Skip to main content

Research on Security of Public Security Iris Application

  • Conference paper
  • First Online:
Biometric Recognition (CCBR 2018)

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 10996))

Included in the following conference series:

  • 3069 Accesses

Abstract

Combined with the security problems encountered in the public security iris application, this paper makes a comprehensive analysis of these security problems from two aspects of iris acquisition and iris verification. And using the current academic research results, combined with the practical application requirements, the iris template encryption, the original image encryption, transmission encryption, equipment authentication and other technical means are used to construct the security system of the public security iris application and ensure the public security iris application in an all-round way. Finally, the application of the research results in actual use is introduced.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zheng, F., Askar, R., Wang, R.Y., Li, L.T.: Overview of biometric recognition technology. J. Inf. Secur. Res. 2(1), 12–26 (2016)

    Google Scholar 

  2. Huo, H.W., Xia, T.N., Feng, J.: Security analysis on biometrics system. Stand. Res. 4, 48–51 (2013)

    Google Scholar 

  3. Ratha, N.K., Connell, J.H., Bolle, R.M.: An analysis of minutiae matching strength. In: Bigun, J., Smeraldi, F. (eds.) AVBPA 2001. LNCS, vol. 2091, pp. 223–228. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45344-X_32

    Chapter  Google Scholar 

  4. Ao, S., Ma, J., Tang, S.L.: Safety analysis and reflection on biometrics system. Microcomput. Inf. 23(1–2), 288–290 (2007)

    Google Scholar 

  5. Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: Proceedings of the 6th ACM Conference on Computer and Communications Security (CCCS), pp. 28 − 36. ACM, New York (1999)

    Google Scholar 

  6. Li, P., Tian, J., Yang, X., Shi, P., Zhang, Y.Y.: Biometric template protection. J. Softw. 20(6), 1553–1573 (2009)

    Article  Google Scholar 

  7. Sheng, Y.Z.: Cryptanalysis of SM3 Cryptographic Hash Algorithm. DongHua University, Shanghai (2013)

    Google Scholar 

  8. Xu, S.W., Qin, X.L.: Data security analysis and measures based on cloud storage. J. Beijing Electr. Sci. Technol. Inst. 22(2), 15–19 (2014)

    Google Scholar 

  9. Huang, X.S.: Research progress of digital image security technology. J. East China Jiaotong Univ. 23(1), 82–86 (2006)

    Google Scholar 

  10. Wang, C.G., Qiao, S.S., Hei, Y.: Low complexity implementation of block cipher SM4 algorithm. Comput. Eng. 39(7), 177–180 (2013)

    Google Scholar 

  11. Song, G.Q.: Research on Digital Image Encryption Technology. National University of Defense Technology, Changsha (2007)

    Google Scholar 

  12. Qian, K.F., Wang, P., Wang, H.W.: Research of device authentication mechanism in EPA. Comput. Eng. Des. 28(24), 5877–5902 (2007)

    Google Scholar 

  13. Qi, Y.F., Huo, Y.L., Zhang, J.S.: Techniques and security on biometrics system. Microcomput. Inf. 24(6–3), 30–34 (2008)

    Google Scholar 

  14. Li, M.K., Yu, X.X.: Role based access control technology and its application. Appl. Res. Comput. 10, 44–47 (2000)

    Google Scholar 

  15. Chang, J.: The Design of Multi-domain and Multi-level Secure Access Control Model. Hebei University of Science and Technology, Hebei (2015)

    Google Scholar 

  16. Bai, X.S.: Research on network security isolation and information exchange technology. Silicon valley 1, 66 (2010)

    Google Scholar 

  17. Wang, S.Q.: Systematic analysis of network security isolation and information exchange technology. Inf. Commun. 3, 211–212 (2012)

    Google Scholar 

Download references

Acknowledgment

This work was supported by Beijing Municipal Science and Technology Project: Z171100004417022, Science and Technology Project of the Ministry of Public Security: 2017GABJC35.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Li Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Li, L., Li, S., Zhao, S., Tan, L. (2018). Research on Security of Public Security Iris Application. In: Zhou, J., et al. Biometric Recognition. CCBR 2018. Lecture Notes in Computer Science(), vol 10996. Springer, Cham. https://doi.org/10.1007/978-3-319-97909-0_49

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-97909-0_49

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-97908-3

  • Online ISBN: 978-3-319-97909-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics