CN102722696A - Identity authentication method of identity card and holder based on multi-biological characteristics - Google Patents
Identity authentication method of identity card and holder based on multi-biological characteristics Download PDFInfo
- Publication number
- CN102722696A CN102722696A CN2012101513000A CN201210151300A CN102722696A CN 102722696 A CN102722696 A CN 102722696A CN 2012101513000 A CN2012101513000 A CN 2012101513000A CN 201210151300 A CN201210151300 A CN 201210151300A CN 102722696 A CN102722696 A CN 102722696A
- Authority
- CN
- China
- Prior art keywords
- matrix
- image
- masterplate
- characteristic
- iris
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Collating Specific Patterns (AREA)
Abstract
The invention provides an identity authentication method of an identity card and a holder based on multi-biological characteristics. The invention mainly assists in solving potential safety hazard problems existing in a cross-application process in the prior art. An embodiment comprises the steps that: when identity card registration transaction is carried out, characteristics of fingerprints, iris information and face image of a citizen are acquired; a uniform matrix image AI, a domain element matrix image UI and an offset matrix image SI are acquired and saved respectively in a population information database and an identity card chip; when authentication is carried out, an authentication terminal acquires characteristics of the fingerprints, the iris information and the face image of an identity card holder; the uniform matrix image AI and the domain element matrix image UI are searched for in the population information database based on personal basic information PI; and identity authentication of the identity card and the holder is carried out by using three biological characteristics of the fingerprints, the iris information and the face image, the uniform matrix image AI, the domain element matrix image UI and the offset matrix image SI. According to the invention, an authentication accuracy rate and overall authentication system safety are improved and potential safety hazard existing in the cross-application process is effectively reduced.
Description
Technical field
The invention belongs to field of information security technology, relate to the physical identity authentication method of multi-biological characteristic I.D., can be used for carrying out quickly and accurately the establishing identity of I.D. possessor and I.D., effectively protect the personal secrets of biological characteristic.
Background technology
For can be through the machine-readable establishing identity that carries out I.D. possessor and I.D. quickly and accurately; Maintain state security and social stability; Effectively take precautions against the generation of criminal offences such as falsely using other people resident identification card and forgery, change resident identification card, the 23 meeting of the Standing Committee of the National People's Congress considered and adopted " People's Republic of China's residential identity demonstration amendment (draft) ".The further requirement of draft, neck is got, is changed in citizen's application, the resident identification card of applying for another, and should register finger print information.The finger print information of in resident identification card, registering; This is digitized fingerprint feature point, can not be reduced into fingerprint image, though can effectively protect citizen's finger print information safety to a certain extent; But widespread use along with fingerprint characteristic; Illegal intention person needn't reduce fingerprint image and only just can in other fingerprint characteristic encryption systems, successfully pretend to be validated user through the digitizing fingerprint characteristic dot information that steals, and obtains unlawful interests, causes great information security events.For example: in the Fuzzy Vault encrypting fingerprint system, just can from Vault, recover the polynomial expression of initial structure, obtain user's key information then according to digitized fingerprint characteristic dot information.
Document " based on the ID authentication device of second generation I.D. and multi-modal biological characteristic, Chinese invention patent, CN201838011 " discloses a kind of ID authentication device based on second generation I.D. and multi-modal biological characteristic.Though this patent has designed the authenticating device based on fingerprint, iris, people's face and China second-generation identity card; But the registration and the identifying procedure of these equipment are used in only preliminary explanation; There is not concrete authentication method; And the biological characteristic of its when registration typing does not read from I.D., promptly effectively I.D. possessor and I.D. is not combined, can not be accurate and effective I.D. possessor and I.D. are carried out establishing identity.
Document " based on the Certification of Second Generation authentication system research of fingerprint and recognition of face, digital technology and application, o. 11th in 2011 " discloses a kind of Certification of Second Generation authentication system based on fingerprint and recognition of face.According to the characteristics of self-contained lawful bearer's fingerprint of second generation resident identification card and image information, the document proposes: combine fingerprint and face recognition technology to realize having the multifactor authentication system of greater security.This system can compare through the user's that will collect in real time fingerprint, people's face information and fingerprint, the image information that is stored in the Certification of Second Generation, thereby whether when realizing identity verification card basic document, accomplishing the user is holder in due course's checking.Though this system effectively combines I.D. possessor and I.D., and I.D. possessor and I.D. carried out establishing identity, and more single biological characteristic authentication has discrimination preferably, there is following defective in this method:
At first, do not spell out the biological characteristic type of being stored, promptly storage is digitized biological characteristic dot information or original biometric image.The biological characteristic type of storage is different, and the leakage of information degree that causes is different.
Secondly, do not consider biological characteristic secret protection problem.In case biological characteristic is stolen; Just can recover original biological information or obtain the rights and interests of corresponding validated user in other biological characteristic application system through correlation attack; Cause the leakage of user privacy information and relevant heavy economic losses, serious harm national security and social stability.
At last; Because employed fingerprint and people's face information are deposited in the I.D. respectively; Therefore need respectively fingerprint and people's face information to be carried out safeguard protection to guarantee the personal secrets of these biological informations; This has increased the expense of biological characteristic secret protection, simultaneously the security of whole Verification System is had higher requirement, because the leakage of any information in fingerprint and the people's face information all can cause the reduction of total system security.
Summary of the invention
The objective of the invention is to deficiency to above-mentioned prior art; A kind of testimony of a witness homogeneity authentication method based on the multi-biological characteristic I.D. is proposed; To guarantee when making full use of the contained information of I.D., further improve the homogeneity authentication discrimination of I.D. possessor and its I.D., reduce the biological characteristic number of objects that will protect simultaneously; Improve the protection of citizen's biological characteristic private ownership, be reduced in the potential safety hazard that exists in the cross-application process.
The technical thought that realizes the object of the invention is; Through data after fingerprint, iris, three kinds of biological characteristic computings of people's face and the data that are stored in the population information database are carried out matrix operation; Whether the checking matrix of consequence is that full null matrix judges whether I.D. possessor and its I.D. have homogeneity, thereby when improving the biological attribute data security, effectively reduces falsely using and forging of I.D..Its particular content comprises as follows:
(1) biological attribute data typing step:
When (1a) handling I.D., gather fingerprint, iris and three kinds of biological characteristics of people's face of citizen, obtain citizen's fingerprint image FP, iris image IR and facial image FA;
(1b) from fingerprint image FP, iris image IR and facial image FA, take the fingerprint respectively characteristic masterplate FC, iris feature masterplate IC and face characteristic masterplate AC, and with FC, IC and three kinds of characteristic masterplates of AC composite character masterplate MC that permeates;
(1c) utilize fuzzy method for distilling, from characteristic masterplate MC, extract binary code word BC, and code word BC is mapped as cryptographic hash function value matrix E through m cryptographic hash function;
(1d) set Gaussian distribution matrix F, homogeneous matrix A, and calculate Gaussian mode matrix number F ', field element matrix U and excursion matrix S:
F′=Fmodq,
U=AF′modq,
S=F′-E,
Wherein, q is a prime number, and mod representes modulo operation, and modq representes that modulus is the modulo operation of q;
(1e) convert homogeneous matrix A, field element matrix U to homogeneous matrix image A I, field element matrix image UI, and homogeneous matrix image A I, field element matrix image UI are stored in the population information database;
(1f) convert excursion matrix S to excursion matrix image SI, and excursion matrix image SI is stored in the I.D. chip;
(2) I.D. and possessor's homogeneity authenticating step:
(2a) during authentication, authentication end captured identity card possessor's fingerprint image FP ', iris image IR ' and facial image FA ';
(2b) individual essential information PI in the reading identity card chip and excursion matrix image SI;
(2c) to citizen's fingerprint image FP ', iris image IR ' and facial image FA ' take the fingerprint respectively characteristic masterplate FC ', iris feature masterplate IC ' and face characteristic masterplate AC ', and with FC ', IC ' and three kinds of characteristic masterplates of AC ' composite character masterplate MC ' that permeates;
(2d) utilize fuzzy method for distilling, extraction binary code word BC ' from characteristic masterplate MC ', and code word BC ' is mapped as cryptographic hash function value matrix E ' through m cryptographic hash function;
(2e) convert excursion matrix image SI into excursion matrix S, and according to Hash cipher function value matrix E ' calculating Gaussian mode matrix number F ":
F″=S+E′;
(2f) in population information database, retrieve corresponding homogeneous matrix image A I, field element matrix image UI, and convert homogeneous matrix image A I, field element matrix image UI into homogeneous matrix A, field element matrix U respectively according to individual essential information PI;
(2g) utilize Gaussian mode matrix number F ", result of calculation matrix F N:
FN=U-AF″modq,
Wherein, q is a prime number, and mod representes modulo operation, and modq representes that modulus is the modulo operation of q, and whether judged result matrix F N is full null matrix, if matrix of consequence FN is full null matrix, explains that then I.D. and its possessor have homogeneity; Otherwise I.D. and its possessor do not have homogeneity.
Compared with prior art, the present invention has following advantage:
1, the present invention selects for use three kinds of biological characteristics to discern authentication; Or two kind living things feature recognitions single with use are compared; Greatly reduce false acceptance rate and false rejection rate, further promoted the accuracy rate of authentication, thereby effectively prevented the forgery of resident identification card or counterfeit.
2, the present invention is merged three kinds of biological characteristics in the characteristic level; Compare with other method that these three kinds of biological characteristics of same selection are discerned; Reduced the biological information number that needs protection; Effectively raise the whole security of biological characteristic privacy and Verification System, reduced the expense of Verification System aspect safeguard protection, improved effective utilization rate of resource;
3, the present invention only stores homogeneous matrix image A I, field element matrix image UI and excursion matrix image SI; Also can't recover original biological information even if the assailant gets access to image A I, UI and SI, more can not steal other rights and interests of validated user through cross-application.Therefore, the present invention effectively is reduced in the potential safety hazard that exists in the cross-application process in the biological characteristic personal secrets protection of strengthening the citizen.
Description of drawings
Fig. 1 the present invention is based on the I.D. of multi-biological characteristic and possessor's homogeneity authentication synoptic diagram;
Fig. 2 is the concrete authentication sub-process of authentication end figure among the present invention.
Embodiment
Below in conjunction with accompanying drawing, describe the idiographic flow of complete I.D. and a possessor's based on multi-biological characteristic homogeneity authentication method in detail.
With reference to Fig. 1; The present invention includes: citizen's biological attribute data typing stage during certificates handling and I.D. and possessor's homogeneity authentication phase; Wherein, I.D. and possessor's homogeneity authentication phase comprises: to the homogeneity authentication of reading and carrying out according to canned data of the collection of I.D. possessor biological characteristic, ID card information.Concrete steps are following:
One. the biological attribute data typing stage
Step 1: when the citizen handles I.D.; The department that handles gathers fingerprint, iris and three kinds of biological characteristics of people's face of citizen respectively through fingerprint, iris and people's face Acquisition Instrument by I.D., obtains citizen's fingerprint image FP, iris image IR and facial image FA.
Step 2: from the fingerprint image FP, iris image IR and the facial image FA that collect; The characteristic that takes the fingerprint respectively masterplate FC, iris feature masterplate IC and face characteristic masterplate AC, and with permeate a composite character masterplate MC of FC, IC and three kinds of characteristic masterplates of AC:
2a) fingerprint image FP is carried out the pretreatment operation that the cutting apart of image, enhancing and the field of direction are extracted successively; Again pretreated fingerprint image is carried out the crestal line refinement; Extract the position and the directional information of minutiae point; And minutiae point position and the directional information of extracting quantized; Generate fingerprint characteristic masterplate FC, the detailed step of quantification is referring to document " Generating revocable fingerprint template using polar grid based 3-tuple quantization technique.2011IEEE 54
ThInternational Midwest Symposium on Circuits and Systems (MWSCAS), pp:1-4,2011 ";
2b) iris image IR is strengthened; Again to the iris image after strengthening carry out successively the burn into iris region of eyelid eyelashes border detection, cut apart and extract; The iris region that extracts is carried out the normalization operation; And use the iris image of Gabor wave filter after handling and extract iris feature information, generate iris feature masterplate IC according to the iris feature information of extracting;
2c) facial image FA is carried out successively the pretreatment operation of brightness rectification, geometric calibration and histogram equalization; Utilize the integral projection method from pretreated facial image, to confirm the facial characteristics point; Extract the local feature information of facial characteristics point, according to the local feature information generation face characteristic masterplate AC of facial characteristics point;
2d) be utilized in biological characteristic fusion method on the characteristic level; With permeate a composite character masterplate MC of fingerprint characteristic masterplate FC, iris feature masterplate IC and three kinds of masterplates of face characteristic masterplate AC; The detailed step of the biological characteristic fusion method on the characteristic level is referring to document " Multibiometric Cryptosystems Based on Feature-Level Fusion.IEEE Transactions on Information Forensics and Security; vol.7; pp:255-268,2012.
Step 3: from characteristic masterplate MC, extract binary code word BC, and code word BC is mapped as cryptographic hash function value matrix E through m cryptographic hash function:
3a) according to fuzzy method for distilling performance, setting the set of biological characteristic masterplate is that k, error correcting capability are t for M, binary keys length, selects with (M; K; T) be the fuzzy method for distilling of parameter, referring to document " Fuzzy Extractors:How to Generate Strong Keys from Biometrics and Other Noisy Data.Computer Science, vol.3027; pp:523-540,2004 ";
3b) utilize selected with (M; K t) is the parameter fuzzy method for distilling, from characteristic masterplate MC, extracts the long binary code word BC of k; The detailed step that extracts is referring to document " Fuzzy Extractors:How to Generate Strong Keys from Biometrics and Other Noisy Data.Computer Science; vol.3027, pp:523-540,2004 ";
3c) according to m cryptographic hash function H
1, H
2..., H
mBinary code word BC with extracting calculates cryptographic hash HV respectively
1, HV
2..., HV
m:
Choosing of parameter m referring to document " Trapdoors for hard lattices and new cryptographic constructions.In Proc.40
ThACM SymP.on Theory of Computing (STOC), pp:197-206,2008 ";
3d) according to the cryptographic hash function value HV that obtains
1, HV
2..., HV
m, calculate cryptographic hash function value matrix E:
Step 4: set Gaussian distribution matrix F, homogeneous matrix A, calculate Gaussian mode matrix number F ', field element matrix U and excursion matrix S:
4a) confirm security parameter n, in (0,255) interval, select a prime number q at random, judge whether prime number q is the polynomial expression of n, if, confirm q unit integer field then according to selected prime number q
And at q unit integer field
In generate n * m dimension homogeneous matrix A at random,
Otherwise, picked at random prime number q again; Security parameter n and q unit integer field
Confirm, referring to document " Trapdoors for hard lattices and new cryptographic constructions.In Proc.40
ThACM SymP.on Theory of Computing (STOC), pp:197-206,2008 ";
4b) at set of integers
In, select a Gaussian distribution parameter r at random, and confirm the set of m dimension integer vectors according to the individual numerical value m of cryptographic hash function
With discrete Gaussian distribution
According to first cryptographic hash function value HV
1The binary representation length l, call l SampleD method from discrete Gaussian distribution
In choose m * l dimension Gaussian distribution matrix F,
The detailed step of SampleD method is referring to document " Trapdoors for hard lattices and new cryptographic constructions.In Proc.40
ThACM SymP.on Theory of Computing (STOC), pp:197-206,2008 ";
4c) according to the Gaussian distribution matrix F, calculate Gaussian mode matrix number F ':
F′=Fmodq,
Wherein, mod representes modulo operation, and modq representes that modulus is the modulo operation of q;
4d) according to homogeneous matrix A and Gaussian mode matrix number F ', computational fields matrix of elements U,
U=AF′modq;
4e) according to Gaussian mode matrix number F ' and cryptographic hash function value matrix E, calculate excursion matrix S,
S=F′-E。
Step 5: homogeneous matrix A, field element matrix U are carried out image conversion respectively handle operation: each element among the homogeneous matrix A according to the gray level of image conversion imaging prime information successively, is obtained homogeneous matrix image A I; Each element in the field element matrix U according to the gray level of image conversion imaging prime information successively, is obtained field element matrix image UI; Again homogeneous matrix image A I, field element matrix image UI are stored in the population information database.
Step 6: excursion matrix S is carried out image conversion handle operation, be about to each element among the excursion matrix S, obtain excursion matrix image SI, again excursion matrix image SI is stored in the I.D. chip according to the gray level of image conversion imaging prime information successively.
Two. I.D. and possessor's homogeneity authentication phase
With reference to Fig. 2, the homogeneity authenticating step in this stage is following:
Step 7: during authentication, the authentication end uses fingerprint, iris and people's face Acquisition Instrument captured identity card possessor's fingerprint image FP ', iris image IR ' and facial image FA ' respectively.
Step 8: the authentication end utilizes identity card reader, individual essential information PI in the reading identity card chip and excursion matrix image SI.
Step 9: the authentication end is to citizen's fingerprint image FP ', iris image IR ' and facial image FA ' take the fingerprint respectively characteristic masterplate FC ', iris feature masterplate IC ' and face characteristic masterplate AC ', and with FC ', IC ' and three kinds of characteristic masterplates of AC ' composite character masterplate MC ' that permeates:
9a) fingerprint image FP ' is carried out the pretreatment operation that the cutting apart of image, enhancing and the field of direction are extracted successively; Again pretreated fingerprint image is carried out the crestal line refinement; Extract the position and the directional information of minutiae point; And minutiae point position and the directional information of extracting quantized; Generate fingerprint characteristic masterplate FC ', the detailed step of quantification is referring to document " Generating revocable fingerprint template using polar grid based 3-tuple quantization technique.2011IEEE 54
ThInternational Midwest Symposium on Circuits and Systems (MWSCAS), pp:1-4,2011 ";
9b) iris image IR ' is strengthened; Again to the iris image after strengthening carry out successively the burn into iris region of eyelid eyelashes border detection, cut apart and extract; The iris region that extracts is carried out the normalization operation; And use the iris image of Gabor wave filter after handling and extract iris feature information, generate iris feature masterplate IC ' according to the iris feature information of extracting;
9c) facial image FA ' is carried out successively the pretreatment operation of brightness rectification, geometric calibration and histogram equalization; Utilize the integral projection method from pretreated facial image, to confirm the facial characteristics point; Extract the local feature information of facial characteristics point, according to the local feature information generation face characteristic masterplate AC ' of facial characteristics point;
9d) be utilized in biological characteristic fusion method on the characteristic level, with fingerprint characteristic masterplate FC ', iris feature masterplate IC ' and three kinds of masterplates of face characteristic masterplate AC ' composite character masterplate MC ' that permeates.The detailed step of the biological characteristic fusion method on the characteristic level is referring to document " Multibiometric Cryptosystems Based on Feature-Level Fusion.IEEE Transactions on Information Forensics and Security; vol.7; pp:255-268,2012.
Step 10: utilize fuzzy method for distilling, extraction binary code word BC ' from characteristic masterplate MC ', and code word BC ' is mapped as cryptographic hash function value matrix E ' through m cryptographic hash function:
10a) utilize step 3 selected with (M; K t) is the fuzzy method for distilling of parameter, the long binary code word BC ' of extraction k from characteristic masterplate MC '; The detailed step that extracts is referring to document " Fuzzy Extractors:How to Generate Strong Keys from Biometrics and Other Noisy Data.Computer Science; vol.3027, pp:523-540,2004 ";
10b) according to m cryptographic hash function H
1, H
2..., H
mBinary code word BC ' with extracting calculates cryptographic hash HV respectively
1', HV
2' ..., HV
m':
10c) according to the cryptographic hash function value HV that obtains
1', HV
2' ..., HV
m', calculate cryptographic hash function value matrix E ':
Step 11: excursion matrix image SI is read according to the matrix-style of image, obtain excursion matrix S, and according to Hash cipher function value matrix E ' calculating Gaussian mode matrix number F ":
F″=S+E′。
Step 12: in population information database, retrieve corresponding homogeneous matrix image A I, field element matrix image UI according to individual essential information PI; And homogeneous matrix image A I, field element matrix image UI read according to the matrix-style of image respectively, read and homogeneous matrix image A I, homogeneous matrix A, field element matrix U that field element matrix image UI is corresponding.
Step 13: utilize Gaussian mode matrix number F ", result of calculation matrix F N:
FN=U-AF″modq,
Wherein, q is a prime number, and mod representes modulo operation, and modq representes that modulus is the modulo operation of q, and whether judged result matrix F N is full null matrix, if matrix of consequence FN is full null matrix, explains that then I.D. and its possessor have homogeneity; Otherwise I.D. and its possessor do not have homogeneity.
Through above 13 steps, realized based on the I.D. of multi-biological characteristic and possessor's homogeneity authentication method.
Of the present inventionly be not limited in the description in instructions and the embodiment based on the I.D. of multi-biological characteristic and possessor's homogeneity authentication method.All within spirit of the present invention and principle, any modification of being made, equal replacement, improvement etc. all are included within the claim scope of the present invention.Explanation of nouns:
FP: the fingerprint image that collects when the citizen handles I.D.
IR: the iris image that collects when the citizen handles I.D.
FA: the facial image that collects when the citizen handles I.D.
FC: the fingerprint characteristic masterplate that extracts the fingerprint image FP that when the citizen handles I.D., gathers
IC: the iris feature masterplate that extracts the iris image IR that when the citizen handles I.D., gathers
AC: the face characteristic masterplate that extracts the facial image FA that when the citizen handles I.D., gathers
MC: the fingerprint characteristic masterplate FC that extracts, iris feature masterplate IC and face characteristic masterplate AC are merged the mixed feature templates that the back generates on the characteristic level
M: one of parameter in the fuzzy method for distilling, the set of expression biometric templates comprises: fingerprint characteristic template, iris feature template and face characteristic template etc.
K: the length of the binary code word that one of parameter in the fuzzy method for distilling, expression extract from biometric templates, the k value is a positive integer
T: one of parameter in the fuzzy method for distilling, the error correcting capability of the fuzzy extractive technique of expression, the t value is a positive integer
BC: the length of from composite character template MC, extracting is the binary code word of k
M: the number of cryptographic hash function, m value are positive integer
N: security parameter requires to confirm that the n value is a positive integer according to security of system
Q: prime number, span are interval (0,255)
HV
i: i cryptographic hash function value, i=1,2 ..., m
L: first cryptographic hash function value HV
1Binary representation length, the l value is a positive integer
H
1: cryptographic hash function, H
1: 0,1}
k→ 0,1}
l
H
i: cryptographic hash function, H
i: 0,1}
l→ 0,1}
l, i=2,3 ..., m
E:m * l dimension cryptographic hash function value matrix, E is made up of m cryptographic hash function value
R: Gaussian distribution parameter, r value are positive integer
F:m * l dimension Gaussian distribution matrix
F ': m * l dimension Gaussian mode matrix number
Mod: modulo operation
Mod q: modulus is the modulo operation of q
S:m * l ties up excursion matrix
U:n * l dimension field element matrix,
AI: the image format of homogeneous matrix A
UI: the image format of field element matrix U
SI: the image format of excursion matrix S
PI: be stored in the individual citizens essential information in the I.D. chip
FP ': during authentication, the fingerprint image that the authentication end is gathered
IR ': during authentication, the iris image that the authentication end is gathered
FA ': during authentication, the facial image that the authentication end is gathered
FC ': the fingerprint characteristic masterplate that from the fingerprint image FP ' that the authentication end is gathered, extracts
IC ': the iris feature masterplate that from the iris image IR ' that the authentication end is gathered, extracts
AC ': the face characteristic masterplate that from the facial image FA ' that the authentication end is gathered, extracts
MC ': the fingerprint characteristic masterplate FC ' that extracts, iris feature masterplate IC ' and face characteristic masterplate AC ' are merged the mixed feature templates that the back generates on the characteristic level
BC ': the length of extraction is the binary code word of k from composite character template MC '
HV
i': the cryptographic hash function value that calculates through i cryptographic hash function during authentication, i=1,2 ..., m
E ': m * l dimension cryptographic hash function value matrix
F ": m * l dimension Gaussian mode matrix number
FN:n * l ties up matrix of consequence
Claims (7)
1. one kind based on the I.D. of multi-biological characteristic and possessor's homogeneity authentication method, comprising:
(1) biological attribute data typing step:
When (1a) handling I.D., gather fingerprint, iris and three kinds of biological characteristics of people's face of citizen, obtain citizen's fingerprint image FP, iris image IR and facial image FA;
(1b) from fingerprint image FP, iris image IR and facial image FA, take the fingerprint respectively characteristic masterplate FC, iris feature masterplate IC and face characteristic masterplate AC, and with FC, IC and three kinds of characteristic masterplates of AC composite character masterplate MC that permeates;
(1c) utilize fuzzy method for distilling, from characteristic masterplate MC, extract binary code word BC, and code word BC is mapped as cryptographic hash function value matrix E through m cryptographic hash function;
(1d) set Gaussian distribution matrix F, homogeneous matrix A, and calculate Gaussian mode matrix number F ', field element matrix U and excursion matrix S:
F′=Fmodq,
U=AF′modq,
S=F′-E,
Wherein, q is a prime number, and mod representes modulo operation, and modq representes that modulus is the modulo operation of q;
(1e) convert homogeneous matrix A, field element matrix U to homogeneous matrix image A I, field element matrix image UI, and homogeneous matrix image A I, field element matrix image UI are stored in the population information database;
(1f) convert excursion matrix S to excursion matrix image SI, and excursion matrix image SI is stored in the I.D. chip;
(2) I.D. and possessor's homogeneity authenticating step:
(2a) during authentication, authentication end captured identity card possessor's fingerprint image FP ', iris image IR ' and facial image FA ';
(2b) individual essential information PI in the reading identity card chip and excursion matrix image SI;
(2c) to citizen's fingerprint image FP ', iris image IR ' and facial image FA ' take the fingerprint respectively characteristic masterplate FC ', iris feature masterplate IC ' and face characteristic masterplate AC ', and with FC ', IC ' and three kinds of characteristic masterplates of AC ' composite character masterplate MC ' that permeates;
(2d) utilize fuzzy method for distilling, extraction binary code word BC ' from characteristic masterplate MC ', and code word BC ' is mapped as cryptographic hash function value matrix E ' through m cryptographic hash function;
(2e) convert excursion matrix image SI into excursion matrix S, and according to Hash cipher function value matrix E ' calculating Gaussian mode matrix number F ":
F″=S+E′;
(2f) in population information database, retrieve corresponding homogeneous matrix image A I, field element matrix image UI, and convert homogeneous matrix image A I, field element matrix image UI into homogeneous matrix A, field element matrix U respectively according to individual essential information PI;
(2g) utilize Gaussian mode matrix number F ", result of calculation matrix F N:
FN=U-AF″modq,
Wherein, q is a prime number, and mod representes modulo operation, and modq representes that modulus is the modulo operation of q, and whether judged result matrix F N is full null matrix, if matrix of consequence FN is full null matrix, explains that then I.D. and its possessor have homogeneity; Otherwise I.D. and its possessor do not have homogeneity.
2. according to claim 1 based on the I.D. of multi-biological characteristic and possessor's homogeneity authentication method, the characteristic masterplate FC that from fingerprint image FP, takes the fingerprint in the wherein said step (1b), carry out as follows:
(1b1) fingerprint image FP is carried out the pre-service that the cutting apart of fingerprint image, enhancing and the field of direction are extracted successively;
(1b2) pretreated fingerprint image is carried out the crestal line Refinement operation, extract the position and the directional information of minutiae point;
(1b3) position and the directional information according to minutiae point generates fingerprint characteristic masterplate FC;
3. according to claim 1 based on the I.D. of multi-biological characteristic and possessor's homogeneity authentication method, from iris image IR, extract iris feature masterplate IC in the wherein said step (1b), carry out as follows:
(1b4) iris image IR is strengthened;
(1b5) to the iris image after strengthening carry out successively the burn into iris region of eyelid eyelashes border detection, cut apart and extract;
(1b6) the iris region normalization to extracting uses the Gabor wave filter to extract iris feature, generates iris feature masterplate IC.
4. according to claim 1 based on the I.D. of multi-biological characteristic and possessor's homogeneity authentication method, from facial image FA, extract face characteristic masterplate AC in the wherein said step (1b), carry out as follows:
(1b7) facial image FA is carried out successively the pre-service of brightness rectification, geometric calibration and histogram equalization;
(1b8) to pretreated facial image, utilize the integral projection method to confirm the facial characteristics point, extract the local feature information of facial characteristics point;
(1b9) the local feature information according to facial characteristics point generates face characteristic masterplate AC.
5. according to claim 1 based on the I.D. of multi-biological characteristic and possessor's homogeneity authentication method; Utilize fuzzy method for distilling in the wherein said step (1c); From characteristic masterplate MC, extract binary code word BC; And code word BC is mapped as matrix E through m cryptographic hash function, carry out as follows:
(1c1) select so that (M, k t) are the fuzzy method for distilling of parameter, and from characteristic masterplate MC, extracting length is the binary code word BC of k, and wherein: M is the set of biological characteristic masterplate, and k is an output binary code word length, and t is the error correcting capability of fuzzy method for distilling;
Be that the binary code word BC of k calculates m cryptographic hash function value HV (1c2) by length
1, HV
2..., HV
m:
Wherein, H
1, H
2..., H
mBe m cryptographic hash function, m is a positive integer;
(1c3) according to m the cryptographic hash function value HV that obtains
1, HV
2..., HV
m, calculate cryptographic hash function value matrix E:
6. according to claim 1 based on the I.D. of multi-biological characteristic and possessor's homogeneity authentication method, set the Gaussian distribution matrix F in the wherein said step (1d), carry out as follows:
(1d1) in set of integers
; Select a Gaussian distribution parameter r at random, and confirm the set of m dimension integer vectors
and discrete Gaussian distribution
according to the individual numerical value m of cryptographic hash function
7. according to claim 1 based on the I.D. of multi-biological characteristic and possessor's homogeneity authentication method, set homogeneous matrix A in the wherein said step (1d), carry out as follows:
(1d3) confirm security parameter n, in (0,255) interval, select a prime number q at random, judge whether prime number q is the polynomial expression of n, if carry out step (1d4); Otherwise, picked at random prime number q again;
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210151300.0A CN102722696B (en) | 2012-05-16 | 2012-05-16 | Identity authentication method of identity card and holder based on multi-biological characteristics |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210151300.0A CN102722696B (en) | 2012-05-16 | 2012-05-16 | Identity authentication method of identity card and holder based on multi-biological characteristics |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102722696A true CN102722696A (en) | 2012-10-10 |
CN102722696B CN102722696B (en) | 2014-04-16 |
Family
ID=46948446
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210151300.0A Expired - Fee Related CN102722696B (en) | 2012-05-16 | 2012-05-16 | Identity authentication method of identity card and holder based on multi-biological characteristics |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102722696B (en) |
Cited By (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103699879A (en) * | 2013-12-10 | 2014-04-02 | 柳州译海网络科技有限公司 | Identity authentication device based on biometric information |
CN103886283A (en) * | 2014-03-03 | 2014-06-25 | 天津科技大学 | Method for fusing multi-biometric image information for mobile user and application thereof |
CN104134065A (en) * | 2014-07-11 | 2014-11-05 | 北京航天金盾科技有限公司 | Office business system with face comparison and fingerprint identification functions for notary office |
CN104639546A (en) * | 2014-12-31 | 2015-05-20 | 北京天诚盛业科技有限公司 | Multi-biometric feature comprehensive authentication method, device and system |
WO2015184686A1 (en) * | 2014-06-04 | 2015-12-10 | 中兴通讯股份有限公司 | Method and device for confirming user identity in vtm system |
CN105160315A (en) * | 2015-08-31 | 2015-12-16 | 宇龙计算机通信科技(深圳)有限公司 | Fingerprint verification method and device and terminal |
CN105162606A (en) * | 2015-09-28 | 2015-12-16 | 公安部第一研究所 | Method for generating network mapping document based on entity document of electronic legal identity document |
CN106059753A (en) * | 2016-03-10 | 2016-10-26 | 西京学院 | Novel fingerprint key generation method for digital signature |
WO2017004860A1 (en) * | 2015-07-08 | 2017-01-12 | 宇龙计算机通信科技(深圳)有限公司 | Biological information verification method, biological information verification system, and terminal |
CN106485118A (en) * | 2016-09-19 | 2017-03-08 | 信利光电股份有限公司 | Electronic equipment and its identifying system, decryption method |
CN106485240A (en) * | 2016-10-28 | 2017-03-08 | 南京信息职业技术学院 | System for monitoring state of resident identification card and monitoring method thereof |
CN107426240A (en) * | 2017-08-24 | 2017-12-01 | 中国银行股份有限公司 | Auth method, device and server |
CN107832710A (en) * | 2017-11-13 | 2018-03-23 | 上海聚虹光电科技有限公司 | Iris self-help registration method |
CN108475307A (en) * | 2015-11-13 | 2018-08-31 | 徽章公司 | Public/private key pair biological characteristic authentication system |
CN109145551A (en) * | 2018-06-27 | 2019-01-04 | 珠海宏桥高科技有限公司 | A kind of method and apparatus of quick verification residential identity |
CN109308727A (en) * | 2018-09-07 | 2019-02-05 | 腾讯科技(深圳)有限公司 | Virtual image model generating method, device and storage medium |
CN109522827A (en) * | 2018-10-31 | 2019-03-26 | 维沃移动通信有限公司 | A kind of method, apparatus and terminal device acquiring biological characteristic |
CN110069965A (en) * | 2018-01-24 | 2019-07-30 | 南京机器人研究院有限公司 | A kind of robot personal identification method |
CN110069964A (en) * | 2018-01-24 | 2019-07-30 | 南京机器人研究院有限公司 | A kind of method of robot identification user identity |
CN111414785A (en) * | 2019-01-07 | 2020-07-14 | 财团法人交大思源基金会 | Identification system and identification method |
CN112863593A (en) * | 2021-02-05 | 2021-05-28 | 厦门大学 | Identity identification feature extraction method and system based on skin metagenome data |
CN113312950A (en) * | 2020-09-24 | 2021-08-27 | 一令通(上海)科技有限公司 | Identity authentication method based on face and iris characteristics |
CN113661516A (en) * | 2019-04-12 | 2021-11-16 | 日本电气株式会社 | Information processing apparatus, information processing method, and recording medium |
CN114780769A (en) * | 2022-06-13 | 2022-07-22 | 杭州合众数据技术有限公司 | Personnel checking method based on bloom filter |
CN117240607A (en) * | 2023-11-10 | 2023-12-15 | 北京云尚汇信息技术有限责任公司 | Security authentication method based on security computer |
CN117371048A (en) * | 2023-12-08 | 2024-01-09 | 深圳市研盛芯控电子技术有限公司 | Remote access data processing method, device, equipment and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2437761A (en) * | 2006-05-03 | 2007-11-07 | Qusharat Hussain | Virtual identity and authentication employing a mobile device |
CN101345625A (en) * | 2008-08-15 | 2009-01-14 | 西安电子科技大学 | Remote authentication method based on biological characteristic |
CN101567033A (en) * | 2009-06-03 | 2009-10-28 | 西北工业大学 | Biological authentication method for resisting privacy disclosure |
CN201838011U (en) * | 2010-05-26 | 2011-05-18 | 中国科学院自动化研究所 | Identity authentication equipment based on second-generation ID cards and multimode biological features |
-
2012
- 2012-05-16 CN CN201210151300.0A patent/CN102722696B/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2437761A (en) * | 2006-05-03 | 2007-11-07 | Qusharat Hussain | Virtual identity and authentication employing a mobile device |
CN101345625A (en) * | 2008-08-15 | 2009-01-14 | 西安电子科技大学 | Remote authentication method based on biological characteristic |
CN101567033A (en) * | 2009-06-03 | 2009-10-28 | 西北工业大学 | Biological authentication method for resisting privacy disclosure |
CN201838011U (en) * | 2010-05-26 | 2011-05-18 | 中国科学院自动化研究所 | Identity authentication equipment based on second-generation ID cards and multimode biological features |
Cited By (33)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103699879A (en) * | 2013-12-10 | 2014-04-02 | 柳州译海网络科技有限公司 | Identity authentication device based on biometric information |
CN103886283A (en) * | 2014-03-03 | 2014-06-25 | 天津科技大学 | Method for fusing multi-biometric image information for mobile user and application thereof |
WO2015184686A1 (en) * | 2014-06-04 | 2015-12-10 | 中兴通讯股份有限公司 | Method and device for confirming user identity in vtm system |
CN105224842A (en) * | 2014-06-04 | 2016-01-06 | 中兴通讯股份有限公司 | The method of user identification confirmation and device in a kind of VTM system |
CN105224842B (en) * | 2014-06-04 | 2020-04-28 | 中兴通讯股份有限公司 | Method and device for confirming user identity in VTM system |
CN104134065A (en) * | 2014-07-11 | 2014-11-05 | 北京航天金盾科技有限公司 | Office business system with face comparison and fingerprint identification functions for notary office |
CN104639546A (en) * | 2014-12-31 | 2015-05-20 | 北京天诚盛业科技有限公司 | Multi-biometric feature comprehensive authentication method, device and system |
CN104639546B (en) * | 2014-12-31 | 2019-01-25 | 北京眼神智能科技有限公司 | The methods, devices and systems of multi-biological characteristic inclusive authentication |
WO2017004860A1 (en) * | 2015-07-08 | 2017-01-12 | 宇龙计算机通信科技(深圳)有限公司 | Biological information verification method, biological information verification system, and terminal |
CN105160315A (en) * | 2015-08-31 | 2015-12-16 | 宇龙计算机通信科技(深圳)有限公司 | Fingerprint verification method and device and terminal |
CN105162606A (en) * | 2015-09-28 | 2015-12-16 | 公安部第一研究所 | Method for generating network mapping document based on entity document of electronic legal identity document |
CN108475307A (en) * | 2015-11-13 | 2018-08-31 | 徽章公司 | Public/private key pair biological characteristic authentication system |
CN106059753A (en) * | 2016-03-10 | 2016-10-26 | 西京学院 | Novel fingerprint key generation method for digital signature |
CN106059753B (en) * | 2016-03-10 | 2019-03-26 | 西京学院 | A kind of fingerprint key generation new method for digital signature |
CN106485118A (en) * | 2016-09-19 | 2017-03-08 | 信利光电股份有限公司 | Electronic equipment and its identifying system, decryption method |
CN106485240A (en) * | 2016-10-28 | 2017-03-08 | 南京信息职业技术学院 | System for monitoring state of resident identification card and monitoring method thereof |
CN107426240A (en) * | 2017-08-24 | 2017-12-01 | 中国银行股份有限公司 | Auth method, device and server |
CN107832710A (en) * | 2017-11-13 | 2018-03-23 | 上海聚虹光电科技有限公司 | Iris self-help registration method |
CN110069965A (en) * | 2018-01-24 | 2019-07-30 | 南京机器人研究院有限公司 | A kind of robot personal identification method |
CN110069964A (en) * | 2018-01-24 | 2019-07-30 | 南京机器人研究院有限公司 | A kind of method of robot identification user identity |
CN109145551A (en) * | 2018-06-27 | 2019-01-04 | 珠海宏桥高科技有限公司 | A kind of method and apparatus of quick verification residential identity |
CN109308727A (en) * | 2018-09-07 | 2019-02-05 | 腾讯科技(深圳)有限公司 | Virtual image model generating method, device and storage medium |
CN109522827A (en) * | 2018-10-31 | 2019-03-26 | 维沃移动通信有限公司 | A kind of method, apparatus and terminal device acquiring biological characteristic |
CN111414785A (en) * | 2019-01-07 | 2020-07-14 | 财团法人交大思源基金会 | Identification system and identification method |
CN113661516A (en) * | 2019-04-12 | 2021-11-16 | 日本电气株式会社 | Information processing apparatus, information processing method, and recording medium |
CN113312950A (en) * | 2020-09-24 | 2021-08-27 | 一令通(上海)科技有限公司 | Identity authentication method based on face and iris characteristics |
CN112863593A (en) * | 2021-02-05 | 2021-05-28 | 厦门大学 | Identity identification feature extraction method and system based on skin metagenome data |
CN112863593B (en) * | 2021-02-05 | 2024-02-20 | 厦门大学 | Identification feature extraction method and system based on skin metagenome data |
CN114780769A (en) * | 2022-06-13 | 2022-07-22 | 杭州合众数据技术有限公司 | Personnel checking method based on bloom filter |
CN117240607A (en) * | 2023-11-10 | 2023-12-15 | 北京云尚汇信息技术有限责任公司 | Security authentication method based on security computer |
CN117240607B (en) * | 2023-11-10 | 2024-02-13 | 北京云尚汇信息技术有限责任公司 | Security authentication method based on security computer |
CN117371048A (en) * | 2023-12-08 | 2024-01-09 | 深圳市研盛芯控电子技术有限公司 | Remote access data processing method, device, equipment and storage medium |
CN117371048B (en) * | 2023-12-08 | 2024-03-29 | 深圳市研盛芯控电子技术有限公司 | Remote access data processing method, device, equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN102722696B (en) | 2014-04-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102722696B (en) | Identity authentication method of identity card and holder based on multi-biological characteristics | |
Joseph et al. | Retracted article: a multimodal biometric authentication scheme based on feature fusion for improving security in cloud environment | |
Nandakumar et al. | Fingerprint-based fuzzy vault: Implementation and performance | |
Uludag et al. | Securing fingerprint template: Fuzzy vault with helper data | |
Gaddam et al. | Efficient Cancelable Biometric Key Generation Scheme for Cryptography. | |
CN1860724B (en) | Method for identification | |
CN106936586A (en) | A kind of biological secret key extracting method based on fingerprint bit string and Error Correction of Coding | |
Yang et al. | Generating secure cancelable fingerprint templates using local and global features | |
Ali et al. | Fingerprint shell construction with prominent minutiae points | |
Murugesh | Advanced biometric ATM machine with AES 256 and steganography implementation | |
Saraswathi et al. | Retinal biometrics based authentication and key exchange system | |
Brindha | Biometric template security using fuzzy vault | |
Conti et al. | Fingerprint traits and RSA algorithm fusion technique | |
Balakumar et al. | Secure biometric key generation scheme for cryptography using combined biometric features of fingerprint and iris | |
CN104462926A (en) | Intelligent card identity recognition method and system | |
Sowkarthika et al. | Securing iris and fingerprint templates using fuzzy vault and symmetric algorithm | |
Islam et al. | Technology review: image enhancement, feature extraction and template protection of a fingerprint authentication system | |
CN102413148A (en) | Biological characteristic remote authentication method based on visual codes | |
Selwal et al. | Performance analysis of template data security and protection in biometric systems | |
Sinduja et al. | Sheltered iris attestation by means of visual cryptography (sia-vc) | |
EP3093793A1 (en) | Fingerprint identification method and device using same | |
Bayly et al. | Fractional biometrics: safeguarding privacy in biometric applications | |
Praseetha et al. | Novel Web Service Based Fingerprint Identification Using Steganography and Xml Mining | |
Meenakshi et al. | Retina and Iris based multimodal biometric Fuzzy Vault | |
Cimato et al. | Biometrics and privacy |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20140416 Termination date: 20190516 |
|
CF01 | Termination of patent right due to non-payment of annual fee |