CN101976312B - Method for enhancing security of Biohashing system - Google Patents

Method for enhancing security of Biohashing system Download PDF

Info

Publication number
CN101976312B
CN101976312B CN 201010284596 CN201010284596A CN101976312B CN 101976312 B CN101976312 B CN 101976312B CN 201010284596 CN201010284596 CN 201010284596 CN 201010284596 A CN201010284596 A CN 201010284596A CN 101976312 B CN101976312 B CN 101976312B
Authority
CN
China
Prior art keywords
biohashing
matrix
token
helperdata
algorithm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN 201010284596
Other languages
Chinese (zh)
Other versions
CN101976312A (en
Inventor
李慧贤
王旋
庞辽军
尹平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Northwestern Polytechnical University
Xidian University
Original Assignee
Northwestern Polytechnical University
Xidian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Northwestern Polytechnical University, Xidian University filed Critical Northwestern Polytechnical University
Priority to CN 201010284596 priority Critical patent/CN101976312B/en
Publication of CN101976312A publication Critical patent/CN101976312A/en
Application granted granted Critical
Publication of CN101976312B publication Critical patent/CN101976312B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses a method for enhancing security of Biohashing system, which is used for solving the poor system security technical problem that the conventional Biohashing method. The technical scheme is that: auxiliary data obtained based on key generation is adopted to enhance the security of the Biohashing system; the auxiliary data HelperData is generated by using a biological characteristic template and a token held by a user; and on the basis of not increasing the system distortion rate, when the token is lost or is obtained by an attacker, the system is not subjected to security threat and the system security is improved.

Description

Strengthen the method for Biohashing security of system
Technical field
The present invention relates to a kind of Biohashing method, particularly strengthen the method for Biohashing security of system.
Background technology
In the biological characteristic field of encryption, the protection problem of biological template roughly can be divided into two kinds: biological hash method (Biohashing) and based on the method (HelperData) of auxiliary data.Document " Cancellable biometrics andannotations on BioHash.Pattern Recognition, 2008,41 (6): 2034-2044. " discloses a kind of Biohashing method:
(1) feature extraction.From the primeval life feature templates, extract biological attribute data sequence N and represent the length of biological attribute data sequence,
Figure BSA00000273593700012
representes set of real numbers;
(2), generate N random series r based on the random number seed token that sets in the known token 1, r 2...,
Figure BSA00000273593700013
Wherein N representes the biological attribute data sequence length in the above-mentioned steps (1);
(3) according to the biological attribute data sequence r of Gram-Schmidt method with generation in the step (2) 1, r 2...,
Figure BSA00000273593700014
Unit orthogonalization generates one group of new sequence or 1, or 2..., or N.
(4) to each or i, calculate inner product<v, or i>, and setting threshold τ, obtain a discrete data b i, wherein: i=1,2 ... N.Specific algorithm is following:
b i = 0 < v , Or i > &le; &tau; 1 < v , Or i > > &tau; I=1 wherein, 2 ... N
The Biohashing method is a kind of scheme of effective revocable biological template; The pseudo-random sequence of utilizing token at random to generate is carried out inner product with the biological template data and is dispersed; Well annotated the intension of revocable biological template method: when changing at random token, just can regenerate new revocable template.In the verification process, if token is correct at random, the misclassification rate of system will reduce greatly, even the phenomenon of zero misclassification rate possibly occur.
Yet because the internal mechanism of Biohashing method, the effect of token in total system is very large, can be described as dominance, and this deviates from the original idea of using biological character for identity authentication.When the token that obtains user's token or user as the assailant leaked, the safety of system will receive very big influence.For example, after assailant A obtains the token of user B, use the token of B and the biological characteristic of self, promptly might be through the authentication of system.And for token, because be that the user outside is held, be prone to be stolen or leak, therefore, needs are a kind of can be in the still guaranteed improvement project of security of system after the token lost.
Existing improving one's methods all is in the middle flow process of system or the generative process of last biological Hash code word (BiohashCode), to increase parameter; Or changing traditional discrete logarithm comes total system is protected, and does not fundamentally solve token and loses the safety problem of system afterwards.
Summary of the invention
In order to overcome the deficiency of existing Biohashing method security of system difference, the present invention provides a kind of method of the Biohashing of enhancing security of system.This method adopts the auxiliary data based on key generation gained to strengthen the Biohashing security of system; The token that uses biometric templates and user to hold generates auxiliary data HelperData; On the basis that does not increase the systematic distortion rate; Lose or victim when resultant when token, system can not receive security threat, can improve the security of system.
The technical solution adopted for the present invention to solve the technical problems: a kind of method that strengthens the Biohashing security of system is characterized in comprising the steps:
(1) in biometric templates, extract intermediate data Aid, wherein Aid is that element value is 0 or 1 matrix, and its line number and columns are by setting threshold P in the extraction algorithm and unimodular value C xAnd C yDecision:
(1.1) be central point with the maximum point of curvature in the biometric templates, and be the center of circle with the central point, central spot field of direction direction is an x axle positive dirction, rotates counterclockwise 90 ° for y axle positive dirction, sets up plane right-angle coordinate;
(1.2) be as the criterion with the coordinate system in the step (1.1), extract the coordinate information M of all bifurcations in the minutiae point in the biometric templates i(x i, y i), wherein i is an integer;
(1.3), calculate to each bifurcation i ρ i representes the distance of fingerprint minutiae to central point, and setting threshold P, works as ρ iDuring<P, this point gets into handles sequence, otherwise discards the information of this point, and wherein i is an integer;
(1.4) the unimodular value C of x axle and y axle in the setting coordinate system xAnd C y, then, calculate the positional information of each bifurcation i in matrix A id (x ', y '), computing method are following:
x &prime; y &prime; = ( x i + P ) / C x ( y i + P ) / C y
(1.5), behavior x ' among the matrix A id and the element value of classifying y ' as are defined as 1, and other element value among the matrix A id is defined as 0 according to the position of each bifurcation i in the step (1.4) in matrix A id (x ', y ');
(2) use the random number seed token that sets in the token of user's input and each row element of matrix A id to carry out XOR by turn, obtain matrix with matrix A id homotype as auxiliary data HelperData;
(3), generate biological Hash code word BiohashCode based on auxiliary data HelperData and original Biohashing algorithm:
(3.1) each capable being input in the original Biohashing algorithm as random seed among the auxiliary data HelperData is gone;
(3.2) with each row of auxiliary data HelperData as the token in the original Biohashing algorithm, generate a cryptographic hash Code through original Biohashing algorithm;
(3.3) with the sequencing of all cryptographic hash Code, combine, form final biological Hash code word BiohashCode according to generation.
The invention has the beneficial effects as follows: owing to adopt auxiliary data to strengthen the Biohashing security of system based on key generation gained; The token that uses biometric templates and user to hold generates auxiliary data HelperData; On the basis that does not increase the systematic distortion rate; Lose or victim when resultant when token, system can not receive security threat, has improved the security of system.
Below in conjunction with accompanying drawing and embodiment the present invention is elaborated.
Description of drawings
Accompanying drawing is the method flow synoptic diagram that the present invention strengthens the Biohashing security of system.
Embodiment
Explanation of nouns:
Aid: in auxiliary data HelperData generative process, by the intermediate data that extracts in the biological data.This intermediate data is by extracting a certain amount of information in the biological data.This information is limited the quantity of, and according to Aid, the assailant can not reconstruct biological template, and promptly Aid is the one group of data that can represent the primeval life template to a certain extent and can not reconstruct the primeval life template according to Aid
HelperData: unite the data of generation by token and intermediate data Aid, participate directly in the Biohashing algorithm operating, play with original Biohashing system in the identical effect of token, promptly occur as random seed.
Present embodiment is example explanation the present invention with the fingerprint picture of 256*360pi (pi is a pixel).Other biological characteristic also is fit to the present invention like iris, people's face, palmmprint etc.Through to system input identical token and different pictures, verify when token lose or victim obtain after the security of system.
With reference to accompanying drawing, each width of cloth picture all passes through following processing after getting into system, the match information when obtaining canned data or the authentication in the server end database.
(1) extracts intermediate data Aid.
(1.1) the maximum point of curvature is a central point in the searching fingerprint image, is the center of circle with the central point, and central spot field of direction direction is an x axle positive dirction, rotates counterclockwise 90 ° and is y axle positive dirction, sets up plane right-angle coordinate;
(1.2) be as the criterion with the coordinate system in the step (1.1), extract the coordinate information M of all bifurcations in the minutiae point in the fingerprint characteristic template i(x i, y i), wherein i is an integer;
(1.3), calculate to each bifurcation i
Figure BSA00000273593700031
ρ iThe expression fingerprint minutiae is to the distance of central point, and setting threshold P, works as ρ iDuring<P, this point gets into handles sequence, otherwise discards the information of this point, and wherein i is an integer.Set P=128pi;
(1.4) the unimodular value C of x axle and y axle in the setting coordinate system xAnd C y, then, calculate the positional information of each bifurcation i in matrix A id (x ', y '), computing method are following:
x &prime; y &prime; = ( x i + P ) / C x ( y i + P ) / C y
Here, make C x=C y=8pi;
(1.5) according to the position of each bifurcation i in the step (1.4) in matrix A id (x ', y '), behavior x ' among the matrix A id and the element value of classifying y ' as are defined as 1, other element value of matrix A id is defined as 0; So just extract matrix A id, regard this matrix as two-dimensional array Aid [] [] and use; Work as C x=C yDuring=8pi, two-dimensional array is Aid [32] [32].
(2) use the token and the Aid [] [] of user's input to carry out XOR line by line, obtain HelperData [] [].That is:
HelperData [ i ] [ ] = Token &CirclePlus; Aid [ i ] [ ] Wherein: i=0,1 ... 31
The setting token is a sexadecimal number, and length is 8.
(3) HelperData is loaded into original Biohashing system.
(3.1) HelperData [] [] is taken out line by line, each row HelperData [i] [] is input in the original Biohashing system as a random seed and goes;
(3.2) HelperData [i] [] generates a code word Code i
(3.3) all code word Code that step (3.2) generated iSize order according to i couples together, and forms final biological Hash code word BiohashCode;
Fingerprint image all needs to generate last BiohashCode with the token that matches with it through above-mentioned operation when system registry and authentication.The BiohashCode that registration generates is stored in the server end database, and the BiohashCode that generates during authentication will mate with the data in the server database.
(4) matching process.
The BiohashCode that generates in the time of might as well making registration is B E, the BiohashCode that generates when making authentication is B QMatching process is following:
(4.1) compare
Figure BSA00000273593700043
and
Figure BSA00000273593700044
Use Hamming distance to describe distance B between the two i, then
Figure BSA00000273593700045
Wherein
Figure BSA00000273593700046
For forming B E, B QBy the Code that generates in (3.2) iValue; Valuei does
Figure BSA00000273593700047
With
Figure BSA00000273593700048
Between Hamming distance and Code iThe ratio of length.
Setting threshold VA, length is 32 array SA, works as Value iDuring<VA, make SA (i)=1, otherwise, SA (i)=0 made.Here get VA ∈ (0.1,0.15);
(4.2) calculate matching fractional.
Score ( E , Q ) = &Sigma; i = 0 31 SA ( i ) T
Wherein: (E Q) is B to Score EAnd B QMatching fractional; T is the number of i,, is set at 32 here.
(4.3) setting threshold SC, when Score (E, Q) >=during SC, then think and mate successfully, otherwise the coupling failure.Here set SC ∈ (0.75,0.8).

Claims (1)

1. a method that strengthens the Biohashing security of system is characterized in that comprising the steps:
(1) in biometric templates, extract intermediate data Aid, wherein Aid is that element value is 0 or 1 matrix, and its line number and columns are by setting threshold P in the extraction algorithm and unimodular value C xAnd C yDecision:
(1.1) be central point with the maximum point of curvature in the biometric templates, and be the center of circle with the central point, central spot field of direction direction is an x axle positive dirction, rotates counterclockwise 90 ° for y axle positive dirction, sets up plane right-angle coordinate;
(1.2) be as the criterion with the coordinate system in the step (1.1), extract the coordinate information M of all bifurcations in the minutiae point in the biometric templates i(x i, y i), wherein i is an integer;
(1.3), calculate to each bifurcation i
Figure FSB00000738154700011
ρ iThe expression fingerprint minutiae is to the distance of central point, and setting threshold P, works as ρ iDuring<P, this point gets into handles sequence, otherwise discards the information of this point, and wherein i is an integer;
(1.4) the unimodular value C of x axle and y axle in the setting coordinate system xAnd C y, then, calculate the positional information of each bifurcation i in matrix A id (x ', y '), computing method are following:
x &prime; y &prime; = ( x i + P ) / C x ( y i + P ) / C y
(1.5), behavior x ' among the matrix A id and the element value of classifying y ' as are defined as 1, and other element value among the matrix A id is defined as 0 according to the position of each bifurcation i in the step (1.4) in matrix A id (x ', y ');
(2) use the random number seed token that sets in the token of user's input and each row element of matrix A id to carry out XOR by turn, obtain matrix with matrix A id homotype as auxiliary data HelperData;
(3), generate biological Hash code word BiohashCode based on auxiliary data HelperData and original Biohashing algorithm:
(3.1) each capable being input in the original Biohashing algorithm as random seed among the auxiliary data HelperData is gone;
(3.2) with each row of auxiliary data HelperData as the token in the original Biohashing algorithm, generate a cryptographic hash Code through original Biohashing algorithm;
(3.3) with the sequencing of all cryptographic hash Code, combine, form final biological Hash code word BiohashCode according to generation.
CN 201010284596 2010-09-16 2010-09-16 Method for enhancing security of Biohashing system Expired - Fee Related CN101976312B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 201010284596 CN101976312B (en) 2010-09-16 2010-09-16 Method for enhancing security of Biohashing system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 201010284596 CN101976312B (en) 2010-09-16 2010-09-16 Method for enhancing security of Biohashing system

Publications (2)

Publication Number Publication Date
CN101976312A CN101976312A (en) 2011-02-16
CN101976312B true CN101976312B (en) 2012-09-26

Family

ID=43576197

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 201010284596 Expired - Fee Related CN101976312B (en) 2010-09-16 2010-09-16 Method for enhancing security of Biohashing system

Country Status (1)

Country Link
CN (1) CN101976312B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102394896A (en) * 2011-12-13 2012-03-28 甘肃农业大学 Privacy-protection fingerprint authentication method and system based on token
CN110119608A (en) * 2014-03-27 2019-08-13 阿里巴巴集团控股有限公司 A kind of biological information processing method, biological information store method and device
CN104954127B (en) * 2014-03-27 2019-03-29 阿里巴巴集团控股有限公司 A kind of authorization method, biological information sending method and device
CN104029654B (en) * 2014-05-30 2018-01-05 江苏大学 Automobile anti-theft method and burglary-resisting system based on fingerprint key encryption technology

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7274804B2 (en) * 2002-05-30 2007-09-25 Activcard Ireland Limited Method and apparatus for hashing data
CN101079101A (en) * 2007-06-19 2007-11-28 中山大学 Zernike moment based robust hashing image authentification method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7274804B2 (en) * 2002-05-30 2007-09-25 Activcard Ireland Limited Method and apparatus for hashing data
CN101079101A (en) * 2007-06-19 2007-11-28 中山大学 Zernike moment based robust hashing image authentification method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Adams Kong 等.An analysis of BioHashing and its variants.《Pattern Recognition》.2006,1359-1368. *
李鹏 等.生物特征模板保护.《软件学报》.2009,第20卷(第6期),1553-1557. *

Also Published As

Publication number Publication date
CN101976312A (en) 2011-02-16

Similar Documents

Publication Publication Date Title
Lee et al. Biometric key binding: Fuzzy vault based on iris images
Wang et al. Alignment-free cancelable fingerprint template design: A densely infinite-to-one mapping (DITOM) approach
Ferrara et al. Noninvertible minutia cylinder-code representation
Yang et al. Cancelable fingerprint templates with delaunay triangle-based local structures
Lee et al. A new method for generating an invariant iris private key based on the fuzzy vault system
Hao et al. Combining cryptography with biometrics effectively
Jagadeesan et al. Cryptographic key generation from multiple biometric modalities: Fusing minutiae with iris feature
Nandakumar et al. Fingerprint-based fuzzy vault: Implementation and performance
Li et al. An effective biometric cryptosystem combining fingerprints with error correction codes
Wang et al. An analysis of random projection for changeable and privacy-preserving biometric verification
CN101674299B (en) Method for generating key
Yang et al. A delaunay triangle-based fuzzy extractor for fingerprint authentication
Eskander et al. A bio-cryptographic system based on offline signature images
CN106936586A (en) A kind of biological secret key extracting method based on fingerprint bit string and Error Correction of Coding
Li et al. Generating cancelable palmprint templates via coupled nonlinear dynamic filters and multiple orientation palmcodes
CN102111418A (en) Facial feature cryptographic key generation-based internet identity authentication method
Liu et al. Minutiae and modified biocode fusion for fingerprint-based key generation
CN103646199B (en) A kind of based on the auth method of nine grids password and facial image
CN102609677A (en) Biological characteristic cryptographic system based on fingerprint and error correcting code
Ali et al. Securing biometric user template using modified minutiae attributes
Jin et al. Generating revocable fingerprint template using minutiae pair representation
Tran et al. Biometrics and privacy-preservation: How do they evolve?
CN101976312B (en) Method for enhancing security of Biohashing system
Ranjan et al. Improved and innovative key generation algorithms for biometric cryptosystems
Balakumar et al. Secure biometric key generation scheme for cryptography using combined biometric features of fingerprint and iris

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20120926

Termination date: 20140916

EXPY Termination of patent right or utility model