CN101206714A - Fingerprint identification method and fingerprint payment system based on DSP - Google Patents

Fingerprint identification method and fingerprint payment system based on DSP Download PDF

Info

Publication number
CN101206714A
CN101206714A CNA200710027531XA CN200710027531A CN101206714A CN 101206714 A CN101206714 A CN 101206714A CN A200710027531X A CNA200710027531X A CN A200710027531XA CN 200710027531 A CN200710027531 A CN 200710027531A CN 101206714 A CN101206714 A CN 101206714A
Authority
CN
China
Prior art keywords
fingerprint
lambda
dsp
vector
rho
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA200710027531XA
Other languages
Chinese (zh)
Inventor
李皓辰
赵慧民
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
LI HAOCHEN ZHAO HUIMIN
Original Assignee
LI HAOCHEN ZHAO HUIMIN
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by LI HAOCHEN ZHAO HUIMIN filed Critical LI HAOCHEN ZHAO HUIMIN
Priority to CNA200710027531XA priority Critical patent/CN101206714A/en
Publication of CN101206714A publication Critical patent/CN101206714A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Collating Specific Patterns (AREA)

Abstract

The invention discloses a DSP-based fingerprint identification method and a DSP-based fingerprint payment system, wherein, extreme filtering, smoothing filtering and Laplace sharpening are performed on an acquired fingerprint by adoption of a DSP TMS320VC5000; fingerprint image characteristics after pretreatment are extracted through binaryzation of iterated thresholds; fingerprint image characteristic data after binary extraction of the iterated thresholds is bond with user log-on account number data and then stored into a tree structure database on a server; a client DSP processes a field fingerprint, then modulates the field fingerprint through data encryption, is connected with the server through a RS-232/485 interface, demodulates received fingerprint data and then performs search and verification or identification according to the fingerprint characteristic data which is stored in the server database, thereby application aims of determination of fingerprint identity and personal account number payment are reached. The invention has the advantages of quick, flexible and accurate processing speed, strong anti-interference ability, small volume and so on.

Description

Fingerprint identification method and fingerprint payment system based on DSP
Affiliated technical field
The present invention relates to a kind of biometric discrimination method, particularly relate to a kind of fingerprint identification method, also relate to a kind of fingerprint payment system that adopts this method based on DSP.
Technical background
What the transaction in present most bank and shopping market was all adopted is " authority magnetic card+password " mode, has a lot of hidden danger in concrete application and system execution, such as: easily be forged.The easier acquisition of password under the unwitting situation of holder, is illegally used its authority; Easily substituted.Without permission, authorize mutually privately, the holder meets at own authority card other people without authorization and uses or the holder is coerced by the people and oneself authority card is met at other people use; Easily leave behind or lose, make troubles and influence for own and household and colleague's life and work.
At present, the fingerprint identification method that also is useful on personal status's identification is different, but the existing fingerprint identification method problem that all the ubiquity discrimination is low, recognition speed is slow.
Summary of the invention
One object of the present invention is to overcome above-mentioned defective in the prior art: a kind of discrimination height, the fast fingerprint identification method based on DSP of recognition speed are provided.
One object of the present invention is to overcome above-mentioned defective in the prior art: the fingerprint payment system that a kind of processing speed is fast, flexible, antijamming capability is strong is provided.
For achieving the above object, technical scheme provided by the invention is as follows: a kind of fingerprint identification method based on DSP is provided, may further comprise the steps:
A, employing DSP TMS320VC5000 carry out extreme value filtering, smothing filtering, Laplce's sharpening processing to the fingerprint of gathering;
B, extract through pretreated fingerprint image characteristics point by the iteration threshold binaryzation;
C, the fingerprint image characteristics point and the Account Data of user's registration that will extract through the iteration threshold binaryzation are bound and are stored in the database on the server;
D, DSP are connected with server by the RS-232/485 interface, and server is connected with service terminal.
The process that described fingerprint to collection carries out the extreme value Filtering Processing is as follows:
A, to be provided with a pending pixel region be s0, and 8 neighborhood territory pixels are arranged as follows around it:
s 1 s 2 s 3 s 4 s 0 s 5 s 6 s 7 s 8
Get the average Ai of neighborhood related pixel earlier, i ∈ 1,2 ... 8} is one group of processing unit with four pixels, can improve correlation technique document extreme value filtering algorithm, is expressed as follows:
If b is A0>max (Ai), i ∈ 1,2 ... 8} then
s1=s2=s4=s0=max(A1,A2,A4)
s2=s3=s5=s0=max(A2,A3,A5)
s4=s6=s7=s0=max(A4,A6,A7)
s5=s?7=s8=s0=max(A5,A7,A8)
If c is A0<min (Ai), i ∈ 1,2 ... 8} then
s?1=s2=s4=s0=min(A1,A2,A4)
s2=s3=s5=s0=min(A2,A3,A5)
s4=s6=s7=s0=min(A4,A6,A7)
s5=s7=s8=s0=min(A5,A7,A8)
If d is min (Ai)<=Ai<=max (Ai), i ∈ 1,2 ... 8} then with the output of pixel initial value, does not process.
The process that described fingerprint to collection carries out The disposal of gentle filter is as follows:
Each pixel in the fingerprint and M are carried out convolution, and level and smooth convolution kernel is:
M = 1 15 1 2 1 2 5 2 1 2 1
The process that described fingerprint to collection carries out Laplce's sharpening processing is as follows:
The sharpening convolution kernel adopts the La Pulashi operator, and is as follows,
h = - 1 - 1 - 1 - 1 9 - 1 - 1 - 1 - 1
By this convolution kernel image pixel is carried out the convolution budget, realize high-pass filtering, thereby make
Laplace operator is used on the fingerprint image, and obtains the fingerprint ridge line after the sharpening.
Described as follows through the process of pretreated fingerprint image characteristics point by the extraction of iteration threshold binaryzation:
Take the method for iteration threshold, in the iteration threshold computing:
A, setting Initial Hurdle T, as make T=127 (gray level), the average gray value of fingerprint image is divided into two groups
R1、R2;
B, calculating two groups average gray value u1, u2;
C and then reset new gray scale threshold values T, new T is defined as: T=(u1+u2)/2;
D, fingerprint image is carried out threshold segmentation according to this T.
Database on the described server is based on the tree construction fingerprint database, is divided into a certain classification according to the fingerprint characteristic fingerprint of naming a person for a particular job, and searches for the affirmation user identity fast according to the classification of fingerprint, in fingerprint base design based on tree construction, and unique fingerprint vector At tree node [i 1..., i l] go up according to Gaussian distribution N (0, σ W 2) produce, wherein l is the degree of depth of node, and i is certain user node, and { a} is separate, for user u for the fingerprint vector collection simultaneously (i)Its index is i=[i 1, i 2...., i l], distribute to u (i)Fingerprint copy X (i)In, the L of a total embedding fingerprint is
Figure A20071002753100111
Also can carry out the modulating transformation of orthogonal vector to the finger print data sequence in the database: conversion coefficient is divided into set of vectors according to ID number of fingerprint registration, make the vector quantization (COVQ of channel optimization by combination, channel-optimizedVQ) the Euclid vector quantization index i* of acquisition standard, to given input information source vector v, from coded vector y iAnd size is N CbThe quantization index i* that obtains of information source code book can be expressed as
i * = arg min ( Σ j = 1 N cb P j / i · | | v - y j | | 2 ) , i∈{0,1,Λ,N cb-1}
Here, P J/iReceive the conditional probability of j vector signal when being known index i, hiding finger print data at first carries out information source coding (depending on data character) and produces the symbol sebolic addressing { s of Q direction 1, s 2, Λ, s Q, at the k dimension space, to each vector coefficients v of Q direction JSymbol of middle embedding obtains to upset vector
Figure A20071002753100113
, for the constraint condition of satisfied transmission,
Figure A20071002753100114
The scope of value should be at radius
Figure A20071002753100115
Circle in, like this, size just can be formed channel codebook for the k of Q dimension upset value; This channel codebook can be adjusted by the embedment strength α of decision transmission performance, promptly Can be expressed as v j ^ = v j = α · C ( s i ) , I=1,2, Λ, Q, wherein C (s i) be exactly that size is the channel codebook of Q, before the transmission, the coefficient of upset is changed to host signal by contravariant; The data S that fingerprint is hidden carries out transform domain and decomposes after the pre-service of ranks direction, obtains transmission signals at last
Figure A20071002753100118
, again will
Figure A20071002753100119
(x y) is divided into different fingerprint embedded blocks, i user u according to decomposition layer i and direction θ (i)Fingerprint W (i)Produce by formula (7):
W ( i ) = ρ 1 a i 1 + ρ 2 a i 1 , i 2 + Λ + ρ L a i 1 , i 2 , . . , i L - - - ( 7 )
Wherein, { ρ lBe subjected to the probability decision of collusion attack by the different branches of corresponding fingerprint tree, and 0≤ρ is arranged 1, Λ, ρ L≤ 1, Σ j = 1 L ρ j = 1 Relation, adjust between the different user fingerprint that assignment is distributed according to the capacity of each grade fingerprint of embedment strength α control tree and self-adaptation;
Figure A200710027531001112
For the value of fingerprint vector on the different nodes of tree, therefore, distribute to u (i)The signal form of fingerprint video content be:
X ( i ) = S ^ + α W ( i ) - - - ( 8 )
And in the modulation of quadrature fingerprint, host signal S can be divided into the part S of L non-overlapping copies 1, Λ, S L, like this at S lIn the coefficient that can embed satisfy relation:
And satisfy Σ l = 1 L N l = N - - - ( 9 )
In the fingerprint modulation of this proposition, definition matrix P is one and goes up the triangle square formation, at P JIn, in order to realize effective bandwidth,, make p for k>l K, l=0, for k≤l, make 0<p K, l≤ 1 to realize robustness, definition E K, lFor being embedded into X l (i)Middle k level fingerprint vector Capacity, then E l = Δ Σ k = 1 L E k , l Be W l (i)All told,
At the 1st grade, p l, 1=1 is at the 2nd≤l≤L level, known p L, l, seek { p K, l} K<lRelation value, satisfying a kind of condition is E 1, l: E 2, l: Λ: E L-1, l1: ρ 2: Λ, ρ L-1So, but for k<l relation is arranged:
p k , l = ρ k ( 1 - p l , l ) ρ 1 + Λ + ρ l - 1 - - - ( 10 )
With known { p L, l} L=1, Λ, LThe time matrix arranged
P j = 1 1 - p 2,2 Λ ( 1 - p L , L ) ρ 1 1 - ρ L 0 p 2,2 Λ ( 1 - p L , L ) ρ 2 1 - ρ L M M O M 0 0 0 p L , L L × L - - - ( 11 )
In (11), work as Σ l = 1 L N l = N , 0 ≤ N l ≤ N The time, seek N 1, N 2, Λ, N LSatisfy condition
P J[N 1?N 2ΛN L] T=N[ρ 12Λρ L] T (12)
In (12) formula, work as p L, LLThe time, just be based on a kind of method that the quadrature fingerprint is modulated, so,, realize that the method for the multistage imbedding problem of fingerprint is according to above definition:
Condition and relation according to (11) formula N L = N - Σ l = 1 L - 1 N l , Each fingerprint vector for tree 1≤l≤L level
Figure A20071002753100128
Have:
a i 1 , Λ , i l = a l i 1 , Λ , i l Ψ a l + 1 i 1 , Λ , i l Ψ a L i 1 , Λ , i l - - - ( 13 )
Here,
Figure A200710027531001210
According to Gaussian distribution N (0, σ W 2) and separate.For k 〉=l, length is N kFingerprint vector
Figure A20071002753100131
Be embedded into S kIn.Symbol " Ψ " has been represented the cascade factor.To u (i)The i part fingerprint video content that the user receives is X l ( i 1 , Λ , i l ) = S l + α W l ( i 1 , Λ , i l ) , Have
W l ( i 1 , Λ , i l ) = ρ 1 , l a l i 1 + ρ 2 , l a l i 1 , i 2 + Λ + ρ l , l a l i 1 , Λ , i l - - - ( 14 )
Safe transmission for ease of fingerprint characteristic information, by DSP the transform domain that fingerprint characteristic data carries out Information hiding is handled, at transmitting terminal, fingerprint characteristic information and user ID are carried out mould two computings by the pseudo-random sequence that conversion generates, carry out the transmission error control Error Correction of Coding again, transmit in conjunction with chnnel coding again, receiving end carries out information extraction according to extraction algorithm in without the data of channel decoding, the data that propose are passed through error-correcting decoding again, carry out mould two computings with pseudo-random sequence and can get finger print data.
For the further security of enhanced system, also further comprise detection and identification step to collusion attack person, the detection of system and identification are divided into three processes: the range of nodes of at first adding up collusion attack person; Point out the tree node that collusion attack person is taken place by the correlativity vector again; At last, find the leaf at collusion attack person place, wherein, the correlativity vector that detects at i level subrange is:
T i 1 , K , i L - 1 ( i m ) = ( Y - X ) T · a i 1 , . , i m | | S | | 2 - - - ( 15 )
Its probability distribution when K user's appearance is:
P ( T i 1 , . . , i m - 1 | K , S c , σ d 2 ) = N ( μ 1 , . . . , i m σ d 2 ) - - - ( 16 )
In the formula, σ d 2Be the variance of received signal Y, and
Figure A20071002753100136
Form be:
μ i 1 , . . . , i m - 1 ( i m ) = k i 1 , . . , m · ρ m K | | S | | - - - ( 17 )
Wherein,
Figure A20071002753100138
Be among K the user some survivor of i level subrange, by formula (17), we search for the place in i level subrange be that leaf is an index:
j m ^ = arg i m L { T i 1 , . , i m - 1 ( i m ) ≥ h m } - - - ( 18 )
Wherein, h mDetermine by the false-alarm probability of detection of packets and the variance of received signal, when needing design system, take all factors into consideration the threshold value adjusted of setting.
A kind of fingerprint payment system is provided, comprises fingerprint capturer, peripheral control circuit, also comprise fingerprint image processor and fingerprint memory, outlet terminal, entry terminal, fingerprint image processor is to utilize said method that fingerprint image is handled and discerned.
Of the present inventionly be: handle by adopting DSP CCS2.2 that the fingerprint of gathering is carried out extreme value filtering, smothing filtering, Laplce's sharpening based on the fingerprint identification method of DSP and the beneficial effect of fingerprint payment system; Extract through pretreated fingerprint image characteristics point by the iteration threshold binaryzation; The cryptographic binding that the fingerprint image characteristics point that will extract through the iteration threshold binaryzation and user register also is stored in the database on the server; DSP is connected with server by the RS-232/485 interface, and server is connected with service terminal, utilizes DSP that fingerprint is carried out digital signal processing, has advantages such as processing speed is fast, flexible, accurate, antijamming capability is strong, volume is little.
Below in conjunction with drawings and Examples fingerprint identification method and the fingerprint payment system based on DSP of the present invention is described further:
Figure of description
Fig. 1 is the schematic diagram that the present invention is based on the fingerprint identification method of DSP;
Fig. 2 is the process flow diagram that the present invention is based on the fingerprint identification method fingerprint processing of DSP;
Fig. 3 be the fingerprint identification method that the present invention is based on DSP take the fingerprint unique point process flow diagram;
To be the fingerprint identification method that the present invention is based on DSP carry out the schematic diagram that the transform domain of Information hiding is handled with fingerprint characteristic data to Fig. 4;
Fig. 5 is the schematic diagram that the fingerprint identification method that the present invention is based on DSP embeds fingerprint characteristic data channel;
Fig. 6 is the schematic diagram of tree construction that the present invention is based on the fingerprint identification method of DSP;
Fig. 7 is the schematic diagram that the fingerprint identification method that the present invention is based on DSP carries out fingerprint characteristic orthogonal modulation;
Fig. 8 is that the server end finger print data that the present invention is based on the fingerprint identification method of DSP contrasts the process flow diagram of handling;
Fig. 9 is the systematic schematic diagram of a kind of system of fingerprints of the present invention;
Figure 10 is the structure principle chart of a kind of system of fingerprints of the present invention.
Embodiment
Below of the present invention based on the fingerprint identification method of DSP and the most preferred embodiment of fingerprint payment system, therefore do not limit protection scope of the present invention.
With reference to Fig. 1, Fig. 2, Fig. 3, Fig. 4, Fig. 5, Fig. 6, Fig. 7, Fig. 8, a kind of fingerprint identification method based on DSP is provided, may further comprise the steps:
A, employing DSP TMS320VC5000 carry out extreme value filtering, smothing filtering, Laplce's sharpening processing to the fingerprint of gathering;
B, extract through pretreated fingerprint image characteristics point by the iteration threshold binaryzation;
C, the fingerprint image characteristics point and the Account Data of user's registration that will extract through the iteration threshold binaryzation are bound and are stored in the database on the server;
D, DSP are connected with server by the RS-232/485 interface, and server is connected with service terminal.
The process that described fingerprint to collection carries out the extreme value Filtering Processing is as follows:
A, to be provided with a pending pixel region be s0, and 8 neighborhood territory pixels are arranged as follows around it:
s 1 s 2 s 3 s 4 s 0 s 5 s 6 s 7 s 8
Get the average Ai of neighborhood related pixel earlier, i ∈ 1,2 ... 8} is one group of processing unit with four pixels, can improve correlation technique document extreme value filtering algorithm, is expressed as follows:
If b is A0>max (Ai), i ∈ 1,2 ... 8} then
s1=s2=s4=s0=max(A1,A2,A4)
s2=s3=s5=s0=max(A2,A3,A5)
s4=s6=s7=s0=max(A4,A6,A7)
s5=s7=s8=s0=max(A5,A7,A8)
If c is A0<min (Ai), i ∈ 1,2 ... 8} then
s1=s2=s4=s0=min(A1,A2,A4)
s2=s3=s5=s0=min(A2,A3,A5)
s4=s6=s7=s0=min(A4,A6,A7)
s5=s7=s8=s0=min(A5,A7,A8)
If d is min (Ai)<=Ai<=max (Ai), i ∈ 1,2 ... 8} then with the output of pixel initial value, does not process.
The process that described fingerprint to collection carries out The disposal of gentle filter is as follows:
Each pixel in the fingerprint and M are carried out convolution, and level and smooth convolution kernel is:
M = 1 15 1 2 1 2 5 2 1 2 1
The process that described fingerprint to collection carries out Laplce's sharpening processing is as follows:
The sharpening convolution kernel adopts the La Pulashi operator, and is as follows,
h = - 1 - 1 - 1 - 1 9 - 1 - 1 - 1 - 1
By this convolution kernel image pixel is carried out the convolution budget, realize high-pass filtering, thereby make Laplace operator be used on the fingerprint image, and obtain the fingerprint ridge line after the sharpening.
Described as follows through the process of pretreated fingerprint image characteristics point by the extraction of iteration threshold binaryzation:
Take the method for iteration threshold, in the iteration threshold computing:
A, setting Initial Hurdle T, as make T=127 (gray level), the average gray value of fingerprint image is divided into two groups of R1, R2;
B, calculating two groups average gray value u1, u2;
C and then reset new gray scale threshold values T, new T is defined as: T=(u1+u2)/2;
D, fingerprint image is carried out threshold segmentation according to this T.
Database on the described server is based on the tree construction fingerprint database, is divided into a certain classification according to the fingerprint characteristic fingerprint of naming a person for a particular job, and searches for the affirmation user identity fast according to the classification of fingerprint, in fingerprint base design based on tree construction, and unique fingerprint vector
Figure A20071002753100171
At tree node [i 1...., i l] go up according to Gaussian distribution N (0, σ W 2) produce, wherein l is the degree of depth of node, and i is certain user node, and { a} is separate, for user u for the fingerprint vector collection simultaneously (i)Its index is i=[i 1, i 2...., i l], distribute to u (i)Fingerprint copy X (i)In, the L of a total embedding fingerprint is
Figure A20071002753100172
Also can carry out the modulating transformation of orthogonal vector to the finger print data sequence in the database: conversion coefficient is divided into set of vectors according to the fingerprint key, make the vector quantization (COVQ of channel optimization by combination, channel-optimized VQ) the Euclid vector quantization index i* of acquisition standard, to given input information source vector v, from coded vector y iAnd size is N CbThe quantization index i* that obtains of information source code book can be expressed as
i * = arg min ( Σ j = 1 N cb P j / i · | | v - y j | | 2 ) , i∈{0,1,Λ,N cb-1}
Here, P J/iReceive the conditional probability of j vector signal when being known index i, hiding finger print data at first carries out information source coding (depending on data character) and produces the symbol sebolic addressing { s of Q direction 1, s 2, Λ, s Q, at the k dimension space, to each vector coefficients v of Q direction JSymbol of middle embedding obtains to upset vector
Figure A20071002753100174
, for the constraint condition of satisfied transmission,
Figure A20071002753100175
The scope of value should be at radius
Figure A20071002753100176
Circle in, like this, size just can be formed channel codebook for the k of Q dimension upset value; This channel codebook can be adjusted by the embedment strength α of decision transmission performance, promptly
Figure A20071002753100181
Can be expressed as v j ^ = v j = α · C ( s i ) , i = 1,2 , Λ , Q , C (s wherein i) be exactly that size is the channel codebook of Q, before the transmission, the coefficient of upset is changed to host signal by contravariant; The data S that fingerprint is hidden carries out transform domain and decomposes after the pre-service of ranks direction, obtains transmission signals at last
Figure A20071002753100183
, again will (x y) is divided into different fingerprint embedded blocks, i user u according to decomposition layer i and direction θ (i)Fingerprint W (i)Produce by formula (7):
W ( i ) = ρ 1 a i 1 + ρ 2 a i 1 , i 2 + Λ + ρ L a i 1 , i 2 , . , i L - - - ( 7 )
Wherein, { ρ lBe subjected to the probability decision of collusion attack by the different branches of corresponding fingerprint tree, and 0≤ρ is arranged 1, Λ, ρ L≤ 1, Σ j = 1 L ρ j = 1 Relation, adjust between the different user fingerprint that assignment is distributed according to the capacity of each grade fingerprint of embedment strength α control tree and self-adaptation;
Figure A20071002753100187
For the value of fingerprint vector on the different nodes of tree, therefore, distribute to u (i)The signal form of fingerprint video content be:
X ( i ) = S ^ + α W ( i ) - - - ( 8 )
And in the modulation of quadrature fingerprint, host signal S can be divided into the part S of L non-overlapping copies 1, Λ, S L, like this at S lIn the coefficient that can embed satisfy relation:
And satisfy Σ l = 1 L N l = N - - - ( 9 )
In the fingerprint modulation of this proposition, definition matrix P is one and goes up the triangle square formation, at P JIn, in order to realize effective bandwidth,, make p for k>l k, l=0 for k≤l, makes 0<p K, l≤ 1 to realize robustness, definition E K, lFor being embedded into X l (i)Middle k level fingerprint vector
Figure A200710027531001810
Capacity, then E l = Δ Σ k = 1 L E k , l Be W l (i)All told,
At the 1st grade, p L, l=1, at the 2nd≤l≤L level, known p L, l, seek { p K, l} K<lRelation value, satisfying a kind of condition is E 1, l: E 2, l: Λ: E L-1, l1: ρ 2: Λ, ρ L-1So, but for k<1 relation is arranged:
p k , l = ρ k ( 1 - p l , l ) ρ 1 + Λ + ρ l - 1 - - - ( 10 )
With known { p L, l} L=1, Λ, LThe time matrix arranged
P J = 1 1 - p 2,2 Λ ( 1 - p L , L ) ρ 1 1 - ρ L 0 p 2,2 Λ ( 1 - p L , L ) ρ 2 1 - ρ L M M O M 0 0 0 p L , L L × L - - - ( 11 )
In (11), work as Σ l = 1 L N l = N , 0 ≤ N l ≤ N The time, seek N 1, N 2, Λ, N LSatisfy condition
P J[N 1 N 2ΛN L] T=N[ρ 1 ρ 2Λρ L] T (12)
In (12) formula, work as p L, LLThe time, just be based on a kind of method that the quadrature fingerprint is modulated, so,, realize that the method for the multistage imbedding problem of fingerprint is according to above definition:
Condition and relation according to (11) formula N L = N - Σ l = 1 L - 1 N l , Each fingerprint vector for tree 1≤l≤L level
Figure A20071002753100194
Have:
a i 1 , Λ , i l = a l i 1 , Λ , i l Ψ a l + 1 i 1 , Λ , i l Ψ a L i 1 , Λ , i l - - - ( 13 )
Here,
Figure A20071002753100196
According to Gaussian distribution N (0, σ W 2) and separate.For k 〉=l, length is N kFingerprint vector
Figure A20071002753100197
Be embedded into S kIn.Symbol " Ψ " has been represented the cascade factor.To u (i)The i part fingerprint video content that the user receives is X l ( i 1 , Λ , i l ) = S l + α W l ( i 1 , Λ , i l ) , Have
W l ( i 1 , Λ , i l ) = ρ 1 , l a l i 1 + ρ 2 , l a l i 1 , i 2 + Λ + ρ l , l a l i 1 , Λ , i l - - - ( 14 )
Safe transmission for ease of fingerprint characteristic information, by DSP the transform domain that fingerprint characteristic data carries out Information hiding is handled, at transmitting terminal, fingerprint secret information and user cipher are carried out mould two computings by the pseudo-random sequence that conversion generates, carry out the transmission error control Error Correction of Coding again, transmit in conjunction with chnnel coding again, receiving end carries out information extraction according to extraction algorithm in without the data of channel decoding, the data that propose are passed through error-correcting decoding again, carry out mould two computings with pseudo-random sequence and can get finger print data.
For the further security of enhanced system, also further comprise detection and identification step to collusion attack person, the detection of system and identification are divided into three processes: the range of nodes of at first adding up collusion attack person; Point out the tree node that collusion attack person is taken place by the correlativity vector again; At last, find the leaf at collusion attack person place, wherein, the correlativity vector that detects at i level subrange is:
T i 1 , K , i L - 1 ( i m ) = ( Y - X ) T · a i 1 , . , i m | | S | | 2 - - - ( 15 )
Its probability distribution when K user's appearance is:
P ( T i 1 , . . , i m - 1 | K , S c , σ d 2 ) = N ( μ 1 , . . , i m σ d 2 ) - - - ( 16 )
In the formula, σ d 2Be the variance of received signal Y, and
Figure A20071002753100203
Form be:
μ i 1 , . . . , i m - 1 ( i m ) = k i 1 , . . , m · ρ m K | | S | | - - - ( 17 )
Wherein,
Figure A20071002753100205
Be among K the user some survivor of i level subrange, by formula (17), we search for the place in i level subrange be that leaf is an index:
j m ^ = arg i m L { T i 1 , . , i m - 1 ( i m ) ≥ h m } - - - ( 18 )
Wherein, h mDetermine by the false-alarm probability of detection of packets and the variance of received signal, when needing design system, take all factors into consideration the threshold value adjusted of setting.
With reference to Fig. 9, Figure 10, a kind of fingerprint payment system is provided, comprise fingerprint capturer 1, peripheral control circuit 2, also comprise fingerprint image processor and fingerprint memory 3, be DSP digital signal processor, outlet terminal 4, entry terminal 5, fingerprint image processor is to utilize said method that fingerprint image is handled and discerned.
Server end fingerprint detection to user's confirmation turn back to the fingerprint terminal user: in this fingerprint identification system, in order to guarantee that this important information of fingerprint characteristic value is not obtained by the disabled user, adopt specific digital protocol technology to solve, for convenience of description, the symbol that adopts in the agreement is done as giving a definition: A is the user, AS is a certificate server, KU ASBe certificate server PKI, T ASBe the time limit of certificate server, N ABe the current data of A, F ABe the fingerprint characteristic value of A, ID ABe the sign of A, what also it should be noted that employing here is the unilateral authentication agreement.
Basic agreement is described below:
(1) A uses the signature that oneself identifies to certificate server AS request authentication, use signature technology can stop a could comprise bogus authentication server that the duplicity of user A is connected effectively, because have only legal certificate server just to preserve user's PKI, thereby can verify that this is signed obtains ID ACome to use for following verification process.
(2) certificate server produces time limit T AS, current data N A, and with oneself PKI KU AS, N AWith time limit T ASPKI KU with user A AReturn to the party A-subscriber of client after the encryption.
(3) customer end A receives certificate server PKI, time limit and current data N A, read user's fingerprint gray level image at the fingerprint sensor of client simultaneously, and obtain fingerprint characteristic F A, tuple { T AS, N A, F AWith the PKI KU of certificate server ASSend to certificate server after the encryption.
The integrality of security, data, the anti-property denied and information privacy are the essential problems of considering of data transmission network identity verification scheme designing institute, based on the authentication agreement of fingerprint secret information: guarantee that communication authentication can prevent that third-party storming from hitting.Authentication based on the fingerprint biological characteristic: can solve password and spy on and problems such as key management difficulty, but be difficult to stop third-party storming to hit, thereby, the solution of the fingerprint identity validation system that the present invention proposes combines foregoing fingerprint identification technology and Information Hiding Techniques and obtains afterwards.
Server end is arranged on the inner PC server of trade center or bank, and its function of finishing is:
(a) search of the finger print data of registered user input and user registration number, password or ID number (cell-phone number etc. all can), as the off-line part of Fig. 9, its processing procedure is handled identical with the client fingerprint);
(b) set up customer data base and corresponding data search engine mechanism based on the tree construction of linux system;
(c) user profile that client transmissions is come is extracted decoding, and carries out fingerprint comparison according to the online treatment process of Figure 10, obtains the affirmation information of a user identity;
(d) server end returns confirmation, and carries out user's processing of deducting fees and transfer accounts.
Therefore, the gordian technique of server end technology realization is: user fingerprints database that the tree construction classification is set up and the quick technology of confirming user identity of searching for.
The working specification of finger print identification verification equipment: connect service terminal by the RS-232/485 serial ports, can carry out read operation to fingerprint scanner automatically, obtain the information such as fingerprint template that need, equipment is positioned over teller's working top, convenient fingerprint collecting checking at any time.Each shopping outlet is provided with the platform number that needs according to its teller window number correspondence.When the shopping clearing, the user only need confirm to consume the amount of money, and gathers fingerprint with the fingerprint read head that finger touches on the payment terminal, imports user's search number (normally user's mobile phone or home phone number) then.
The fingerprint identity of server and the affirmation identity of dealing money and dealing money return a confirmation code by server end according to protocol information and can finish processing after determining.The fingerprint payment process gets the Green Light and confirms.
Fingerprint payment system does not use actual all fingerprints of user, just extracts small unique point from user's fingerprint, and they are encrypted the unique fingerprint characteristic data that changes into the user with fingerprint algorithm of the present invention.These fingerprint characteristic datas enough come the unique and every other people's difference of user's identity, therefore in fact, do not keep and store user's fingerprint on the server of system, using the fingerprint characteristic data of being gathered is to copy user's physics fingerprint image or complete finger print information by backstepping, and all fingerprint characteristic datas can be stored in the financial settlement grade server system of highest security and confidentiality certainly.

Claims (9)

1. the fingerprint identification method based on DSP is characterized in that, may further comprise the steps:
A, employing DSP TMS320VC5000 carry out extreme value filtering, smothing filtering, Laplce's sharpening processing to the fingerprint of gathering;
B, extract through pretreated fingerprint image characteristics point by the iteration threshold binaryzation;
C, the fingerprint image characteristics point data and the Account Data of user's registration that will extract through the iteration threshold binaryzation are bound and are stored in the tree construction database on the server;
D, DSP are connected with server by the RS-232/485 interface, and server can be connected with a plurality of DSP service terminals.
2. the fingerprint identification method based on DSP according to claim 1 is characterized in that, the process that described fingerprint to collection carries out the extreme value Filtering Processing is as follows:
A, to be provided with a pending pixel region be s0, and 8 neighborhood territory pixels are arranged as follows around it:
s 1 s 2 s 3 s 4 s 0 s 5 s 6 s 7 s 8
Get the average Ai of neighborhood related pixel earlier, i ∈ 1,2 ... 8} is one group of processing unit with four pixels, can improve correlation technique document extreme value filtering algorithm, is expressed as follows:
If b is A0>max (Ai), i ∈ 1,2 ... 8} then
s1=s2=s4=s0=max(A1,A2,A4)
s2=s3=s5=s0=max(A2,A3,A5)
s4=s6=s7=s0=max(A4,A6,A7)
s5=s7=s8=s0=max(A5,A7,A8)
If c is A0<min (Ai), i ∈ 1,2 ... 8} then
s1=s2=s4=s0=min(A1,A2,A4)
s2=s3=s5=s0=min(A2,A3,A5)
s4=s6=s7=s0=min(A4,A6,A7)
s5=s7=s8=s0=min(A5,A7,A8)
If d is min (Ai)<=Ai<=max (Ai), i ∈ 1,2 ... 8} then with the output of pixel initial value, does not process.
3. the fingerprint identification method based on DSP according to claim 1 is characterized in that,
The process that described fingerprint to collection carries out The disposal of gentle filter is as follows:
Each pixel in the fingerprint and M are carried out convolution, and level and smooth convolution kernel is:
M = 1 15 1 2 1 2 5 2 1 2 1 .
4. the fingerprint identification method based on DSP according to claim 1 is characterized in that, the process that described fingerprint to collection carries out Laplce's sharpening processing is as follows:
The sharpening convolution kernel adopts the La Pulashi operator, and is as follows,
h = - 1 - 1 - 1 - 1 9 - 1 - 1 - 1 - 1
By this convolution kernel image pixel is carried out the convolution budget, realize high-pass filtering, thereby make Laplace operator be used on the fingerprint image, and obtain the fingerprint ridge line after the sharpening.
5. the fingerprint identification method based on DSP according to claim 1 is characterized in that, and is described as follows through the process of pretreated fingerprint image characteristics point by the extraction of iteration threshold binaryzation:
Take the method for iteration threshold, in the iteration threshold computing:
A, setting Initial Hurdle T, as make T=127 (gray level), the average gray value of fingerprint image is divided into two groups of R1, R2;
B, calculating two groups average gray value u1, u2;
C and then reset new gray scale threshold values T, new T is defined as: T=(u1+u2)/2;
D, fingerprint image is carried out threshold segmentation according to this T.
6. the fingerprint identification method based on DSP according to claim 1 is characterized in that, also comprises a step, by DSP the transform domain that fingerprint characteristic data carries out Information hiding is handled.At transmitting terminal, fingerprint characteristic information and ID users are carried out mould two computings by the pseudo-random sequence that conversion generates, carry out the transmission error control Error Correction of Coding again, transmit in conjunction with chnnel coding again, receiving end carries out information extraction according to extraction algorithm in without the data of channel decoding, the data that propose are passed through error-correcting decoding again, carry out mould two computings with pseudo-random sequence and can get fingerprint characteristic data.
7. the fingerprint identification method based on DSP according to claim 1, it is characterized in that, database on the described server is based on the tree construction fingerprint database, be divided into a certain classification according to the fingerprint characteristic fingerprint of naming a person for a particular job, the affirmation user identity is searched in classification according to fingerprint fast, in fingerprint base design based on tree construction, unique fingerprint vector a l 1 .., l 1At tree node [i 1...., i l] go up according to Gaussian distribution N (0, σ W 2) produce, wherein l is the degree of depth of node, and i is certain user node, and { a} is separate, for user u for the fingerprint vector collection simultaneously (i)Its index is i=[i 1, i 2...., i l], distribute to u (i)Fingerprint copy X (i)In, the L of a total embedding fingerprint is a l 1, a l 1 , l 2..., a l 1 ., l LAlso can carry out the modulating transformation of orthogonal vector to the finger print data sequence in the database: conversion coefficient is divided into set of vectors according to fingerprint ID key, make the vector quantization (COVQ of channel optimization by combination, channel-optimized VQ) the Euclid vector quantization index i* of acquisition standard, to given input information source vector v, from coded vector y iAnd size is N CbThe quantization index i* that obtains of information source code book can be expressed as
i * = arg min ( Σ j = 1 N cb P j / i · | | v - y i | | 2 ) , i∈{0,1,Λ,N cb-1} (1)
Here, P J/iReceive the conditional probability of j vector signal when being known index i, hiding finger print data at first carries out information source coding (depending on data character) and produces the symbol sebolic addressing { s of Q direction 1, s 2, Λ, s Q, at the k dimension space, to each vector coefficients v of Q direction jSymbol of middle embedding obtains to upset vector
Figure A2007100275310005C1
For the constraint condition of satisfied transmission, The scope of value should be at radius Circle in, like this, size just can be formed channel codebook for the k of Q dimension upset value; This channel codebook can be adjusted by the embedment strength α of decision transmission performance, promptly
Figure A2007100275310005C4
Can be expressed as v j ^ = v j = α · C ( s i ) , I=1,2, Λ, Q, wherein C (s i) be exactly that size is the channel codebook of Q, before the transmission, the coefficient of upset is changed to host signal by contravariant; The data S that fingerprint is hidden carries out transform domain and decomposes after the pre-service of ranks direction, obtains transmission signals at last
Figure A2007100275310005C6
Again will
Figure A2007100275310005C7
(x y) is divided into different fingerprint embedded blocks, i user u according to decomposition layer i and direction θ (i)Fingerprint W (i)Produce by formula (2):
W ( i ) = ρ 1 a i 1 + ρ 2 a i 1 , i 2 + Λ + ρ L a i 1 , i 2 , i L - - - ( 2 )
Wherein, { ρ lBe subjected to the probability decision of collusion attack by the different branches of corresponding fingerprint tree, and 0≤ρ is arranged 1, Λ, ρ L,≤1, Σ j = 1 L ρ j = 1 Relation, adjust between the different user fingerprint that assignment is distributed according to the capacity of each grade fingerprint of embedment strength α control tree and self-adaptation; a i 1 .., i 1For the value of fingerprint vector on the different nodes of tree, therefore, distribute to u (i)The signal form of finger print data content be:
X ( i ) = S ^ + αW ( i ) - - - ( 3 )
And in the modulation of quadrature fingerprint, host signal S can be divided into the part S of L non-overlapping copies 1,, S L, like this at S lIn the coefficient that can embed satisfy relation:
And satisfy Σ l = 1 L N l = N - - - ( 4 )
In the fingerprint modulation of this proposition, definition matrix P is one and goes up the triangle square formation, at P JIn, in order to realize effective bandwidth,, make p for k>1 K, l=0, for k≤l, make 0<p K, l≤ 1 to realize robustness, definition E K, lFor being embedded into X l (i)Middle k level fingerprint vector a i 1 , Λ, i kCapacity, then E l = Δ Σ k = 1 L E k , l Be W l (i)All told,
At the 1st grade, p 1,1=1, at the 2nd≤l≤L level, known p 1, l, seek { p K, 1} K<lRelation value, satisfying a kind of condition is E 1, l: E 2, l: Λ: E L-1, l=ρ 1: ρ 2: Λ, ρ L-1So, but for k<1 relation is arranged:
p k , l = ρ k ( 1 - p l , l ) ρ 1 + Λ + ρ l - 1 - - - ( 5 )
With known { p L, l} L=1, Λ, LThe time matrix arranged
P J = 1 1 - p 2,2 Λ ( 1 - p L , L ) ρ 1 1 - ρ L 0 p 2,2 Λ ( 1 - p L , L ) ρ 2 1 - ρ L M M O M 0 0 0 p L , L L × L - - - ( 6 )
In (6), work as Σ l = 1 L N l = N , 0≤N lDuring≤N, seek N 1, N 2, Λ, N LSatisfy condition
P J[N 1?N 2ΛN L] T=N[ρ 12Λρ L] T (7)
In (7) formula, work as p L, L=p LThe time, just be based on a kind of method that the quadrature fingerprint is modulated, so,, realize that the method for the multistage imbedding problem of fingerprint is according to above definition:
Condition and relation according to (7) formula N L = N - Σ l = 1 L - 1 N l , Each fingerprint vector a for tree 1≤l≤L level i 1 , Λ, i lHave:
a i 1 , Λ , i l = a l i 1 , Λ , i l Ψa l + 1 i 1 , Λ , i l ΨΛ Ψa L i 1 , Λ , i l - - - ( 8 )
Here, { a k i 1 , Λ , i l } k = l , Λ , L According to Gaussian distribution N (0, σ W 2) and separate.For k 〉=1, length is N kFingerprint vector a k i 1 , Λ, i 1Be embedded into S kIn.Symbol " Ψ " has been represented the cascade factor.To u (i)The i part finger print data content that the user receives is X l ( i 1 , Λ , i l ) = S l + αW l ( i 1 , Λ , i l ) , Have
W l ( i 1 , Λ , i l ) = p 1 , l a l i 1 + p 2 , l a l i 1 , i 2 + Λ + p l , l a l i 1 , Λ , i l - - - ( 9 ) .
8. the fingerprint identification method based on DSP according to claim 1 is characterized in that, also further comprises detection and identification step to collusion attack person, and the detection of system and identification are divided into three processes: the range of nodes of at first adding up collusion attack person; Point out the tree node that collusion attack person is taken place by the correlativity vector again; At last, find the leaf at collusion attack person place, wherein, the correlativity vector that detects at i level subrange is:
T i 1 , K , i L - 1 ( i m ) = ( Y - X ) T · a i 1 , . . . . , i m | | S | | 2 - - - ( 10 )
Its probability distribution when K user's appearance is:
P ( T i 1 , . . , i m - 1 | K , S c , σ d 2 ) = N ( μ 1 , . . , i m , σ d 2 ) - - - ( 11 )
In the formula, σ d 2Be the variance of received signal Y, and μ I1., imForm be:
μ i 1 , . . , i m - 1 ( i m ) = k i 1 , . . . , m · ρ m K | | S | | - - - ( 12 )
Wherein, k I1, mBe among K the user some survivor of i level subrange, by formula (12), we search for the place in i level subrange be that leaf is an index:
j m ^ = arg i m L { T i 1 , . , i m - 1 ( i m ) ≥ h m } - - - ( 13 )
Wherein, h mDetermine by the false-alarm probability of detection of packets and the variance of received signal, when needing the design fingerprint recognition system, take all factors into consideration the threshold value adjusted that corresponding tree node is set.
9. fingerprint recognition system, it is characterized in that, comprise fingerprint capturer (1), peripheral control circuit (2), also comprise fingerprint image processor and fingerprint memory (3), outlet terminal (4), entry terminal (5), fingerprint image processor is to utilize the described method of claim 1-9 that fingerprint image is handled and discerned.
CNA200710027531XA 2007-04-13 2007-04-13 Fingerprint identification method and fingerprint payment system based on DSP Pending CN101206714A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA200710027531XA CN101206714A (en) 2007-04-13 2007-04-13 Fingerprint identification method and fingerprint payment system based on DSP

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA200710027531XA CN101206714A (en) 2007-04-13 2007-04-13 Fingerprint identification method and fingerprint payment system based on DSP

Publications (1)

Publication Number Publication Date
CN101206714A true CN101206714A (en) 2008-06-25

Family

ID=39566900

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA200710027531XA Pending CN101206714A (en) 2007-04-13 2007-04-13 Fingerprint identification method and fingerprint payment system based on DSP

Country Status (1)

Country Link
CN (1) CN101206714A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101901332A (en) * 2009-05-31 2010-12-01 上海点佰趣信息科技有限公司 Fingerprint identification system and method
CN102195778A (en) * 2010-03-16 2011-09-21 无锡指网生物识别科技有限公司 Fingerprint authentication method for Internet electronic payment
CN105141673A (en) * 2015-08-07 2015-12-09 努比亚技术有限公司 Intelligent terminal and user information processing method thereof
CN105160320A (en) * 2015-09-02 2015-12-16 小米科技有限责任公司 Fingerprint identification method and apparatus, and mobile terminal
CN105893950A (en) * 2016-03-30 2016-08-24 宁波三博电子科技有限公司 Adaptive fingerprint identification method and system based on redundancy error sequence ranking algorithm
CN106295365A (en) * 2016-08-12 2017-01-04 武汉大学 A kind of encrypting fingerprint template protection method and system based on orthogonal transformation
CN106452779A (en) * 2016-08-31 2017-02-22 福建联迪商用设备有限公司 Encryption method and apparatus of fingerprint image data
CN108267083A (en) * 2017-12-28 2018-07-10 顺丰科技有限公司 A kind of 3D cameras volume measuring method and system

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101901332A (en) * 2009-05-31 2010-12-01 上海点佰趣信息科技有限公司 Fingerprint identification system and method
CN102195778A (en) * 2010-03-16 2011-09-21 无锡指网生物识别科技有限公司 Fingerprint authentication method for Internet electronic payment
CN105141673A (en) * 2015-08-07 2015-12-09 努比亚技术有限公司 Intelligent terminal and user information processing method thereof
CN105160320A (en) * 2015-09-02 2015-12-16 小米科技有限责任公司 Fingerprint identification method and apparatus, and mobile terminal
CN105160320B (en) * 2015-09-02 2019-03-01 小米科技有限责任公司 Fingerprint identification method, device and mobile terminal
CN105893950A (en) * 2016-03-30 2016-08-24 宁波三博电子科技有限公司 Adaptive fingerprint identification method and system based on redundancy error sequence ranking algorithm
CN105893950B (en) * 2016-03-30 2019-04-26 浙江凯迪仕实业有限公司 A kind of adaptive fingerprint identification method and system based on redundancy incorrect order permutation algorithm
CN106295365A (en) * 2016-08-12 2017-01-04 武汉大学 A kind of encrypting fingerprint template protection method and system based on orthogonal transformation
CN106295365B (en) * 2016-08-12 2019-03-15 武汉大学 A kind of encrypting fingerprint template protection method and system based on orthogonal transformation
CN106452779A (en) * 2016-08-31 2017-02-22 福建联迪商用设备有限公司 Encryption method and apparatus of fingerprint image data
WO2018040878A1 (en) * 2016-08-31 2018-03-08 福建联迪商用设备有限公司 Method and device for encrypting fingerprint image data
CN108267083A (en) * 2017-12-28 2018-07-10 顺丰科技有限公司 A kind of 3D cameras volume measuring method and system

Similar Documents

Publication Publication Date Title
CN102306305B (en) Method for authenticating safety identity based on organic characteristic watermark
CN101206714A (en) Fingerprint identification method and fingerprint payment system based on DSP
CN101057248B (en) Fingerprint biomass machine
CN102722696B (en) Identity authentication method of identity card and holder based on multi-biological characteristics
US20060235729A1 (en) Application-specific biometric templates
Braithwaite et al. Application-specific biometric templates
CN106710032B (en) Entrance guard opening method and device
CN106936586A (en) A kind of biological secret key extracting method based on fingerprint bit string and Error Correction of Coding
WO2022072720A1 (en) Biometric-based identity authentication
CN103699995A (en) Payment authentication method based on fingerprints and finger veins
CN104751154A (en) Fingerprint safe encryption method based on intelligent mobile information device
Radha et al. An evaluation of fingerprint security using noninvertible biohash
Ali et al. Fingerprint shell with impregnable features
Uludag Secure biometric systems
Saraswathi et al. Retinal biometrics based authentication and key exchange system
Khan et al. Robust hiding of fingerprint-biometric data into audio signals
CN1858812A (en) Indentity identifying system, method and radio terminal
CN106710033B (en) Entrance guard opening method and device
CN109450878B (en) Biological feature recognition method, device and system
Mimura et al. Fingerprint verification system on smart card
JP2005038020A (en) Fingerprint authentication device, computer system and network system
Praseetha et al. Novel Web Service Based Fingerprint Identification Using Steganography and Xml Mining
Jain Biometric system security
Dong et al. Security enhancement of biometrics, cryptography and data hiding by their combinations
Mehra et al. Multimodal biometric image security using steganography and watermarking

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Open date: 20080625