The demand for secure and trusted identity authentication is growing rapidly, but the emphasis on the security of biometric images and feature templates is far from enough. Biometrics, including iris features, have lifetime characteristics, which indicates that once lost, it means permanent loss, there is no way to re-edit or publish a template to make up for the loss. The existence of these security threats is seriously restricting the further development based on biometrics.
At present, in the application process of iris, the safety hazard mainly manifests as the leakage of the original iris image and the image restoration of the iris feature template. The specific description is as follows:
(1) Leakage of original iris image: In the process of collecting, transmitting, warehousing and comparison in the process of iris application in public security field, the original image of iris is a concentrated expression of personal privacy data, and there is a risk of privacy leakage. When a large area of ​​leakage occurs, it will cause serious social impact.
(2) Image restoration of iris feature template: iris feature template is restored to iris image for other applications by some algorithms. Although the restored image is not exactly the same as the original image, it can also be used for iris recognition or other iris algorithm. .
For the security risks of the above iris application, it is necessary to study the original image and feature template protection scheme based on cryptography to protect the iris data security to meet the security requirements of users in the process of identity collection, storage and authentication. The lifetime invariance of the iris characteristics and the massive data in the system iris image feature database pose great challenges to the research of the technology, especially in the critical requirements of security technologies such as correct matching rate, false rejection rate, and authentication speed. Next, it is a severe test of whether the technology can achieve further development.
For biometric security, domestic and foreign research institutions are mainly divided into two major technical genres: data encryption and data obfuscation: the method based on data encryption is to bind the key and image/feature information, generate ciphertext for transmission, and play private data. The purpose of protection, but it involves the issue of symmetric key distribution. Data confusion is mainly based on template deformation technology, random number session multi-factor obfuscation technology, digital watermarking, biometric data mosaic, etc. See Figure 3 for the basic method of iris data protection. Both methods cause some loss to the efficiency of iris acquisition, transmission, and comparison.
Boiler Production Cutting Machine
The CNC plasma cutting machine is a desktop gantry structure. The whole work surface of the machine adopts the integral rim structure, which has the characteristics of stable and reliable operation and long service life. The model adopts optical axis linear guide and bilateral drive. It can realize the cutting of any metal materials according to any pattern, and it is suitable for the rapid CNC cutting of carbon steel plates, aluminum plates, copper plates, stainless steel plates and other workpieces with medium and thin plates. The effect is good, no dross and burrs are used; Directly use Wentai software or AutoCAD drawing software to directly draw graphics, without conversion, direct cutting, and can be simple to discharge, the workpiece is set side by side. At the same time, it also solves the problem that the thin plate and the thick plate cannot be compatible. This machine comes standard with plasma cutting method, equipped with arc-pressure automatic height-adjusting system and torch anti-collision system. It is also equipped with a set of water spray cooling device to reduce the thermal deformation of thin plate cutting; this type of equipment is cutting and cutting equipment for sheet metal processing industry and ventilation pipe industry.
Cnc Metal Laser Cutter,Boiler Production Fiber Cutting Machine,Bioler Production Cnc Cutting Machine,Boiler Production Cutting Machine
Shandong Buluoer Intelligent Technology Co., Ltd. , https://www.buluoercuttingmachine.com