期刊文献+

融合二维码与人脸识别的会议身份认证系统研究 被引量:12

Research on Conference Identity Authentication System Based on Two-dimensional Bar Code and Face Recognition
下载PDF
导出
摘要 政府机关、大型企业以及高等院校等单位每年都要举行很多会议,会议的组织工作千头万绪,而会议管理中的会议注册和身份认证又是非常重要的一个环节,尤其是对于保密性要求程度较高的单位则更是如此。当前的会议身份认证普遍采用人工核对证件、智能卡证件和RFID卡证件等手段,但这些方法往往存在信息易泄露、证件易伪造以及资源浪费等缺点。针对上述问题,文章设计并实现了一个融合二维码、人脸识别以及数字签名等技术的会议身份认证系统。该系统可以有效避免参会者的身份信息泄露和身份仿冒等问题,从而为会议的安全有序进行提供了保障。因此,对于安全级别要求较高的会议来说,该系统具有一定的应用价值。 Each year many conferences will be held by government agencies, large corporations, and universities, the conference organization is very complex and involves many works to do. The registration and identity authentication is very important for the conference management, especially for the conference which its confidentiality requirement is high. However the current solutions for conference identity authentication are usually verifying cards artificially, using smart cards and RFID cards, which have the problems of information leakage, certificates forgery and resources waste etc. In order to solve the problems, this paper constructs a conference identity authentication system mixing together the technologies of two-dimensional bar code, face recognition, digital signatures and decoding and encoding two-dimensional bar code. This system can prevent the problems of information leakage and identity forgery, which ensures the safe and order of the conference. This system has a certain value for the conference which the security requirements are high.
出处 《信息网络安全》 2015年第4期13-18,共6页 Netinfo Security
基金 国家科技重大专项[2013ZX03002006] 辽宁省博士启动基金[20141012] 中央高校基本科研业务费专项资金[N130317002]
关键词 二维码 人脸识别 数字签名 身份认证 two-dimensional bar code face recognition digital signature identity authentication
  • 相关文献

参考文献10

二级参考文献45

  • 1刘宏伟,严妍.快速响应码的识别和解码[J].计算机工程与设计,2005,26(6):1560-1562. 被引量:29
  • 2王毅.二维条码技术应用及标准化状况介绍[J].中国标准化,2006(5):24-25. 被引量:55
  • 3Turk M A, Pentland A P. Eigenfaces for recognition[J]. Journal of Cognitive Neuroscience, 1991, 3( 1): 71-86.
  • 4Belhumeur P N, HespanhaJ r. Kriegman D]. Eigenfaces vs. Iisherfaces , Recognition using class specific linear projection[J]. IEEE Trans on Pattern Analysis and Machine Intelligence, 1997, 19(7): 711-720.
  • 5J in Zhong, YangJ ingyu , Hu Zhongshan, et al. Face recognition based on the uncorrelated discriminant transformation[J]. Pattern Recognition, 2001, 34 ( 7 ): 1405-H16.
  • 6in Zhong, YangJ ingyu , Hu Zhongshan, et al. A theorem on the uncorrelated optimal discriminant vectors[J]. Pattern Recognition, 2001, 34( 10): 2041-2047.
  • 7Howland p, Park H. Generalizing discriminant analysis using the generalized singular value decomposition[J]. IEEE Trans on Pattern Analysis and Machine Intelligence, 2004, 26(8): 995-1006.
  • 8Chen Li l en , Liao H Y M, Ko M T, et al. A new LDA based face recognition system which can solve the small sample size problem[J]. Pattern Recognition, 2000, 33 r io i , 1713- 1726.
  • 9Huang Rui , Liu Qingshan , Lu Hanqing , et al. Solving the small sample size problem of LOA[CJ ((Proc of the 16th Int Conf on Pattern Recognition. Los Alamitos, CA: IEEE Computer Society, 2002: 29-32.
  • 10Lu Guifu , Wang Yong. Feature extraction using a fast null space based linear discriminant analysis algorithm[J]. Information Sciences, 2012, 193: 72-80.

共引文献160

同被引文献48

  • 1田捷,陈新建,张阳阳,杨鑫,何余良,李亮,谢卫华,郑志鹏.指纹识别技术的新进展[J].自然科学进展,2006,16(4):400-408. 被引量:39
  • 2王曦,史闻博,苗放.一次性密码验证系统[J].物探化探计算技术,2007,29(2):177-181. 被引量:1
  • 3吴小博.AES加密算法分析与C++编程实现[J].计算机安全,2007(12):44-46. 被引量:11
  • 4LI C, LEE C. A Novel User Authentication and Privacy Preserving Scheme with Smart Cards for Wireless Communications[J]. Mathematicaland Computer Modelling, 2012,55(1-2):35-44.
  • 5SOOD S K, SARJE A K,SINGH K. A Secure Dynamic Identity Based Authentication Protocol for Multi server Architecture[J]. Journal of Network and Computer Applications, 2011,34(2):609-618.
  • 6LEE C, LIN T,CHANG R. A Secure Dynamic ID Based Remote User Authentication Scheme for Multi-server Environment Using Smart Cards[J]. Expert Systems with Applications, 2011,38(11):13863- 13870.
  • 7LIAO Y, WANG S. A Secure Dynamic ID Based Remote User Authentication Scheme for Multi-server Environment[J]. Computer Standards & Interfaces, 2009,31(1):24-29.
  • 8TSAI J. Efficient Multi-server Authentication Scheme Based on One-way Hash Function without Verification Table[J]. Computers & Security, 2008,27(3-4):115-121.
  • 9RAMASAMY R, MUNIYANDI A. New Remote Mutual Authentication Scheme Using Smart Cards[J]. Transactions on Data Privacy, 2009,2(2):141-152.
  • 10KUMAR M. New Remote User Authentication Scheme Using Smart Cards[J]. IEEE Transaction on Consumer Electronics, 2004,50(2):597- 600.

引证文献12

二级引证文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部