Journal of Applied Sciences ›› 2021, Vol. 39 ›› Issue (2): 330-337.doi: 10.3969/j.issn.0255-8297.2021.02.015
• Computer Science and Applications • Previous Articles
ZHU Yanyan1, LI Sheng2, FENG Guorui1, ZHANG Xinpeng1
Received:
2019-10-29
Published:
2021-04-01
CLC Number:
ZHU Yanyan, LI Sheng, FENG Guorui, ZHANG Xinpeng. Fingerprint Recognition System Based on Editable Blockchain[J]. Journal of Applied Sciences, 2021, 39(2): 330-337.
[1] 新加坡网络空间安全战略[J]. 汕头大学学报(人文社会科学版), 2016, 32(6):157. Singapore's cybersecurity strategy[J]. Editorial Department of Shantou University Journal (Humanities and Social Sciences Edition), 2016, 32(6):157. (in Chinese) [2] Nakamoto S. Bitcoin:a peer-to-peer electronic cash system[EB/OL].[2019-10-29]. https://bitcoin.org/en/bitcoin-paper. [3] Zheng Z, Xie S, Dai H, et al. An overview of blockchain technology:architecture, consensus, and future trends[C]//2017 IEEE International Congress on Big Data (BigData Congress). IEEE, 2017:557-564. [4] 周致成, 李立新, 郭松, 等. 基于区块链技术的生物特征和口令双因子跨域认证方案[J]. 计算机应用, 2018, 38(6):1620-1627. Zhou Z C, Li L X, Guo S, et al. Bi-factor crossdomain authentication scheme of biometrics and password based on blockchain technology[J]. Computer Application, 2018, 38(6):1620-1627. (in Chinese) [5] 吕婧淑, 操晓春, 杨培. 基于区块链和人脸识别的双因子身份认证模型[J]. 应用科学学报, 2019, 37(2):164-178. Lü J S, Cao X C, Yang P. Two-factor identity authentication model based on blockchain ande face recognition[J]. Journal of Applied Sciences, 2019, 37(2):164-178. (in Chinese) [6] Cappelli R, Ferrara M, Maltoni D. Fingerprint indexing based on minutia cylinder-code[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2010, 33(5):1051-1057. [7] Cappelli R, Ferrara M, Maltoni D. Minutia cylinder-code:a new representation and matching technique for fingerprint recognition[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2010, 32(12):2128-2141. [8] Kim J, Teoh A B J. One-factor cancellable biometrics based on indexing-first-order hashing for fingerprint authentication[C]//International Conference on Pattern Recognition (ICPR). IEEE, 2018:3108-3113. [9] Jin Z, Lim M H, Teoh A B J, et al. Generating fixed-length representation from minutiae using kernel methods for fingerprint authentication[J]. IEEE Transactions on Systems, Man, and Cybernetics:Systems, 2016, 46(10):1415-1428. [10] Jin Z, Hwang J Y, Lai Y L, et al. Ranking-based locality sensitive hashing-enabled cancelable biometrics:index-of-max hashing[J]. IEEE Transactions on Information Forensics and Security, 2017, 13(2):393-407. [11] Lee M J, Jin Z, Teoh A B J. One-factor cancellable scheme for fingerprint template protection:extended feature vector (EFV) hashing[C]//2018 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, 2018:1-7. [12] Kho J B, Teoh A B J, Lee W, et al. Fixed-length bit-string representation of fingerprint by normalized local structures[DB/OL]. 2018[2019-10-29]. https://arxiv.org/abs/1811.11489. [13] Krawczyk H, Rabin T. Chameleon hashing and signatures:US6108783[P]. 2000-08-22[2019-10-29]. [14] Ateniese G, Magri B, Venturi D, et al. Redactable blockchain-or-rewriting history in bitcoin and friends[C]//2017 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE, 2017:111-126. [15] 李佩丽, 徐海霞, 马添军, 等. 可更改区块链技术研究[J]. 密码学报, 2018, 5(5):51-59. Li P L, Xu H X, Ma T J, et al. Research on changeable blockchain technology[J]. Journal of Cryptography, 2018, 5(5):51-59. (in Chinese) [16] 任艳丽, 徐丹婷, 张新鹏, 等. 基于门限环签名的可删除区块链[J]. 通信学报, 2019, 40(4):71-82. Ren Y L, Xu D T, Zhang X P, et al. Deletable blockchain based on threshold ring signature[J]. Journal of Communication, 2019, 40(4):71-82. (in Chinese) |
[1] | XIANG Weijing, TSAI Weitek. Research and Design of Legal Smart Contract Platform Model [J]. Journal of Applied Sciences, 2021, 39(1): 109-122. |
[2] | ZHANG Yubin, XIONG Bangshu, OU Qiaofeng, HUANG Jianping, CHEN Yaofeng. Circular Marker Detection of Under-Exposed Images of Helicopter Blades Based on YOLOv3 and Watershed [J]. Journal of Applied Sciences, 2020, 38(6): 906-915. |
[3] | ZHENG Hong, YE Cheng, JIN Yonghong, CHENG Yunhui. Customer Churn Prediction Method Based on Stacking Ensemble Learning [J]. Journal of Applied Sciences, 2020, 38(6): 944-954. |
[4] | YU Shuangsheng, YANG Zhongliang, JIANG Minyu, HUANG Yongfeng. Text Steganography Based on Neural Machine Translation [J]. Journal of Applied Sciences, 2020, 38(6): 976-985. |
[5] | YAO Rujing, YANG Lei, YANG Tao, HU Yingxin, TIAN Qiang, WU Ou. Analysis for Psychological Scale Big Data Based on Improved Ising Model [J]. Journal of Applied Sciences, 2020, 38(3): 339-352. |
[6] | JIANG Qinyin, ZHANG Xi. Topic-Specific Assessment Approach for Social Network Influence Evaluation [J]. Journal of Applied Sciences, 2020, 38(3): 353-366. |
[7] | ZHANG Tongtong, DONG Junyu, ZHAO Haoran, LI Qiong, SUN Xin. Lightweight Phytoplankton Detection Network Based on Knowledge Distillation [J]. Journal of Applied Sciences, 2020, 38(3): 367-376. |
[8] | WEI Ziyang, ZHAO Zhihong, ZHAO Jingjiao. Improved Faster R-CNN Algorithm and Its Application on Vehicle Detection [J]. Journal of Applied Sciences, 2020, 38(3): 377-387. |
[9] | SUN Ronghai, SHI Linfu, YU Chunqiang, LAO Huan, TANG Zhenjun. Random Interpolation Method for Data Hiding in Encrypted Images [J]. Journal of Applied Sciences, 2020, 38(3): 419-430. |
[10] | WANG Daqian, CUI Rongyi, JIN Jingxuan. Text Detection in Natural Scene Based on Visual Attention Model and Multi-scale MSER [J]. Journal of Applied Sciences, 2020, 38(3): 496-506. |
[11] | YANG Gaoqiang, LI Sheng, ZHANG Xinpeng. Altered Fingerprint Detection Based on Orientation Field [J]. Journal of Applied Sciences, 2019, 37(6): 775-782. |
[12] | YU Shuzhen, OU Qiaofeng, XIONG Bangshu, CHEN Yaofeng. A Calibration Method Based on Defocused Image for Stereo Vision Sensor with Large FOV [J]. Journal of Applied Sciences, 2019, 37(6): 795-805. |
[13] | CUI Sanshuai, MAO Maoyu, LIN Xiaodan, KANG Xiangui. Survey on Analysis and Applications of Electric Network Frequency (ENF) Signals in Image and Video [J]. Journal of Applied Sciences, 2019, 37(5): 573-589. |
[14] | LIU Wei, ZHANG Wanling, XIANG Shijun. Face Anti-spoofing Based on LBP, Multilayer DCT and CNN [J]. Journal of Applied Sciences, 2019, 37(5): 609-617. |
[15] | QU Lingfeng, CHEN fan, HE Hongjie, YUAN yuan. Security Analysis of Image Encryption Algorithm Based on Bit Plane-Pixel Block Scrambling [J]. Journal of Applied Sciences, 2019, 37(5): 631-642. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||