信息网络安全
信息網絡安全
신식망락안전
NETINFO SECURITY
2014年
8期
1-5
,共5页
生物特征识别%网络认证%生物3D打印%人脸识别
生物特徵識彆%網絡認證%生物3D打印%人臉識彆
생물특정식별%망락인증%생물3D타인%인검식별
biometric recognition%network authentication%Bio-3D printing%face recognition
文章分析了现今基于生物识别技术的网络认证没被广泛应用的原因:生物特征的提取一般需要特殊的专用设备、指纹的利用比较泛滥、生物特征遗失后挂失比较困难等。文章同时对比了几种比较主流的生物特征识别技术,分析了它们各自的实用性、便捷性以及安全性,指出生物3D打印技术在未来对生物识别技术带来冲击的可能。文章提出了一种基于动态人脸识别的网络认证方案,该方案利用人脸作为网络认证的基础,通过跟踪实时人脸活动来实现实时人脸图像的采集,预防了照片攻击和视频攻击,提高了认证的可靠性和安全性。文章最后通过分析该方案的可实现性、可叠加性和安全性,并从成本等方面考虑,得出该方案性能较优的结论,同时对生物识别技术应用于网络认证进行了展望。由于生物特征具有唯一性和不可重置的特点,所以生物特征保护需要引起更高的关注,也需要更多学者做相关的研究,更好地利用生物特征。
文章分析瞭現今基于生物識彆技術的網絡認證沒被廣汎應用的原因:生物特徵的提取一般需要特殊的專用設備、指紋的利用比較汎濫、生物特徵遺失後掛失比較睏難等。文章同時對比瞭幾種比較主流的生物特徵識彆技術,分析瞭它們各自的實用性、便捷性以及安全性,指齣生物3D打印技術在未來對生物識彆技術帶來遲擊的可能。文章提齣瞭一種基于動態人臉識彆的網絡認證方案,該方案利用人臉作為網絡認證的基礎,通過跟蹤實時人臉活動來實現實時人臉圖像的採集,預防瞭照片攻擊和視頻攻擊,提高瞭認證的可靠性和安全性。文章最後通過分析該方案的可實現性、可疊加性和安全性,併從成本等方麵攷慮,得齣該方案性能較優的結論,同時對生物識彆技術應用于網絡認證進行瞭展望。由于生物特徵具有唯一性和不可重置的特點,所以生物特徵保護需要引起更高的關註,也需要更多學者做相關的研究,更好地利用生物特徵。
문장분석료현금기우생물식별기술적망락인증몰피엄범응용적원인:생물특정적제취일반수요특수적전용설비、지문적이용비교범람、생물특정유실후괘실비교곤난등。문장동시대비료궤충비교주류적생물특정식별기술,분석료타문각자적실용성、편첩성이급안전성,지출생물3D타인기술재미래대생물식별기술대래충격적가능。문장제출료일충기우동태인검식별적망락인증방안,해방안이용인검작위망락인증적기출,통과근종실시인검활동래실현실시인검도상적채집,예방료조편공격화시빈공격,제고료인증적가고성화안전성。문장최후통과분석해방안적가실현성、가첩가성화안전성,병종성본등방면고필,득출해방안성능교우적결론,동시대생물식별기술응용우망락인증진행료전망。유우생물특정구유유일성화불가중치적특점,소이생물특정보호수요인기경고적관주,야수요경다학자주상관적연구,경호지이용생물특정。
This paper analyzes the causes of today's network authentication based on biometric recognition has not been widely used : the need for special equipments to extract biometric features, the rampant use of ifngerprints , and the dififculties of reporting biometric features loss. Meanwhile, this paper compares several major biometric recognition technologies to analyze the practicality, the convenience and the security. By judging from the rapid development of the Bio-3D printing technology, this paper points out that the Bio-3D printing technology may bring impact to the biometric recognition in the future. In this paper, a network authentication scheme based on face recognition is proposed ,in which faces are used as the basis for network authentication. By tracking facial activities in real time to achieve real-time facial image ,the system can prevent the photo and video attacks ,while increasing the reliability and the security of authentication . Finally the paper analyzes the implementation , the additive and the security of the scheme, draws a conclusion that the scheme has superior performance with the consideration of the cost of this scheme .This paper also looks forward to the application of the biometric recognition on the network authentication. Because of the uniqueness of the biometric features and because the biometric features cannot be resetting, more attention should be put on the biometric features protection and more related research should be done on the biometric features which can be better made use of.