Dissertation > Excellent graduate degree dissertation topics show

Research on Iris Based Cryptography

Author: QiNing
Tutor: ZhangDaPeng
School: Harbin Institute of Technology
Course: Computer Science and Technology
Keywords: Cryptography Iris Key Biometric
CLC: TP309.7
Type: Master's thesis
Year: 2008
Downloads: 32
Quote: 0
Read: Download Dissertation

Abstract


Traditional cryptography uses key to encrypt and decrypt, so its security depends on key protection. This system has many potential problems, such as that the key can not provide non-repudiation as well as too long to be memorized, making it easy to be lost. In order to solve these problems, bio-cryptography is developed. It uses biometrics to generate keys, and uses the appropriate methods to protect information.Cryptography based on iris is an important branch of the bio-cryptography. Because iris is steady, unique, non-invasive, and so on, cryptography based on iris has an important significance and broad prospects. So we research on this subject and the main contents include the following:First, we summarize the theory of iris cryptography comprehensively and deeply. We discuss the relationship between iris cryptography and iris recognition, the issues it focuses on, the encryption and decryption process, the classification of iris encryption algorithm and how to measure performance.Then, we extract features from iris refer to the feature extraction process of iris recognition. Features extracted should not only describe the texture efficiently, but also has a strong distinction to be suitable for iris cryptography.Third, we propose a novel iris cryptography algorithm based on Reed-Solomon theory. This algorithm extracts feature vector from iris to encrypt and decrypt, while using Reed-Solomon to eliminate the fuzziness of iris.Fourth, we propose a novel iris cryptography algorithm based on Modified Fuzzy Vault. This algorithm extract feature vector from iris and use Modified Fuzzy Vault algorithm to encrypt and decrypt, which can eliminate the fuzziness of iris effectively.Last, we propose a novel algorithm called iris cryptography algorithm based on AES. This algorithm extract feature vector from iris and translate it into 128 bit binary string which is used as key in AES algorithm.

Related Dissertations

  1. Resrarch on Multisignatures and Multisigncryptions from Identity-based,TN918.1
  2. Yunnan Province, human capital, the network structure of critical efficiency factor,F249.27
  3. Study on the Mechanism of Night Temperature to Grain Filling of Inferior in Rice,S511
  4. Research of Sensitive Information Protection Techniques for Automated Trust Negotiation,TP309
  5. Research on the Design and Implementation of Border Access Platform in Public Security Network,TP393.09
  6. Study on Cross-compatibility and Embryology of Interspecific Hybridization in Iris,S682.19
  7. Region-based wireless sensor network key management scheme for research,TP212.9
  8. Key programs for university teaching reference repository construction applied research,G642.3
  9. CAD/CAPP/CAM Integrated System Development for Key Components in Marine Diesel,U664.121
  10. Research and Application on Security Authentication Technologies in Internet of Things,TN929.5
  11. The Research and Implementation of Iris Recognition Algorithm,TP391.41
  12. Research and Design of a High-Performance Scalable Public Key Cryptographic Coprocessor,TN918.1
  13. A Video Copyright Registration and Identification System Based on Copy Detection,TP311.52
  14. Research and Design of Secure Comunication of NVD on Demand System,TP309
  15. Research on Multi-modalbiometric Fusion Personalidentification Technology Based on Fingerprint and Name Speech,TP391.41
  16. Research on the Key Management Scheme in Secure Multicast for Wimax,TN918.82
  17. Mobile terminal identity digital signature scheme based on research,TN918.1
  18. Identity-based NVD remote key system design and implementation,TN918.2
  19. Identity-Based Authentication System Research and Implementation,TN918.1
  20. E-government network security instant messaging system design and implementation,TP393.08

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > General issues > Security and confidentiality > Encryption and decryption
© 2012 www.DissertationTopic.Net  Mobile