CN101206714A - Fingerprint identification method and fingerprint payment system based on DSP - Google Patents
Fingerprint identification method and fingerprint payment system based on DSP Download PDFInfo
- Publication number
- CN101206714A CN101206714A CNA200710027531XA CN200710027531A CN101206714A CN 101206714 A CN101206714 A CN 101206714A CN A200710027531X A CNA200710027531X A CN A200710027531XA CN 200710027531 A CN200710027531 A CN 200710027531A CN 101206714 A CN101206714 A CN 101206714A
- Authority
- CN
- China
- Prior art keywords
- fingerprint
- lambda
- dsp
- vector
- rho
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Collating Specific Patterns (AREA)
Abstract
The invention discloses a DSP-based fingerprint identification method and a DSP-based fingerprint payment system, wherein, extreme filtering, smoothing filtering and Laplace sharpening are performed on an acquired fingerprint by adoption of a DSP TMS320VC5000; fingerprint image characteristics after pretreatment are extracted through binaryzation of iterated thresholds; fingerprint image characteristic data after binary extraction of the iterated thresholds is bond with user log-on account number data and then stored into a tree structure database on a server; a client DSP processes a field fingerprint, then modulates the field fingerprint through data encryption, is connected with the server through a RS-232/485 interface, demodulates received fingerprint data and then performs search and verification or identification according to the fingerprint characteristic data which is stored in the server database, thereby application aims of determination of fingerprint identity and personal account number payment are reached. The invention has the advantages of quick, flexible and accurate processing speed, strong anti-interference ability, small volume and so on.
Description
Affiliated technical field
The present invention relates to a kind of biometric discrimination method, particularly relate to a kind of fingerprint identification method, also relate to a kind of fingerprint payment system that adopts this method based on DSP.
Technical background
What the transaction in present most bank and shopping market was all adopted is " authority magnetic card+password " mode, has a lot of hidden danger in concrete application and system execution, such as: easily be forged.The easier acquisition of password under the unwitting situation of holder, is illegally used its authority; Easily substituted.Without permission, authorize mutually privately, the holder meets at own authority card other people without authorization and uses or the holder is coerced by the people and oneself authority card is met at other people use; Easily leave behind or lose, make troubles and influence for own and household and colleague's life and work.
At present, the fingerprint identification method that also is useful on personal status's identification is different, but the existing fingerprint identification method problem that all the ubiquity discrimination is low, recognition speed is slow.
Summary of the invention
One object of the present invention is to overcome above-mentioned defective in the prior art: a kind of discrimination height, the fast fingerprint identification method based on DSP of recognition speed are provided.
One object of the present invention is to overcome above-mentioned defective in the prior art: the fingerprint payment system that a kind of processing speed is fast, flexible, antijamming capability is strong is provided.
For achieving the above object, technical scheme provided by the invention is as follows: a kind of fingerprint identification method based on DSP is provided, may further comprise the steps:
A, employing DSP TMS320VC5000 carry out extreme value filtering, smothing filtering, Laplce's sharpening processing to the fingerprint of gathering;
B, extract through pretreated fingerprint image characteristics point by the iteration threshold binaryzation;
C, the fingerprint image characteristics point and the Account Data of user's registration that will extract through the iteration threshold binaryzation are bound and are stored in the database on the server;
D, DSP are connected with server by the RS-232/485 interface, and server is connected with service terminal.
The process that described fingerprint to collection carries out the extreme value Filtering Processing is as follows:
A, to be provided with a pending pixel region be s0, and 8 neighborhood territory pixels are arranged as follows around it:
Get the average Ai of neighborhood related pixel earlier, i ∈ 1,2 ... 8} is one group of processing unit with four pixels, can improve correlation technique document extreme value filtering algorithm, is expressed as follows:
If b is A0>max (Ai), i ∈ 1,2 ... 8} then
s1=s2=s4=s0=max(A1,A2,A4)
s2=s3=s5=s0=max(A2,A3,A5)
s4=s6=s7=s0=max(A4,A6,A7)
s5=s?7=s8=s0=max(A5,A7,A8)
If c is A0<min (Ai), i ∈ 1,2 ... 8} then
s?1=s2=s4=s0=min(A1,A2,A4)
s2=s3=s5=s0=min(A2,A3,A5)
s4=s6=s7=s0=min(A4,A6,A7)
s5=s7=s8=s0=min(A5,A7,A8)
If d is min (Ai)<=Ai<=max (Ai), i ∈ 1,2 ... 8} then with the output of pixel initial value, does not process.
The process that described fingerprint to collection carries out The disposal of gentle filter is as follows:
Each pixel in the fingerprint and M are carried out convolution, and level and smooth convolution kernel is:
The process that described fingerprint to collection carries out Laplce's sharpening processing is as follows:
The sharpening convolution kernel adopts the La Pulashi operator, and is as follows,
By this convolution kernel image pixel is carried out the convolution budget, realize high-pass filtering, thereby make
Laplace operator is used on the fingerprint image, and obtains the fingerprint ridge line after the sharpening.
Described as follows through the process of pretreated fingerprint image characteristics point by the extraction of iteration threshold binaryzation:
Take the method for iteration threshold, in the iteration threshold computing:
A, setting Initial Hurdle T, as make T=127 (gray level), the average gray value of fingerprint image is divided into two groups
R1、R2;
B, calculating two groups average gray value u1, u2;
C and then reset new gray scale threshold values T, new T is defined as: T=(u1+u2)/2;
D, fingerprint image is carried out threshold segmentation according to this T.
Database on the described server is based on the tree construction fingerprint database, is divided into a certain classification according to the fingerprint characteristic fingerprint of naming a person for a particular job, and searches for the affirmation user identity fast according to the classification of fingerprint, in fingerprint base design based on tree construction, and unique fingerprint vector
At tree node [i
1..., i
l] go up according to Gaussian distribution N (0, σ
W 2) produce, wherein l is the degree of depth of node, and i is certain user node, and { a} is separate, for user u for the fingerprint vector collection simultaneously
(i)Its index is i=[i
1, i
2...., i
l], distribute to u
(i)Fingerprint copy X
(i)In, the L of a total embedding fingerprint is
Also can carry out the modulating transformation of orthogonal vector to the finger print data sequence in the database: conversion coefficient is divided into set of vectors according to ID number of fingerprint registration, make the vector quantization (COVQ of channel optimization by combination, channel-optimizedVQ) the Euclid vector quantization index i* of acquisition standard, to given input information source vector v, from coded vector y
iAnd size is N
CbThe quantization index i* that obtains of information source code book can be expressed as
Here, P
J/iReceive the conditional probability of j vector signal when being known index i, hiding finger print data at first carries out information source coding (depending on data character) and produces the symbol sebolic addressing { s of Q direction
1, s
2, Λ, s
Q, at the k dimension space, to each vector coefficients v of Q direction
JSymbol of middle embedding obtains to upset vector
, for the constraint condition of satisfied transmission,
The scope of value should be at radius
Circle in, like this, size just can be formed channel codebook for the k of Q dimension upset value; This channel codebook can be adjusted by the embedment strength α of decision transmission performance, promptly
Can be expressed as
I=1,2, Λ, Q, wherein C (s
i) be exactly that size is the channel codebook of Q, before the transmission, the coefficient of upset is changed to host signal by contravariant; The data S that fingerprint is hidden carries out transform domain and decomposes after the pre-service of ranks direction, obtains transmission signals at last
, again will
(x y) is divided into different fingerprint embedded blocks, i user u according to decomposition layer i and direction θ
(i)Fingerprint W
(i)Produce by formula (7):
Wherein, { ρ
lBe subjected to the probability decision of collusion attack by the different branches of corresponding fingerprint tree, and 0≤ρ is arranged
1, Λ, ρ
L≤ 1,
Relation, adjust between the different user fingerprint that assignment is distributed according to the capacity of each grade fingerprint of embedment strength α control tree and self-adaptation;
For the value of fingerprint vector on the different nodes of tree, therefore, distribute to u
(i)The signal form of fingerprint video content be:
And in the modulation of quadrature fingerprint, host signal S can be divided into the part S of L non-overlapping copies
1, Λ, S
L, like this at S
lIn the coefficient that can embed satisfy relation:
And satisfy
In the fingerprint modulation of this proposition, definition matrix P is one and goes up the triangle square formation, at P
JIn, in order to realize effective bandwidth,, make p for k>l
K, l=0, for k≤l, make 0<p
K, l≤ 1 to realize robustness, definition E
K, lFor being embedded into X
l (i)Middle k level fingerprint vector
Capacity, then
Be W
l (i)All told,
At the 1st grade, p
l, 1=1 is at the 2nd≤l≤L level, known p
L, l, seek { p
K, l}
K<lRelation value, satisfying a kind of condition is E
1, l: E
2, l: Λ: E
L-1, l=ρ
1: ρ
2: Λ, ρ
L-1So, but for k<l relation is arranged:
With known { p
L, l}
L=1, Λ, LThe time matrix arranged
In (11), work as
The time, seek N
1, N
2, Λ, N
LSatisfy condition
P
J[N
1?N
2ΛN
L]
T=N[ρ
1?ρ
2Λρ
L]
T (12)
In (12) formula, work as p
L, L=ρ
LThe time, just be based on a kind of method that the quadrature fingerprint is modulated, so,, realize that the method for the multistage imbedding problem of fingerprint is according to above definition:
Here,
According to Gaussian distribution N (0, σ
W 2) and separate.For k 〉=l, length is N
kFingerprint vector
Be embedded into S
kIn.Symbol " Ψ " has been represented the cascade factor.To u
(i)The i part fingerprint video content that the user receives is
Have
Safe transmission for ease of fingerprint characteristic information, by DSP the transform domain that fingerprint characteristic data carries out Information hiding is handled, at transmitting terminal, fingerprint characteristic information and user ID are carried out mould two computings by the pseudo-random sequence that conversion generates, carry out the transmission error control Error Correction of Coding again, transmit in conjunction with chnnel coding again, receiving end carries out information extraction according to extraction algorithm in without the data of channel decoding, the data that propose are passed through error-correcting decoding again, carry out mould two computings with pseudo-random sequence and can get finger print data.
For the further security of enhanced system, also further comprise detection and identification step to collusion attack person, the detection of system and identification are divided into three processes: the range of nodes of at first adding up collusion attack person; Point out the tree node that collusion attack person is taken place by the correlativity vector again; At last, find the leaf at collusion attack person place, wherein, the correlativity vector that detects at i level subrange is:
Its probability distribution when K user's appearance is:
Wherein,
Be among K the user some survivor of i level subrange, by formula (17), we search for the place in i level subrange be that leaf is an index:
Wherein, h
mDetermine by the false-alarm probability of detection of packets and the variance of received signal, when needing design system, take all factors into consideration the threshold value adjusted of setting.
A kind of fingerprint payment system is provided, comprises fingerprint capturer, peripheral control circuit, also comprise fingerprint image processor and fingerprint memory, outlet terminal, entry terminal, fingerprint image processor is to utilize said method that fingerprint image is handled and discerned.
Of the present inventionly be: handle by adopting DSP CCS2.2 that the fingerprint of gathering is carried out extreme value filtering, smothing filtering, Laplce's sharpening based on the fingerprint identification method of DSP and the beneficial effect of fingerprint payment system; Extract through pretreated fingerprint image characteristics point by the iteration threshold binaryzation; The cryptographic binding that the fingerprint image characteristics point that will extract through the iteration threshold binaryzation and user register also is stored in the database on the server; DSP is connected with server by the RS-232/485 interface, and server is connected with service terminal, utilizes DSP that fingerprint is carried out digital signal processing, has advantages such as processing speed is fast, flexible, accurate, antijamming capability is strong, volume is little.
Below in conjunction with drawings and Examples fingerprint identification method and the fingerprint payment system based on DSP of the present invention is described further:
Figure of description
Fig. 1 is the schematic diagram that the present invention is based on the fingerprint identification method of DSP;
Fig. 2 is the process flow diagram that the present invention is based on the fingerprint identification method fingerprint processing of DSP;
Fig. 3 be the fingerprint identification method that the present invention is based on DSP take the fingerprint unique point process flow diagram;
To be the fingerprint identification method that the present invention is based on DSP carry out the schematic diagram that the transform domain of Information hiding is handled with fingerprint characteristic data to Fig. 4;
Fig. 5 is the schematic diagram that the fingerprint identification method that the present invention is based on DSP embeds fingerprint characteristic data channel;
Fig. 6 is the schematic diagram of tree construction that the present invention is based on the fingerprint identification method of DSP;
Fig. 7 is the schematic diagram that the fingerprint identification method that the present invention is based on DSP carries out fingerprint characteristic orthogonal modulation;
Fig. 8 is that the server end finger print data that the present invention is based on the fingerprint identification method of DSP contrasts the process flow diagram of handling;
Fig. 9 is the systematic schematic diagram of a kind of system of fingerprints of the present invention;
Figure 10 is the structure principle chart of a kind of system of fingerprints of the present invention.
Embodiment
Below of the present invention based on the fingerprint identification method of DSP and the most preferred embodiment of fingerprint payment system, therefore do not limit protection scope of the present invention.
With reference to Fig. 1, Fig. 2, Fig. 3, Fig. 4, Fig. 5, Fig. 6, Fig. 7, Fig. 8, a kind of fingerprint identification method based on DSP is provided, may further comprise the steps:
A, employing DSP TMS320VC5000 carry out extreme value filtering, smothing filtering, Laplce's sharpening processing to the fingerprint of gathering;
B, extract through pretreated fingerprint image characteristics point by the iteration threshold binaryzation;
C, the fingerprint image characteristics point and the Account Data of user's registration that will extract through the iteration threshold binaryzation are bound and are stored in the database on the server;
D, DSP are connected with server by the RS-232/485 interface, and server is connected with service terminal.
The process that described fingerprint to collection carries out the extreme value Filtering Processing is as follows:
A, to be provided with a pending pixel region be s0, and 8 neighborhood territory pixels are arranged as follows around it:
Get the average Ai of neighborhood related pixel earlier, i ∈ 1,2 ... 8} is one group of processing unit with four pixels, can improve correlation technique document extreme value filtering algorithm, is expressed as follows:
If b is A0>max (Ai), i ∈ 1,2 ... 8} then
s1=s2=s4=s0=max(A1,A2,A4)
s2=s3=s5=s0=max(A2,A3,A5)
s4=s6=s7=s0=max(A4,A6,A7)
s5=s7=s8=s0=max(A5,A7,A8)
If c is A0<min (Ai), i ∈ 1,2 ... 8} then
s1=s2=s4=s0=min(A1,A2,A4)
s2=s3=s5=s0=min(A2,A3,A5)
s4=s6=s7=s0=min(A4,A6,A7)
s5=s7=s8=s0=min(A5,A7,A8)
If d is min (Ai)<=Ai<=max (Ai), i ∈ 1,2 ... 8} then with the output of pixel initial value, does not process.
The process that described fingerprint to collection carries out The disposal of gentle filter is as follows:
Each pixel in the fingerprint and M are carried out convolution, and level and smooth convolution kernel is:
The process that described fingerprint to collection carries out Laplce's sharpening processing is as follows:
The sharpening convolution kernel adopts the La Pulashi operator, and is as follows,
By this convolution kernel image pixel is carried out the convolution budget, realize high-pass filtering, thereby make Laplace operator be used on the fingerprint image, and obtain the fingerprint ridge line after the sharpening.
Described as follows through the process of pretreated fingerprint image characteristics point by the extraction of iteration threshold binaryzation:
Take the method for iteration threshold, in the iteration threshold computing:
A, setting Initial Hurdle T, as make T=127 (gray level), the average gray value of fingerprint image is divided into two groups of R1, R2;
B, calculating two groups average gray value u1, u2;
C and then reset new gray scale threshold values T, new T is defined as: T=(u1+u2)/2;
D, fingerprint image is carried out threshold segmentation according to this T.
Database on the described server is based on the tree construction fingerprint database, is divided into a certain classification according to the fingerprint characteristic fingerprint of naming a person for a particular job, and searches for the affirmation user identity fast according to the classification of fingerprint, in fingerprint base design based on tree construction, and unique fingerprint vector
At tree node [i
1...., i
l] go up according to Gaussian distribution N (0, σ
W 2) produce, wherein l is the degree of depth of node, and i is certain user node, and { a} is separate, for user u for the fingerprint vector collection simultaneously
(i)Its index is i=[i
1, i
2...., i
l], distribute to u
(i)Fingerprint copy X
(i)In, the L of a total embedding fingerprint is
Also can carry out the modulating transformation of orthogonal vector to the finger print data sequence in the database: conversion coefficient is divided into set of vectors according to the fingerprint key, make the vector quantization (COVQ of channel optimization by combination, channel-optimized VQ) the Euclid vector quantization index i* of acquisition standard, to given input information source vector v, from coded vector y
iAnd size is N
CbThe quantization index i* that obtains of information source code book can be expressed as
Here, P
J/iReceive the conditional probability of j vector signal when being known index i, hiding finger print data at first carries out information source coding (depending on data character) and produces the symbol sebolic addressing { s of Q direction
1, s
2, Λ, s
Q, at the k dimension space, to each vector coefficients v of Q direction
JSymbol of middle embedding obtains to upset vector
, for the constraint condition of satisfied transmission,
The scope of value should be at radius
Circle in, like this, size just can be formed channel codebook for the k of Q dimension upset value; This channel codebook can be adjusted by the embedment strength α of decision transmission performance, promptly
Can be expressed as
C (s wherein
i) be exactly that size is the channel codebook of Q, before the transmission, the coefficient of upset is changed to host signal by contravariant; The data S that fingerprint is hidden carries out transform domain and decomposes after the pre-service of ranks direction, obtains transmission signals at last
, again will
(x y) is divided into different fingerprint embedded blocks, i user u according to decomposition layer i and direction θ
(i)Fingerprint W
(i)Produce by formula (7):
Wherein, { ρ
lBe subjected to the probability decision of collusion attack by the different branches of corresponding fingerprint tree, and 0≤ρ is arranged
1, Λ, ρ
L≤ 1,
Relation, adjust between the different user fingerprint that assignment is distributed according to the capacity of each grade fingerprint of embedment strength α control tree and self-adaptation;
For the value of fingerprint vector on the different nodes of tree, therefore, distribute to u
(i)The signal form of fingerprint video content be:
And in the modulation of quadrature fingerprint, host signal S can be divided into the part S of L non-overlapping copies
1, Λ, S
L, like this at S
lIn the coefficient that can embed satisfy relation:
And satisfy
In the fingerprint modulation of this proposition, definition matrix P is one and goes up the triangle square formation, at P
JIn, in order to realize effective bandwidth,, make p for k>l
k, l=0 for k≤l, makes 0<p
K, l≤ 1 to realize robustness, definition E
K, lFor being embedded into X
l (i)Middle k level fingerprint vector
Capacity, then
Be W
l (i)All told,
At the 1st grade, p
L, l=1, at the 2nd≤l≤L level, known p
L, l, seek { p
K, l}
K<lRelation value, satisfying a kind of condition is E
1, l: E
2, l: Λ: E
L-1, l=ρ
1: ρ
2: Λ, ρ
L-1So, but for k<1 relation is arranged:
With known { p
L, l}
L=1, Λ, LThe time matrix arranged
In (11), work as
The time, seek N
1, N
2, Λ, N
LSatisfy condition
P
J[N
1 N
2ΛN
L]
T=N[ρ
1 ρ
2Λρ
L]
T (12)
In (12) formula, work as p
L, L=ρ
LThe time, just be based on a kind of method that the quadrature fingerprint is modulated, so,, realize that the method for the multistage imbedding problem of fingerprint is according to above definition:
Here,
According to Gaussian distribution N (0, σ
W 2) and separate.For k 〉=l, length is N
kFingerprint vector
Be embedded into S
kIn.Symbol " Ψ " has been represented the cascade factor.To u
(i)The i part fingerprint video content that the user receives is
Have
Safe transmission for ease of fingerprint characteristic information, by DSP the transform domain that fingerprint characteristic data carries out Information hiding is handled, at transmitting terminal, fingerprint secret information and user cipher are carried out mould two computings by the pseudo-random sequence that conversion generates, carry out the transmission error control Error Correction of Coding again, transmit in conjunction with chnnel coding again, receiving end carries out information extraction according to extraction algorithm in without the data of channel decoding, the data that propose are passed through error-correcting decoding again, carry out mould two computings with pseudo-random sequence and can get finger print data.
For the further security of enhanced system, also further comprise detection and identification step to collusion attack person, the detection of system and identification are divided into three processes: the range of nodes of at first adding up collusion attack person; Point out the tree node that collusion attack person is taken place by the correlativity vector again; At last, find the leaf at collusion attack person place, wherein, the correlativity vector that detects at i level subrange is:
Its probability distribution when K user's appearance is:
Wherein,
Be among K the user some survivor of i level subrange, by formula (17), we search for the place in i level subrange be that leaf is an index:
Wherein, h
mDetermine by the false-alarm probability of detection of packets and the variance of received signal, when needing design system, take all factors into consideration the threshold value adjusted of setting.
With reference to Fig. 9, Figure 10, a kind of fingerprint payment system is provided, comprise fingerprint capturer 1, peripheral control circuit 2, also comprise fingerprint image processor and fingerprint memory 3, be DSP digital signal processor, outlet terminal 4, entry terminal 5, fingerprint image processor is to utilize said method that fingerprint image is handled and discerned.
Server end fingerprint detection to user's confirmation turn back to the fingerprint terminal user: in this fingerprint identification system, in order to guarantee that this important information of fingerprint characteristic value is not obtained by the disabled user, adopt specific digital protocol technology to solve, for convenience of description, the symbol that adopts in the agreement is done as giving a definition: A is the user, AS is a certificate server, KU
ASBe certificate server PKI, T
ASBe the time limit of certificate server, N
ABe the current data of A, F
ABe the fingerprint characteristic value of A, ID
ABe the sign of A, what also it should be noted that employing here is the unilateral authentication agreement.
Basic agreement is described below:
(1) A uses the signature that oneself identifies to certificate server AS request authentication, use signature technology can stop a could comprise bogus authentication server that the duplicity of user A is connected effectively, because have only legal certificate server just to preserve user's PKI, thereby can verify that this is signed obtains ID
ACome to use for following verification process.
(2) certificate server produces time limit T
AS, current data N
A, and with oneself PKI KU
AS, N
AWith time limit T
ASPKI KU with user A
AReturn to the party A-subscriber of client after the encryption.
(3) customer end A receives certificate server PKI, time limit and current data N
A, read user's fingerprint gray level image at the fingerprint sensor of client simultaneously, and obtain fingerprint characteristic F
A, tuple { T
AS, N
A, F
AWith the PKI KU of certificate server
ASSend to certificate server after the encryption.
The integrality of security, data, the anti-property denied and information privacy are the essential problems of considering of data transmission network identity verification scheme designing institute, based on the authentication agreement of fingerprint secret information: guarantee that communication authentication can prevent that third-party storming from hitting.Authentication based on the fingerprint biological characteristic: can solve password and spy on and problems such as key management difficulty, but be difficult to stop third-party storming to hit, thereby, the solution of the fingerprint identity validation system that the present invention proposes combines foregoing fingerprint identification technology and Information Hiding Techniques and obtains afterwards.
Server end is arranged on the inner PC server of trade center or bank, and its function of finishing is:
(a) search of the finger print data of registered user input and user registration number, password or ID number (cell-phone number etc. all can), as the off-line part of Fig. 9, its processing procedure is handled identical with the client fingerprint);
(b) set up customer data base and corresponding data search engine mechanism based on the tree construction of linux system;
(c) user profile that client transmissions is come is extracted decoding, and carries out fingerprint comparison according to the online treatment process of Figure 10, obtains the affirmation information of a user identity;
(d) server end returns confirmation, and carries out user's processing of deducting fees and transfer accounts.
Therefore, the gordian technique of server end technology realization is: user fingerprints database that the tree construction classification is set up and the quick technology of confirming user identity of searching for.
The working specification of finger print identification verification equipment: connect service terminal by the RS-232/485 serial ports, can carry out read operation to fingerprint scanner automatically, obtain the information such as fingerprint template that need, equipment is positioned over teller's working top, convenient fingerprint collecting checking at any time.Each shopping outlet is provided with the platform number that needs according to its teller window number correspondence.When the shopping clearing, the user only need confirm to consume the amount of money, and gathers fingerprint with the fingerprint read head that finger touches on the payment terminal, imports user's search number (normally user's mobile phone or home phone number) then.
The fingerprint identity of server and the affirmation identity of dealing money and dealing money return a confirmation code by server end according to protocol information and can finish processing after determining.The fingerprint payment process gets the Green Light and confirms.
Fingerprint payment system does not use actual all fingerprints of user, just extracts small unique point from user's fingerprint, and they are encrypted the unique fingerprint characteristic data that changes into the user with fingerprint algorithm of the present invention.These fingerprint characteristic datas enough come the unique and every other people's difference of user's identity, therefore in fact, do not keep and store user's fingerprint on the server of system, using the fingerprint characteristic data of being gathered is to copy user's physics fingerprint image or complete finger print information by backstepping, and all fingerprint characteristic datas can be stored in the financial settlement grade server system of highest security and confidentiality certainly.
Claims (9)
1. the fingerprint identification method based on DSP is characterized in that, may further comprise the steps:
A, employing DSP TMS320VC5000 carry out extreme value filtering, smothing filtering, Laplce's sharpening processing to the fingerprint of gathering;
B, extract through pretreated fingerprint image characteristics point by the iteration threshold binaryzation;
C, the fingerprint image characteristics point data and the Account Data of user's registration that will extract through the iteration threshold binaryzation are bound and are stored in the tree construction database on the server;
D, DSP are connected with server by the RS-232/485 interface, and server can be connected with a plurality of DSP service terminals.
2. the fingerprint identification method based on DSP according to claim 1 is characterized in that, the process that described fingerprint to collection carries out the extreme value Filtering Processing is as follows:
A, to be provided with a pending pixel region be s0, and 8 neighborhood territory pixels are arranged as follows around it:
Get the average Ai of neighborhood related pixel earlier, i ∈ 1,2 ... 8} is one group of processing unit with four pixels, can improve correlation technique document extreme value filtering algorithm, is expressed as follows:
If b is A0>max (Ai), i ∈ 1,2 ... 8} then
s1=s2=s4=s0=max(A1,A2,A4)
s2=s3=s5=s0=max(A2,A3,A5)
s4=s6=s7=s0=max(A4,A6,A7)
s5=s7=s8=s0=max(A5,A7,A8)
If c is A0<min (Ai), i ∈ 1,2 ... 8} then
s1=s2=s4=s0=min(A1,A2,A4)
s2=s3=s5=s0=min(A2,A3,A5)
s4=s6=s7=s0=min(A4,A6,A7)
s5=s7=s8=s0=min(A5,A7,A8)
If d is min (Ai)<=Ai<=max (Ai), i ∈ 1,2 ... 8} then with the output of pixel initial value, does not process.
3. the fingerprint identification method based on DSP according to claim 1 is characterized in that,
The process that described fingerprint to collection carries out The disposal of gentle filter is as follows:
Each pixel in the fingerprint and M are carried out convolution, and level and smooth convolution kernel is:
4. the fingerprint identification method based on DSP according to claim 1 is characterized in that, the process that described fingerprint to collection carries out Laplce's sharpening processing is as follows:
The sharpening convolution kernel adopts the La Pulashi operator, and is as follows,
By this convolution kernel image pixel is carried out the convolution budget, realize high-pass filtering, thereby make Laplace operator be used on the fingerprint image, and obtain the fingerprint ridge line after the sharpening.
5. the fingerprint identification method based on DSP according to claim 1 is characterized in that, and is described as follows through the process of pretreated fingerprint image characteristics point by the extraction of iteration threshold binaryzation:
Take the method for iteration threshold, in the iteration threshold computing:
A, setting Initial Hurdle T, as make T=127 (gray level), the average gray value of fingerprint image is divided into two groups of R1, R2;
B, calculating two groups average gray value u1, u2;
C and then reset new gray scale threshold values T, new T is defined as: T=(u1+u2)/2;
D, fingerprint image is carried out threshold segmentation according to this T.
6. the fingerprint identification method based on DSP according to claim 1 is characterized in that, also comprises a step, by DSP the transform domain that fingerprint characteristic data carries out Information hiding is handled.At transmitting terminal, fingerprint characteristic information and ID users are carried out mould two computings by the pseudo-random sequence that conversion generates, carry out the transmission error control Error Correction of Coding again, transmit in conjunction with chnnel coding again, receiving end carries out information extraction according to extraction algorithm in without the data of channel decoding, the data that propose are passed through error-correcting decoding again, carry out mould two computings with pseudo-random sequence and can get fingerprint characteristic data.
7. the fingerprint identification method based on DSP according to claim 1, it is characterized in that, database on the described server is based on the tree construction fingerprint database, be divided into a certain classification according to the fingerprint characteristic fingerprint of naming a person for a particular job, the affirmation user identity is searched in classification according to fingerprint fast, in fingerprint base design based on tree construction, unique fingerprint vector a
l 1 .., l 1At tree node [i
1...., i
l] go up according to Gaussian distribution N (0, σ
W 2) produce, wherein l is the degree of depth of node, and i is certain user node, and { a} is separate, for user u for the fingerprint vector collection simultaneously
(i)Its index is i=[i
1, i
2...., i
l], distribute to u
(i)Fingerprint copy X
(i)In, the L of a total embedding fingerprint is a
l 1, a
l 1 , l 2..., a
l 1 ., l LAlso can carry out the modulating transformation of orthogonal vector to the finger print data sequence in the database: conversion coefficient is divided into set of vectors according to fingerprint ID key, make the vector quantization (COVQ of channel optimization by combination, channel-optimized VQ) the Euclid vector quantization index i* of acquisition standard, to given input information source vector v, from coded vector y
iAnd size is N
CbThe quantization index i* that obtains of information source code book can be expressed as
Here, P
J/iReceive the conditional probability of j vector signal when being known index i, hiding finger print data at first carries out information source coding (depending on data character) and produces the symbol sebolic addressing { s of Q direction
1, s
2, Λ, s
Q, at the k dimension space, to each vector coefficients v of Q direction
jSymbol of middle embedding obtains to upset vector
For the constraint condition of satisfied transmission,
The scope of value should be at radius
Circle in, like this, size just can be formed channel codebook for the k of Q dimension upset value; This channel codebook can be adjusted by the embedment strength α of decision transmission performance, promptly
Can be expressed as
I=1,2, Λ, Q, wherein C (s
i) be exactly that size is the channel codebook of Q, before the transmission, the coefficient of upset is changed to host signal by contravariant; The data S that fingerprint is hidden carries out transform domain and decomposes after the pre-service of ranks direction, obtains transmission signals at last
Again will
(x y) is divided into different fingerprint embedded blocks, i user u according to decomposition layer i and direction θ
(i)Fingerprint W
(i)Produce by formula (2):
Wherein, { ρ
lBe subjected to the probability decision of collusion attack by the different branches of corresponding fingerprint tree, and 0≤ρ is arranged
1, Λ, ρ
L,≤1,
Relation, adjust between the different user fingerprint that assignment is distributed according to the capacity of each grade fingerprint of embedment strength α control tree and self-adaptation; a
i 1 .., i 1For the value of fingerprint vector on the different nodes of tree, therefore, distribute to u
(i)The signal form of finger print data content be:
And in the modulation of quadrature fingerprint, host signal S can be divided into the part S of L non-overlapping copies
1,, S
L, like this at S
lIn the coefficient that can embed satisfy relation:
And satisfy
In the fingerprint modulation of this proposition, definition matrix P is one and goes up the triangle square formation, at P
JIn, in order to realize effective bandwidth,, make p for k>1
K, l=0, for k≤l, make 0<p
K, l≤ 1 to realize robustness, definition E
K, lFor being embedded into X
l (i)Middle k level fingerprint vector a
i 1 , Λ, i kCapacity, then
Be W
l (i)All told,
At the 1st grade, p
1,1=1, at the 2nd≤l≤L level, known p
1, l, seek { p
K, 1}
K<lRelation value, satisfying a kind of condition is E
1, l: E
2, l: Λ: E
L-1, l=ρ
1: ρ
2: Λ, ρ
L-1So, but for k<1 relation is arranged:
With known { p
L, l}
L=1, Λ, LThe time matrix arranged
In (6), work as
0≤N
lDuring≤N, seek N
1, N
2, Λ, N
LSatisfy condition
P
J[N
1?N
2ΛN
L]
T=N[ρ
1?ρ
2Λρ
L]
T (7)
In (7) formula, work as p
L, L=p
LThe time, just be based on a kind of method that the quadrature fingerprint is modulated, so,, realize that the method for the multistage imbedding problem of fingerprint is according to above definition:
Condition and relation according to (7) formula
Each fingerprint vector a for tree 1≤l≤L level
i 1 , Λ, i lHave:
Here,
According to Gaussian distribution N (0, σ
W 2) and separate.For k 〉=1, length is N
kFingerprint vector a
k i 1 , Λ, i 1Be embedded into S
kIn.Symbol " Ψ " has been represented the cascade factor.To u
(i)The i part finger print data content that the user receives is
Have
8. the fingerprint identification method based on DSP according to claim 1 is characterized in that, also further comprises detection and identification step to collusion attack person, and the detection of system and identification are divided into three processes: the range of nodes of at first adding up collusion attack person; Point out the tree node that collusion attack person is taken place by the correlativity vector again; At last, find the leaf at collusion attack person place, wherein, the correlativity vector that detects at i level subrange is:
Its probability distribution when K user's appearance is:
In the formula, σ
d 2Be the variance of received signal Y, and μ
I1., imForm be:
Wherein, k
I1, mBe among K the user some survivor of i level subrange, by formula (12), we search for the place in i level subrange be that leaf is an index:
Wherein, h
mDetermine by the false-alarm probability of detection of packets and the variance of received signal, when needing the design fingerprint recognition system, take all factors into consideration the threshold value adjusted that corresponding tree node is set.
9. fingerprint recognition system, it is characterized in that, comprise fingerprint capturer (1), peripheral control circuit (2), also comprise fingerprint image processor and fingerprint memory (3), outlet terminal (4), entry terminal (5), fingerprint image processor is to utilize the described method of claim 1-9 that fingerprint image is handled and discerned.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA200710027531XA CN101206714A (en) | 2007-04-13 | 2007-04-13 | Fingerprint identification method and fingerprint payment system based on DSP |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA200710027531XA CN101206714A (en) | 2007-04-13 | 2007-04-13 | Fingerprint identification method and fingerprint payment system based on DSP |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101206714A true CN101206714A (en) | 2008-06-25 |
Family
ID=39566900
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNA200710027531XA Pending CN101206714A (en) | 2007-04-13 | 2007-04-13 | Fingerprint identification method and fingerprint payment system based on DSP |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101206714A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101901332A (en) * | 2009-05-31 | 2010-12-01 | 上海点佰趣信息科技有限公司 | Fingerprint identification system and method |
CN102195778A (en) * | 2010-03-16 | 2011-09-21 | 无锡指网生物识别科技有限公司 | Fingerprint authentication method for Internet electronic payment |
CN105141673A (en) * | 2015-08-07 | 2015-12-09 | 努比亚技术有限公司 | Intelligent terminal and user information processing method thereof |
CN105160320A (en) * | 2015-09-02 | 2015-12-16 | 小米科技有限责任公司 | Fingerprint identification method and apparatus, and mobile terminal |
CN105893950A (en) * | 2016-03-30 | 2016-08-24 | 宁波三博电子科技有限公司 | Adaptive fingerprint identification method and system based on redundancy error sequence ranking algorithm |
CN106295365A (en) * | 2016-08-12 | 2017-01-04 | 武汉大学 | A kind of encrypting fingerprint template protection method and system based on orthogonal transformation |
CN106452779A (en) * | 2016-08-31 | 2017-02-22 | 福建联迪商用设备有限公司 | Encryption method and apparatus of fingerprint image data |
CN108267083A (en) * | 2017-12-28 | 2018-07-10 | 顺丰科技有限公司 | A kind of 3D cameras volume measuring method and system |
-
2007
- 2007-04-13 CN CNA200710027531XA patent/CN101206714A/en active Pending
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101901332A (en) * | 2009-05-31 | 2010-12-01 | 上海点佰趣信息科技有限公司 | Fingerprint identification system and method |
CN102195778A (en) * | 2010-03-16 | 2011-09-21 | 无锡指网生物识别科技有限公司 | Fingerprint authentication method for Internet electronic payment |
CN105141673A (en) * | 2015-08-07 | 2015-12-09 | 努比亚技术有限公司 | Intelligent terminal and user information processing method thereof |
CN105160320A (en) * | 2015-09-02 | 2015-12-16 | 小米科技有限责任公司 | Fingerprint identification method and apparatus, and mobile terminal |
CN105160320B (en) * | 2015-09-02 | 2019-03-01 | 小米科技有限责任公司 | Fingerprint identification method, device and mobile terminal |
CN105893950A (en) * | 2016-03-30 | 2016-08-24 | 宁波三博电子科技有限公司 | Adaptive fingerprint identification method and system based on redundancy error sequence ranking algorithm |
CN105893950B (en) * | 2016-03-30 | 2019-04-26 | 浙江凯迪仕实业有限公司 | A kind of adaptive fingerprint identification method and system based on redundancy incorrect order permutation algorithm |
CN106295365A (en) * | 2016-08-12 | 2017-01-04 | 武汉大学 | A kind of encrypting fingerprint template protection method and system based on orthogonal transformation |
CN106295365B (en) * | 2016-08-12 | 2019-03-15 | 武汉大学 | A kind of encrypting fingerprint template protection method and system based on orthogonal transformation |
CN106452779A (en) * | 2016-08-31 | 2017-02-22 | 福建联迪商用设备有限公司 | Encryption method and apparatus of fingerprint image data |
WO2018040878A1 (en) * | 2016-08-31 | 2018-03-08 | 福建联迪商用设备有限公司 | Method and device for encrypting fingerprint image data |
CN108267083A (en) * | 2017-12-28 | 2018-07-10 | 顺丰科技有限公司 | A kind of 3D cameras volume measuring method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102306305B (en) | Method for authenticating safety identity based on organic characteristic watermark | |
CN101206714A (en) | Fingerprint identification method and fingerprint payment system based on DSP | |
CN101057248B (en) | Fingerprint biomass machine | |
CN102722696B (en) | Identity authentication method of identity card and holder based on multi-biological characteristics | |
EP1402681A2 (en) | Application-specific biometric templates | |
Braithwaite et al. | Application-specific biometric templates | |
CN106710032B (en) | Entrance guard opening method and device | |
CN106936586A (en) | A kind of biological secret key extracting method based on fingerprint bit string and Error Correction of Coding | |
WO2022072720A1 (en) | Biometric-based identity authentication | |
CN103699995A (en) | Payment authentication method based on fingerprints and finger veins | |
CN102223233A (en) | Biological code authentication system and biological code authentication method | |
CN104751154A (en) | Fingerprint safe encryption method based on intelligent mobile information device | |
Khan et al. | Chaos and NDFT-based spread spectrum concealing of fingerprint-biometric data into audio signals | |
Radha et al. | An evaluation of fingerprint security using noninvertible biohash | |
Ali et al. | Fingerprint shell with impregnable features | |
Uludag | Secure biometric systems | |
Rzouga Haddada et al. | Double watermarking‐based biometric access control for radio frequency identification card | |
Saraswathi et al. | Retinal biometrics based authentication and key exchange system | |
Aanjanadevi et al. | Face Attribute Convolutional Neural Network System for Data Security with Improved Crypto Biometrics. | |
Khan et al. | Robust hiding of fingerprint-biometric data into audio signals | |
CN1858812A (en) | Indentity identifying system, method and radio terminal | |
CN106710033B (en) | Entrance guard opening method and device | |
Mimura et al. | Fingerprint verification system on smart card | |
JP2005038020A (en) | Fingerprint authentication device, computer system and network system | |
Praseetha et al. | Novel Web Service Based Fingerprint Identification Using Steganography and Xml Mining |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Open date: 20080625 |