Skip to main content

Research on Security of Public Security Iris Application

  • 2986 Accesses

Part of the Lecture Notes in Computer Science book series (LNIP,volume 10996)

Abstract

Combined with the security problems encountered in the public security iris application, this paper makes a comprehensive analysis of these security problems from two aspects of iris acquisition and iris verification. And using the current academic research results, combined with the practical application requirements, the iris template encryption, the original image encryption, transmission encryption, equipment authentication and other technical means are used to construct the security system of the public security iris application and ensure the public security iris application in an all-round way. Finally, the application of the research results in actual use is introduced.

Keywords

  • Public security
  • Iris application
  • Security threat
  • Iris verification
  • Hash value

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Zheng, F., Askar, R., Wang, R.Y., Li, L.T.: Overview of biometric recognition technology. J. Inf. Secur. Res. 2(1), 12–26 (2016)

    Google Scholar 

  2. Huo, H.W., Xia, T.N., Feng, J.: Security analysis on biometrics system. Stand. Res. 4, 48–51 (2013)

    Google Scholar 

  3. Ratha, N.K., Connell, J.H., Bolle, R.M.: An analysis of minutiae matching strength. In: Bigun, J., Smeraldi, F. (eds.) AVBPA 2001. LNCS, vol. 2091, pp. 223–228. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45344-X_32

    CrossRef  Google Scholar 

  4. Ao, S., Ma, J., Tang, S.L.: Safety analysis and reflection on biometrics system. Microcomput. Inf. 23(1–2), 288–290 (2007)

    Google Scholar 

  5. Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: Proceedings of the 6th ACM Conference on Computer and Communications Security (CCCS), pp. 28 − 36. ACM, New York (1999)

    Google Scholar 

  6. Li, P., Tian, J., Yang, X., Shi, P., Zhang, Y.Y.: Biometric template protection. J. Softw. 20(6), 1553–1573 (2009)

    CrossRef  Google Scholar 

  7. Sheng, Y.Z.: Cryptanalysis of SM3 Cryptographic Hash Algorithm. DongHua University, Shanghai (2013)

    Google Scholar 

  8. Xu, S.W., Qin, X.L.: Data security analysis and measures based on cloud storage. J. Beijing Electr. Sci. Technol. Inst. 22(2), 15–19 (2014)

    Google Scholar 

  9. Huang, X.S.: Research progress of digital image security technology. J. East China Jiaotong Univ. 23(1), 82–86 (2006)

    Google Scholar 

  10. Wang, C.G., Qiao, S.S., Hei, Y.: Low complexity implementation of block cipher SM4 algorithm. Comput. Eng. 39(7), 177–180 (2013)

    Google Scholar 

  11. Song, G.Q.: Research on Digital Image Encryption Technology. National University of Defense Technology, Changsha (2007)

    Google Scholar 

  12. Qian, K.F., Wang, P., Wang, H.W.: Research of device authentication mechanism in EPA. Comput. Eng. Des. 28(24), 5877–5902 (2007)

    Google Scholar 

  13. Qi, Y.F., Huo, Y.L., Zhang, J.S.: Techniques and security on biometrics system. Microcomput. Inf. 24(6–3), 30–34 (2008)

    Google Scholar 

  14. Li, M.K., Yu, X.X.: Role based access control technology and its application. Appl. Res. Comput. 10, 44–47 (2000)

    Google Scholar 

  15. Chang, J.: The Design of Multi-domain and Multi-level Secure Access Control Model. Hebei University of Science and Technology, Hebei (2015)

    Google Scholar 

  16. Bai, X.S.: Research on network security isolation and information exchange technology. Silicon valley 1, 66 (2010)

    Google Scholar 

  17. Wang, S.Q.: Systematic analysis of network security isolation and information exchange technology. Inf. Commun. 3, 211–212 (2012)

    Google Scholar 

Download references

Acknowledgment

This work was supported by Beijing Municipal Science and Technology Project: Z171100004417022, Science and Technology Project of the Ministry of Public Security: 2017GABJC35.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Li Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Li, L., Li, S., Zhao, S., Tan, L. (2018). Research on Security of Public Security Iris Application. In: Zhou, J., et al. Biometric Recognition. CCBR 2018. Lecture Notes in Computer Science(), vol 10996. Springer, Cham. https://doi.org/10.1007/978-3-319-97909-0_49

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-97909-0_49

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-97908-3

  • Online ISBN: 978-3-319-97909-0

  • eBook Packages: Computer ScienceComputer Science (R0)