇.流密码学及其应用[M].北京:国防工业出版社,1994.
    [12] Massey J L. Shift register synthesis and BCH decoding[J]. IEEE Transactions on Information Theory, 1969, 15(1): 122-127.
    [13] V.Loreto,G.Paladin,M.Pasquini,A.Vulpiani. Characterization of chaos in random maps[J]. Physica A. 1996,232:189-200.
    [14] Niederreiter H. New developments in uniform pseudorandom number and vector generation [J]. Lecture Notes in Statistics, 1995, 106: 87-120.
    [15] Roland Schmitz. Use of chaotic dynamical systems in cryptography[J]. Journal of the Franklin Institute, 2001, 338: 429-441.
    [16] Kohda T, Tsyneda A. Chaotic bit sequences for stream cryptography and their correlation factions[C]. SPIE Proc.1995, 2612: 86-97.
    [17] Mohammad Peyravian, Stephen M Matyas. Generating user-based cryptographic keys and random numbers[J]. Computers & Security, 1999, 18(7): 619-626.
    [18] Hellekalek P. Good random number generators are (not so) easy to find[J]. Mathematics andComputers in Simulation, 1998,46: 485-489.
    [19] N. K. Pareek, Vinod Patidar, and K. K. Sud. Discrete chaotic cryptography using external key[J]. Physics Letters A, 2003, 309(1-2): 75–82.
    [20]周红,俞军,凌燮亭.混沌前馈型流密码的设计[J].电子学报,1998,26(1):98-101.
    [21]桑涛,王汝笠,严义埙.一类新型混沌反馈密码序列的理论设计[J].电子学报,1999,27(7):47-50.
    [22]周红,罗杰,凌燮亭.混沌非线性反馈密码序列的理论设计和有限精度实现[J].电子学报,1997,25(10):57-60.
    [23] Ljupco Kocarev and Goce Jakimoski. Pseudorandom bits generated by chaotic maps[J]. IEEE Transactions on Circuits and Systems–I, 2003, 50(1): 123–126.
    [24]胡汉平,刘双红,王祖喜,吴晓刚.一种混沌密钥流产生方法[J].计算机学报,2004,27(3):408-412.
    [25]辛茜,曾晓洋,张国权,等.真随机数发生器的系统建模与仿真[J].系统仿真学报, 2005, 17(1): 53-56.
    [26]王莱,刘松强.真随机数发生器的设计和实现[J].核电子学与探测技术, 1998, 18(6): 452-455.
    [27]梁金千,张跃.在计算机上产生真随机数的探讨[J].计算机工程, 2003, 29(15): 176-177.
    [28]俞俊,沈海斌,严晓浪.基于混沌的高速真随机数发生器的设计与实现[J].半导体学报, 2004, 25(8): 1013-1018.
    [29]黄枫,申洪.基于Inter RNG的真随机数生成器研究[J].第一军医大学学报, 2004, 24(9): 1091-1095.
    [30]王相生,甘骏人.一种基于混沌的序列密码生成方法[J].计算机学报, 2002, 25(4): 351-356.
    [31]宋勇,陈贤富,姚海东.随机数发生器探讨及一种真随机数发生器实现[J],计算机工程,2007,33(2):71-73
    [32]马海强,常君,吴令安.基于纠缠光子对的真随机数源[C].第十届全国量子光学学术报告会论文摘要集, 2002.
    [33]冯明明,秦小林,周春源,等.偏振光量子随机源[J].物理学报,2003, 53(1): 72-76.
    [34]袁卫忠,谢俊元,谢立,等.网络安全中随机数技术分析与应用[J].计算机工程, 2001, 27(6): 116-117, 142.
    [35]杨自强,魏公毅.常见随机数发生器的缺陷及组合随机数发生器的理论与实践[J].数理统计与管理, 2001, 20(1): 45-51.
    [36] Press W H, Flannery B P, Teukolsky S A, et al. Numerical Recipesin Fortran: The Art of Scientific Computing[M]. CambridgeUniversity Press, 1996.
    [37] R.Stefanellian, A.Rosenfeld. Some parallel thinning algorithms for digital pictures[J]. J,Assoc.Computer, Mach.18.No, 2, 1971.
    [38]王侃伟.生物识别技术在汽车安全领域应用的研究[D].博士论文,西北工业大学,2006年.
    [39] A. K. Jain, A. Ross and S. Pankanti, Biometrics: A Tool for Information Security[J]. IEEE transaction on information forensics and security, vol.1,NO.2, June 2006. p125-143.
    [40] D.Maltoni, D.Maio, A.K.Jain, and D.Prabhakar, Handbook of Fingerprint Recognition[C]. New York: Springr Verlag, Jun.2003.
    [41] S.Mallat et al.Charateristics of signals from multiscale edges[J]. IEEE Trans. On PAMI No.8. 1992,P710-732.
    [42] S.Mallat et al. Singularity detection and Processing with wavelets[J]. IEEE Trans.on Information Theory,No.31992,P617~643.
    [43] R. Sanchez-Reillo, C. Sanchez-Avila, and A. Gonzales-Marcos. Biometric identification through hand geometry measurements[J]. IEEE Trans. Pattern Anal. Mach. Intell., 2000(22): p1168–1171.
    [44] Y.Lu et al. Reason about edges in scale space[J]. IEEE Trans on PAMI. No.4, 1992. P450-468.
    [45] G.Z.Yang, T.S.Huang. Human face detection in a complex background[J]. Pattern Reeognition, No.2, 1994,P53-63.
    [46] A.Pentland. View-based and modular eigenspace for face recognition[C]. In IEEE Conf. CornPut. Vision Pattern Recognition,1994.
    [47] S.H.Lin. Face recognition/detection by Probabilistic decision-based neural network[J]. IEEE Trans. NeuralNetworks, 1997(8):pll4-132.
    [48]严超,苏光大.人脸特征的定位与提取[J].中国图像图形学报,1998(3):p375-379.
    [49]易家康编译.生物特征学识别技术前景喜人[J].世界科学. 2008(2):p9-11.
    [50]手指静脉识别系统[M].发明与创新. 2008年第2期.
    [51]韦鹏程.混沌伪随机序列及其应用研究[D].博士学位论文,重庆大学, 2008年.
    [52] B.Schneier. Applied Crytography: Protocols,Algorithms, and Source Code in C[J]. Jone Wiley &Sons, 1994:301-307.
    [53]苏桂平.信息安全中随机序列研究及小波分析的应用[D].博士学位论文,中国科学院研究生院, 2002.
    [54]王玉柱.随机性测试研究与实现[D].硕士学位论文,中国科学技术大学研究生院,2000.
    [55]张咏.随机数发生器和随机数性能检测方法研究[D].硕士学位论文,电子科技大学,2006.
    [56] M. Kimberley. Comparison of two statistical tests for keystream sequences[J]. ElectronicsLetters. 23, 1987: 365-366.
    [57] Pincus and B. H. Singer. Randomness and degrees of irregularity[J]. Proc. Nat 1. Acad. Sci. USA, 93, March 1996: 2083-2088.
    [58] M. Bucci, L. Germani, R. Luzzi, A. Trifiletti, M. Varanonuovo. A high speed random number source for cryptographic applications on a SmartCard[J]. IEEE Trans. Compu. 2003(52):p 403.
    [59] W. T. Holman, J. A. Connelly, A. B. Downlatabadi. An integrated analog/digital random noise source[J]. IEEE Transaction on Circuits and System I. IEEE Trans. Circ. Syst. 1 1997(44):p 521.
    [60] D. Davis, R. Ihaka, P. Philip Fenstermacher. Cryptographic randomness from air turbulence in disk drives[J]. Crypto’94 (1994) 114.
    [61] J. Walker. HotBits: Genuine Random Numbers Generated by Radioactive Decay[J], http://www.fourmilab.ch/hotbits, 2002.
    [62] Xun Yi. Hash function based on chaotic tent maps[J]. IEEE Transactions on Circuits and Systems-II, 2005, 52(6): 354-357.
    [63] Jiashu Zhang, Xiaomin Wang, Wenfang Zhang, Chaotic keyed hash function based on feedforward–feedback nonlinear digital filter[J]. Physics letters A, 2007, 362: 439-448.
    [64] M. S. Baptista. Cryptography with chaos[J]. Phys. Lett. A, 1998(240): 50-54.
    [65] G. Jakimoski, L. Kocarev. Block encryption ciphers based on chaotic maps[J]. IEEE Trans. Circ. Syst. 1, 2002(48):163-169.
    [66] Y. Wang, X. Liao, T. Xiang, K.W. Wong, D. Yang, Cryptanalysis and improvement on a block cryptosystem based on iteration a chaotic map[J], Phys. Lett. A ,2007(363): 277-281.
    [67] Q. Zhou, K. W. Wong, X. Liao, T.Xiang, Y. Hu. Parallel image encryption algorithm based on discretized chaotic map[J]. Chaos Solitons Fractals, in press, 2007.
    [68] J. Fridrich. Symmetric ciphers based on two-dimensional chaotic maps[J]. Int. J. Bifur. Chaos, 1998(8): 1259-1284.
    [69] G. Chen, Y. Mao, C. Chui. Symmetric image encryption scheme based on 3D chaotic cat maps[J]. Chaos Solitons Fractals, 2004(21): 749-761.
    [70] G. M. Bernstein, M. A. Lieberman. Random Number Generation Using Chaotic Circuits[J]. IEEE Trans. Circ. Syst. 1990(37): 1157-1164.
    [71] S. Callegari, R. Rovatti, G. Setti. Embeddable ADC-Based True Random Number Generator for Cryptographic Applications Exploiting Nonlinear Signal Processing and Chaos[J]. IEEE Trans. Signal Proc. 2005,53(2): 793-805.
    [72] M. E. Yalcn, J. A. K. Suykens, J. Vandewalle. True Random Bit Generation From aDouble-Scroll Attractor[J]. IEEE Trans. Circ. Syst. 1. 2004(51): 1395-1404.
    [73] Li Ping, Li Zhong, Halang Wolfgang A, Chen Guanrong. A multiple pseudorandom-bit generator based on a spatiotemporal chaotic map. Phys Lett A . 2006,349(6):467–473.
    [74] NIST. FIPS-197. Announcing the Advanced Encryption Standard [S]. 2001.
    [75] Chang C C, et al. A new encryption algorithm for image eryptosystem[J]. The Journal of Systems and Software, 2001, 58(7):83-91.
    [76]李昌刚,韩正之.图像加密技术新进展[J].信息与控制,2003, 32(4): 339-343.
    [77]齐东旭,矩阵变换及其在图像信息隐藏中的应用[J],北方工业大学学报,1999(11):24-28.
    [78]丁玮,齐东旭.数字图像变换及信息隐藏与伪装技术[J].计算机学报. 1998, 21(9): 838- 843.
    [79] Schwartz C. A new graphical method for encryption of computer data[J]. Cryptologia, 1991,15(1):43-46.
    [80] Bourbakis N, Alexopoulos C. Picture data encryption using SCAN patterns[J]. Pattern Recognition, 1992, 25(6):567-581.
    [81] Kuo C J. Novel image encryption techinique and its application in progressive transmission[J]. J.Electron. Imaging, 1993,2(4):345-351.
    [82] Chang H K, Liou J L. An image encryption scheme based on quadtree compression scheme[A]. Proceedings of the International Computer Symposium[C]. Taiwan, 2001, 230-237.
    [83] Chen G. Chaos: control and anti-control[J]. IEEE Circuits Syst. Soc. Newsletter, 1998:1-5.
    [84] Schmitz R. Use of chaotic dynamical systems in cryptography[J]. Journal of the Franklin Institute, 2003, 38(9):429-441.
    [85] Lin H B. Chaos[M]. Singapors: World Scientifie,1994.
    [86] Lorenz E N. Deterministic nonperiodic flow[J]. Atoms, Sci, 1963,20:130-141.
    [87] Zbigniew K, Szczepanski J. Application of discrete chaotic dynamical systems in cryptography–DCC method[J]. International Journal of Bifurcation and Chaos. 1999,9(6):1121-1135.
    [88]王毅.基于混沌序列的图像加密研究[J].计算机工程与应用,2002:99-102.
    [89]邹建成,齐东旭,熊昌镇.基于面包师变换的数字图像加密[J].北方工业大学学报. 2003,15(1):6-10.
    [90]张翌维,王育民,沈绪榜.基于混沌映射的一种交替结构图像加密算法[J].中国科学,2007,37(2):183-190.
    [91]马在先,丘水生.基于广义猫映射的一种图像加密系统[J].通信学报. 2003,24(2):52-57.
    [92] Chua L O, et al. Chaos synchironization in Chua’s circuit[J]. Circuits Syst. Comput.,1993,3:309-324.
    [93] Hayes S, et al. Communication with chaos[J]. Phys. Rev. Lett., 1993,70(20):3013-3034.
    [94] Parlitz U, et al. Transmission of digital signals by chaotic synchronization[J]. Int.J. Bifurcation and Chaos., 1992(2):973-977.
    [95] Pecora L M, Carroll L T L. Synchronization in chaotic circuits[J]. Phys,.Rev.Lett.. 1990, 64(8):821-824.
    [96] Habutsu, et al. A secret key cryptosystem by iterating a chaotic map[A]. EUROCRYPT’91, 1991, 127-140.
    [97] Kotulski Z, Szczepanski J. Discrete chaotic cryptography[J]. Annalen der Physik, 1997, 6(5):381-394.
    [98] Bianco M E, Reed D A. Encryption system based on chaos theory[P]. US Patent:5,048,086, 1991-09-10.
    [99] Protopopescu V A, Santoro R T, Tolliver J S. Fast and secure encryption-decryption method based on chaotic dynamics[P]. US Patent 5479513, 1995-12-26.
    [100] Mattews R. On the derivation of a‘chaotic’encryption algorithm[J]. Journal of Cryptologia, 1989, 13(1):29-42.
    [101] Wheeler D D. Problems with chaotic cryptosystems[J]. Journal of Cryptologia. 1989, 12(3):243-250.
    [102] Biham E. Cryptoanalysis of the chaotic-map cryptosystem suggested at EUROCRYPT’91[A]. Conference of EUROCRYPT’91[C]. Springer-Verlag, 1991:532-534.
    [103]姜雪,吴楚.一种基于混沌映射的图像保密通信[J],计算机工程与应用.2004,34:176-178.
    [104] Lian S, Shun J, Wang Z. A block cipher based on a suitable use of the chaotic standard map[J]. Chaos Soliton & Fractals, 2005. 26(1):117–129.
    [105] Maniccam, S., Bourbakis, N.. Image and video encryption using SCAN patterns[J], Pattern Recognition. 2004, 37 (4):725-737.
    [106] Bhargava, B., Shi, C., Wang, S.. MPEG Video Encryption Algorithms[J]. multimedia tools and applications. 2004, 24 (1): 57- 79.
    [107] Salih Ergün, Serdar ?zoguz. Truly random number generators based on a non-autonomous chaotic oscillator[J]. International Journal of Electronics and Communications. 2007, 61(4):235-242.
    [108] Fridrich J. Image encryption based on chaotic maps[A]. IEEE International Conference on System, Man, and Cybernetics, 1997.’Computational Cybernetics and Simulation[C]. 1997, vol.2:1105-1110.
    [109] Tang Guoping, Liao Xiaofeng, Chen Yong. A novel method for designing S-boxes based onchaotic maps. Chaos, Solitons & Fractals. 2005,23:413–419.
    [110] Chen G., Chen Y., Liao X.. An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps[J]. Chaos, Solitons & Fractals. 200731(3): 571-579.
    [111] Pichler F., Scharinger J. Ciphering by Bernoulli shifts in finite Abelian groups[C]. Contributions to General Algebra. Proc. Linz-Conference, 1994: 465-476.
    [112] Scharinger J. Fast encryption of image data using chaotic Kolmogorov flows[J]. Journal of Electronic Imaging, 1998, 7(2): 318-325.
    [113] X. Wang, D. Feng, X. Lai, H. Yu. Collisions for Hash functions MD4, MD5, HAVAL-128 and RIPEMD[C]. Rump Session of Crypto'04 E-print, 2004.
    [114] X. Wang, X. Lai, D. Feng etc.. Cryptanalysis of the Hash functions MD4 and RIPEMD[C]. Proceedings of Eurocrypt'05, Aarhus, Denmark, 2005: 1-18.
    [115]李红达,冯登国.复合离散混沌动力系统与散列函数[J].计算机学报. 2003,4(26):21-26.
    [116]刘军宁,谢杰成,王普.基于混沌映射的单向散列函数构造[J].清华大学学报(自然科学版). 2000,7(40):55-58.
    [117] William Stallings(美)著,杨明等译.密码编码学与网络安全:原理与实践[M].北京:电子工业出版社,2001.
    [118] Kwok-Wo Wong. A combined chaotic cryptographic and hashing scheme[J]. Physics Letters A. 2003, 307: 292–298.
    [119] R.W. Davies, W.L. Price. Digital signature an update[C]. Proceedings International Conference on Computer Communications, Sydney, Oct. 1984, Elsevier, North-Holland, 843-847.
    [120] S.M. Matyas, C. H. Meyer, J. Oseas. Generating strong one-way functions with cryptographic algorithm[J]. IBM Technical Disclosure Bulletin, 1985, 27(10): 5658-5659.
    [121] S. Lian, Z. Liu, Z. Ren, H. Wang, Hash function based on chaotic neural networks[C]. Proceedings of the 2006 International Symposium on Circuits and Systems, 2006: 237-240.
    [122] D. Xiao, X. Liao, S. Deng, One-way Hash function construction based on the chaotic map with changeable-parameter[J]. Chaos Solitons & Fractals. 2006, 24: 65-71.
    [123]彭飞,丘水生,龙敏.基于二维混沌映射的单向Hash函数构造[J].物理学报. 2005,54(10):4562-4568.
    [124]王小敏,张家树,张文芳.基于广义混沌映射切换的单向Hash函数构造[J].物理学报. 2003,52(11):2737-2742.
    [125]韦鹏程,张伟,廖晓峰,杨华千.基于双混沌系统的带秘密密钥散列函数构造[J].通信学报. 2006,27(9):27-33.
    [126]王小敏,张家树,张文芳.基于复合非线性数字滤波器的Hash函数构造[J].物理学报.2005,54(12):5566-5573.
    [127]王继志,王英龙,王美琴.一类基于混沌映射构造Hash函数方法的碰撞缺陷[J].物理学报. 2006,55(10):5048-5054.
    [128] H Feistel. Cryptography and Computer Privacy[J]. Scientific American. 1973, 228(5): 15-23.
    [129] W. Diffie, M. E. Hellman. New directions in cryptography[J]. IEEE Transactions on Information Theory . 1976, 22(6): 644-654.
    [130]苏桂平,刘争春,吕述望. Hash函数在信息安全中随机序列发生器中的应用[J].计算机工程与应用. 2005(11):115-116,192.
    [131]荣海泓,席志红.生物特征身份鉴别技术应用及发展趋势[J].现代电子技术, 2004(11):88-91.
    [132] D.Zhang. Automated Biometrics-Technology and Systems[M]. Kluwer Academic Publishers, 2000.
    [133]朱勇,谭铁牛,王蕴红.基于笔迹的身份鉴别[J].自动化学报. 2001, 27(2): 229-234.
    [134] Plamondon R,Lorette G. Automatic signature verification and writer identification-the state of the art[J]. Pattern Recognition, 1989, 22(2):107-131.
    [135] Miller B. Vital signs of identity[J]. IEEE Spectrum. 1994(1):22-30.
    [136]左文明.脱机手写中文签名鉴别的研究[D].博士学位论文.华南理工大学. 2004年.
    [137]李彬.联机手写签名鉴别技术的研究[D].博士学位论文.哈尔滨工业大学.2006年.
    [138] http://www.wacom.com/
    [139] http://www.smartpen.com/
    [140] R.Baron,R.Plamondon. Acceleration measurement with an instrumented pen for signature verification and handwriting analysis[J]. IEEE Transactions on Instrumentation and Measurement. 1989, 38(6):1132-1138.
    [141] V.S.Nalwa. Automatic on-line signature verification[J]. Proceedings of the IEEE. 1997, 85(2): 215-239.
    [142] A.K.Jain, F.D.Griess, S.D.Connell. On-line signature verification[J]. Pattern Recognition. 2002, 35(2):2963-2972.
    [143]郑建彬.在线手写签名认证及其演化算法实现[D].博士学位论文.华中科技大学.2006年.
    [144] W.S.Wjiesoma, M.Ma, E.Sung. Selecting optimal personalized feature for on-line signature verification using GA[J]. IEEE Internatinal Conference on Systems, Man, and Cybernetics, 2000, 4:2740-2745.
    [145] Zou Mingfu, Tong Jianjun,Liu Changping. On-line signature verification using local shape analysis[J]. Proceedings of IEEE,2003.
    [146] Kiran G V,Srinivasa R,Rao Kunte.On-line signature verification system using probabilistic feature modeling[C]. International Symposium on Signal Processing and its Applications. Kuala Lumpur, Malaysia,13-16 August,Proceedings of IEEE,2001:355-358.
    [147] Richiardi Jonas,Ketabdar Hamed,Drygajlo Andrzej. Local and global feature selection for on-line signature verification[C]. IEEE Proceedings of the 8th International Conference on Document Analysis and Recognition, 2005.
    [148] R.Plamondon,S.N.Srihari. On-line and off-line handwriting recognition: A comprehensive survey[J]. IEEE transaction on pattern analysis and machine intelligence, 2000,22(1):63-84.
    [149] F.Bauer and B.Wirtz. Parameter reduction and personalized parameter selection for automatic signature verification[C]. Proc. Third Int’l Conf. Document Analysis and Recognition. Montreal, 1995:183-186.
    [150] S.H.Kim, M.S.Park, J.Kim. Applying personalized weights to a feature set for on-line signature verification[C]. Proc. Third Int’l Conf. Document Analysis and Recognition. Montreal, 1995:882-885.
    [151] L.L.Lee, T.Berger, E.Aviczer. Reliable on-line signature verification systems[J]. IEEE Trans. Pattern Analysis and machine intelligence. 1996, 28(6):643-647.
    [152] K.Huang and H.Yan. On-line signature verification based on dynamic segmentation and global and local matching[J]. Optical Eng..1995, 34(2):3480-3488.
    [153] R.Martens, L.Claesen. Dynamic programming optimization for on-line signature verification[C]. Proc. Fourth Int’l Conf.. Document Analysis and Recognition. Germany, 1997:653-656.
    [154] R.Martens, L.Claesen. On-line signature verification by dynamic time-warping[C]. Proc. 13th, Int’l Conf.. Pattern Recognition. 1996:38-42.
    [155] B.Wirtz. Stroke-based time warping for signature verification[C]. Proc. Third Int’l Conf.. Document Analysis and Recognition. Montreal, 1995:179-182..
    [156] K.K.Lau, P.C.Yuen, Y.Y.Tang. A new function-based On-line signature verification method[C]. Proc. sixth Int’l Workshop Frontiers in Handwriting Recognition. Korea, 1998:449-454.
    [157] V.S.Nalwa. Automatic on-line signature verification[C]. Proc. IEEE. 1997, 85(2):215-240.
    [158] D.J.Bamilton, J.Whelan, A.Mclaren, I.Macintyre, A.Tizzard. Low cost dynamic signature verification system[C]. IEEE Conf. Publications. 1995(408):202-206.
    [159] Q.Z.Wu, L.C.Jou, S.Y.Lee. On-line signature verification using LPC cepstrum and neural networks[J]. IEEE Trans. Systems, Man, and Cybernetics. 1997, 27(1),part B:148-153.
    [160] J.G.A.Dolfing, E.H.L.Aarts, J.J.G.M.Van Oosterhout. On-line verification signature with hidden Markov models[C]. Proc. 14th Int’l Conf.. Pattern Recognition. 1998:1309-1312.Australia.
    [161] L.Yang, B.K.Widjaja, R.Prasad. Application of hidden Markov models for signature verification[J]. Pattern Recognition. 1995, 28(2):161-170.
    [162] R.S.Kashi, W.Turin, W.L.Nelson. On-line handwriting signature verification using stroke direction coding[J]. Optical Eng.. 1996,35(9):2526-2533.
    [163] T.Matsuura, T.S.Yu. On-line signature verification by IIR system[C]. Proc. Fifth Int’l Workshop Frontiers in Handwriting Recognition. England, 1996:413-416.
    [164] X.H.Xiao and R.W.Dai. On-line Chinese signature verification by matching dynamic and structural features with a quasirelaxation approach[C]. Proc. Fifth Int’l Workshop Frontiers in Handwriting Recognition. England, 1996,:475-478.
    [165] X.H.Xiao and R.W.Dai. A hierarchical on-line Chinese signature verification system[C]. Proc. Third Int’l Conf. Document Analysis and Recognition. Montreal, 1995:202-205.
    [166] Q.Z.Wu, S.Y.Lee, L.C.Jou. On-line signature verification based on logarithmic spectrum[J]. Pattern Recognition. 1998, 31(12):1865-1871.
    [167] T.Matsuura, S.Yamanoto. Signature verification using distribution of angular direction of pen-point movement[C]. Proc. Sixth Int’l Workshop Frontiers in Handwriting Recognition. Korea, 1998:537-545.
    [168] Connell S D.On-line handwriting recognition using multiple pattern class models. Ph.D.thesis[D]. Michigan State University. Department of computer science, May 2000.
    [169] Ahmed N T,Natarajan,Rao K R. Discrete cosine transform[J]. IEEE Trans. Comput. 1974, 23(Jan):90-93.
    [170]程睿.DCT算法研究及其IP核的实现[D].硕士学位论文.西安电子科技大学.2006.
    [171]梁学章,小波分析[M] .北京:国防工业出版社,2005.
    [172]胡昌华,基于MATLAB的系统分析与设计——小波分析[M] .西安:西安电子科技大学出版社,2004.
    [173] Oivievrioul, Martin Vetterll. Wavelet s and signal processing[J]. IEEE SP Magzine , 1991 , 10 :14238.
    [174]马海豹,刘漫丹,张岑.基于小波包分析和SVM的在线手写签名鉴别[J].华东理工大学学报(自然科学版). 2007, 33( 4):541-545.
    [175] G. I. Davida, Y. Frankel, B. J. Matt. On enabling secure applications through off-line biometric identification[J], IEEE Symp. Privacy and Security, 1998:148–157.
    [176] F. Monrose, M. K. Reiter, and S.Wetzel. Password hardening based on keystroke dynamics[C]. the sixth ACM Conf. Computer and Communications Security, 1999:73–82.
    [177] U. Uludag, S. Pankanti, S. Prabhakar, A. K. Jain. Biometric cryptosystems: Issues andchallenges[C].Proceedings of the IEEE, 2004,92(6) :948–960.
    [178] A. Juels, M. Wattenberg.A fuzzy commitment scheme[C]. the sixth ACM Conf. Computer and Communications Security. 1999:28–36.
    [179] A. Juels, M. Sudan.A fuzzy vault scheme[C].Proc. IEEE Int. Symp. Information Theory. 2002:408.
    [180] T. C. Clancy, N. Kiyavash, D. J. Lin. Secure smartcard-based fingerprint authentication[C]. Proc. ACMSIGMM 2003 Multimedia, Biometrics Methods and Applications Workshop, pp. 45–52.
    [181] Manuel R. Freire, Julian Fierrez, Marcos Martinez-Diaz, Javier Ortega-Garcia. On the applicability of off-line signatures to the fuzzy vault construction[C]. The ninth International Conference on Document Analysis and Recognition, 2007:1173-1177.
    [182] Xun Yi. Hash Function Based on Chaotic Tent Maps[J]. IEEE Transactions on circuits and systems II, 2005, 52(6):354-357.
    [183] Di Xiao, Xiaofeng Liao, Shaojiang Deng. One-way Hash function construction based on the chaotic map with changeable-parameter[J]. Chaos, Solitons & Fractals, 2005(24): 65-71.
    [184]刘建东,余有明.基于可变参数双向耦合映像系统的时空混沌Hash函数设计[J].物理学报, 2007,56(3): 1297-1304.
    [185] Jiashu Zhang, Xiaomin Wang, and Wenfang Zhang. Chaotic keyed hash function based on feedforward–feedback nonlinear digital filter[J].Physics Letters A, 2007,362(5-6): 439-448.
    [186]盛利元,孙克辉,李传兵.基于切延迟的椭圆反射腔离散混沌系统及其性能研究[J].物理学报. 2004,53(9): 2871-2877.
    [187]盛利元,曹莉凌,孙克辉,闻姜.基于TD-ERCS混沌系统的伪随机数发生器及其统计特性分析[J].物理学报. 2005,54(9): 4031-4037.
    [188]盛利元,闻姜,曹莉凌,肖燕予.TD-ERCS混沌系统的差分分析[J]. 2007, 56(1): 78-83.
    [189]盛利元,李更强,李志炜.基于切延迟椭圆反射腔映射系统的单向Hash函数构造[J], 2006,55(11) :5700-5706.
    [190] Dit-Yan Yeung, Hong Chang, Yimin Xiong, Susan George, Ramanujan Kashi, Takashi Matsumoto, Gerhard Rigoll. SVC2004: First International Signature Verification Competition[C], 2004:16-22.
    [191]翟小娟.基于Pocket PC医学图像浏览器的研究与设计[D].硕士学位论文.泰山医学院. 2007.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700