Research on Security of Public Security Iris Application

  • Li LiEmail author
  • Shengguang Li
  • Shiwei Zhao
  • Lin Tan
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10996)


Combined with the security problems encountered in the public security iris application, this paper makes a comprehensive analysis of these security problems from two aspects of iris acquisition and iris verification. And using the current academic research results, combined with the practical application requirements, the iris template encryption, the original image encryption, transmission encryption, equipment authentication and other technical means are used to construct the security system of the public security iris application and ensure the public security iris application in an all-round way. Finally, the application of the research results in actual use is introduced.


Public security Iris application Security threat Iris verification Hash value 



This work was supported by Beijing Municipal Science and Technology Project: Z171100004417022, Science and Technology Project of the Ministry of Public Security: 2017GABJC35.


  1. 1.
    Zheng, F., Askar, R., Wang, R.Y., Li, L.T.: Overview of biometric recognition technology. J. Inf. Secur. Res. 2(1), 12–26 (2016)Google Scholar
  2. 2.
    Huo, H.W., Xia, T.N., Feng, J.: Security analysis on biometrics system. Stand. Res. 4, 48–51 (2013)Google Scholar
  3. 3.
    Ratha, N.K., Connell, J.H., Bolle, R.M.: An analysis of minutiae matching strength. In: Bigun, J., Smeraldi, F. (eds.) AVBPA 2001. LNCS, vol. 2091, pp. 223–228. Springer, Heidelberg (2001). Scholar
  4. 4.
    Ao, S., Ma, J., Tang, S.L.: Safety analysis and reflection on biometrics system. Microcomput. Inf. 23(1–2), 288–290 (2007)Google Scholar
  5. 5.
    Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: Proceedings of the 6th ACM Conference on Computer and Communications Security (CCCS), pp. 28 − 36. ACM, New York (1999)Google Scholar
  6. 6.
    Li, P., Tian, J., Yang, X., Shi, P., Zhang, Y.Y.: Biometric template protection. J. Softw. 20(6), 1553–1573 (2009)CrossRefGoogle Scholar
  7. 7.
    Sheng, Y.Z.: Cryptanalysis of SM3 Cryptographic Hash Algorithm. DongHua University, Shanghai (2013)Google Scholar
  8. 8.
    Xu, S.W., Qin, X.L.: Data security analysis and measures based on cloud storage. J. Beijing Electr. Sci. Technol. Inst. 22(2), 15–19 (2014)Google Scholar
  9. 9.
    Huang, X.S.: Research progress of digital image security technology. J. East China Jiaotong Univ. 23(1), 82–86 (2006)Google Scholar
  10. 10.
    Wang, C.G., Qiao, S.S., Hei, Y.: Low complexity implementation of block cipher SM4 algorithm. Comput. Eng. 39(7), 177–180 (2013)Google Scholar
  11. 11.
    Song, G.Q.: Research on Digital Image Encryption Technology. National University of Defense Technology, Changsha (2007)Google Scholar
  12. 12.
    Qian, K.F., Wang, P., Wang, H.W.: Research of device authentication mechanism in EPA. Comput. Eng. Des. 28(24), 5877–5902 (2007)Google Scholar
  13. 13.
    Qi, Y.F., Huo, Y.L., Zhang, J.S.: Techniques and security on biometrics system. Microcomput. Inf. 24(6–3), 30–34 (2008)Google Scholar
  14. 14.
    Li, M.K., Yu, X.X.: Role based access control technology and its application. Appl. Res. Comput. 10, 44–47 (2000)Google Scholar
  15. 15.
    Chang, J.: The Design of Multi-domain and Multi-level Secure Access Control Model. Hebei University of Science and Technology, Hebei (2015)Google Scholar
  16. 16.
    Bai, X.S.: Research on network security isolation and information exchange technology. Silicon valley 1, 66 (2010)Google Scholar
  17. 17.
    Wang, S.Q.: Systematic analysis of network security isolation and information exchange technology. Inf. Commun. 3, 211–212 (2012)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  • Li Li
    • 1
    • 2
    Email author
  • Shengguang Li
    • 1
    • 2
  • Shiwei Zhao
    • 1
    • 2
  • Lin Tan
    • 1
    • 2
  1. 1.First Research Institute of the Ministry of Public Security of PRCBeijingChina
  2. 2.Key Laboratory of Internet of Things Application Technology of the Ministry of Public Security of PRCBeijingChina

Personalised recommendations