CN102722696B - Identity authentication method of identity card and holder based on multi-biological characteristics - Google Patents

Identity authentication method of identity card and holder based on multi-biological characteristics Download PDF

Info

Publication number
CN102722696B
CN102722696B CN201210151300.0A CN201210151300A CN102722696B CN 102722696 B CN102722696 B CN 102722696B CN 201210151300 A CN201210151300 A CN 201210151300A CN 102722696 B CN102722696 B CN 102722696B
Authority
CN
China
Prior art keywords
image
matrix
masterplate
iris
feature
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201210151300.0A
Other languages
Chinese (zh)
Other versions
CN102722696A (en
Inventor
庞辽军
田杰
曹凯
练春锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xidian University
Original Assignee
Xidian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xidian University filed Critical Xidian University
Priority to CN201210151300.0A priority Critical patent/CN102722696B/en
Publication of CN102722696A publication Critical patent/CN102722696A/en
Application granted granted Critical
Publication of CN102722696B publication Critical patent/CN102722696B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention provides an identity authentication method of an identity card and a holder based on multi-biological characteristics. The invention mainly assists in solving potential safety hazard problems existing in a cross-application process in the prior art. An embodiment comprises the steps that: when identity card registration transaction is carried out, characteristics of fingerprints, iris information and face image of a citizen are acquired; a uniform matrix image AI, a domain element matrix image UI and an offset matrix image SI are acquired and saved respectively in a population information database and an identity card chip; when authentication is carried out, an authentication terminal acquires characteristics of the fingerprints, the iris information and the face image of an identity card holder; the uniform matrix image AI and the domain element matrix image UI are searched for in the population information database based on personal basic information PI; and identity authentication of the identity card and the holder is carried out by using three biological characteristics of the fingerprints, the iris information and the face image, the uniform matrix image AI, the domain element matrix image UI and the offset matrix image SI. According to the invention, an authentication accuracy rate and overall authentication system safety are improved and potential safety hazard existing in the cross-application process is effectively reduced.

Description

I.D. based on multi-biological characteristic and possessor's homogeneity authentication method
Technical field
The invention belongs to field of information security technology, relate to the physical identity authentication method of multi-biological characteristic I.D., can be used for carrying out quickly and accurately the establishing identity of I.D. possessor and I.D., effectively protect the personal secrets of biological characteristic.
Background technology
For can be by the machine-readable establishing identity that carries out quickly and accurately I.D. possessor and I.D., maintain state security and social stability, effectively take precautions against the generation of criminal offences such as falsely using other people resident identification card and forgery, change resident identification card, the 23 meeting of the Standing Committee of the National People's Congress considered and adopted < < People's Republic of China (PRC) residential identity demonstration amendment (draft) > >.The further requirement of draft, neck is got, is changed in citizen's application, the resident identification card of applying for another, and should register finger print information.The finger print information of registering in resident identification card; it is digitized fingerprint feature point; can not be reduced into fingerprint image; although this can effectively protect citizen's finger print information safety to a certain extent; but the widespread use along with fingerprint characteristic; illegal intention person needn't reduce fingerprint image and only by the digitizing fingerprint characteristic dot information stealing, just can in other fingerprint characteristic encryption systems, successfully pretend to be validated user, obtains unlawful interests, causes great information security events.For example: in Fuzzy Vault fingerprint encryption system, according to digitized fingerprint characteristic dot information, just can from Vault, recover the polynomial expression of initial structure, then obtain user's key information.
Document " ID authentication device based on second generation identity card and multi-modal biological characteristic, Chinese invention patent, CN201838011 " discloses a kind of ID authentication device based on second generation identity card and multi-modal biological characteristic.Although this patent has designed the authenticating device based on fingerprint, iris, people's face and China second-generation identity card, but only registration and the identifying procedure of these equipment used in preliminary explanation, there is no concrete authentication method, and during its registration, the biological characteristic of typing does not read from I.D., effectively I.D. possessor and I.D. are not combined, can not be accurate and effective I.D. possessor and I.D. are carried out to establishing identity.
Document " the Certification of Second Generation authentication system research based on fingerprint and recognition of face, digital technology and application, o. 11th in 2011 " discloses a kind of Certification of Second Generation authentication system based on fingerprint and recognition of face.According to the feature of the self-contained lawful bearer's fingerprint of No.2 residence card and image information, the document proposes: in conjunction with fingerprint and face recognition technology, realize the multifactor authentication system with greater security.This system can by by Real-time Collection to user's fingerprint, people's face information and fingerprint, the image information being stored in Certification of Second Generation contrast, thereby whether when realizing identity verification card basic document, completing user is holder in due course's checking.Although this system effectively combines I.D. possessor and I.D., and I.D. possessor and I.D. have been carried out to establishing identity, and more single biological characteristic authentication having good discrimination, there is following defect in the method:
First, do not explicitly point out stored biological characteristic type, storage is digitized biological characteristic dot information or original biometric image.The biological characteristic type of storage is different, and the leakage of information degree causing is different.
Secondly, do not consider biological characteristic Privacy Protection.Once biological characteristic is stolen, just can recover original biological information or by correlation attack, obtain the rights and interests of corresponding validated user in other biological characteristic application system, cause the leakage of user privacy information and relevant heavy economic losses, serious harm national security and social stability.
Finally; because used fingerprint and people's face information are deposited in respectively in I.D.; therefore need respectively fingerprint and people's face information to be carried out to safeguard protection to guarantee the personal secrets of these biological informations; this has increased the expense of biological characteristic secret protection; the security of whole Verification System is had higher requirement, because the leakage of any information in fingerprint and people's face information all can cause the reduction of whole system security simultaneously.
Summary of the invention
The object of the invention is to the deficiency for above-mentioned prior art; a kind of testimony of a witness homogeneity authentication method based on multi-biological characteristic I.D. is proposed; to guarantee when making full use of the contained information of I.D.; further improve the homogeneity authentication discrimination of I.D. possessor and its I.D.; reduce the biological characteristic number of objects that will protect simultaneously; the protection that improves citizen's biological characteristic private ownership, is reduced in the potential safety hazard existing in cross-application process.
The technical thought that realizes the object of the invention is, by the data to after fingerprint, iris, three kinds of biological characteristic computings of people's face and the data that are stored in population information database, carry out matrix operation, whether the result matrix is that full null matrix judges whether I.D. possessor and its I.D. have homogeneity, thereby effectively reduces falsely using and forging of I.D. when improving biological attribute data security.Its particular content comprises as follows:
(1) biological attribute data typing step:
(1a) while handling I.D., gather fingerprint, iris and three kinds of biological characteristics of people's face of citizen, obtain citizen's fingerprint image FP, iris image IR and facial image FA;
(1b) from fingerprint image FP, iris image IR and facial image FA, take the fingerprint respectively feature masterplate FC, iris feature masterplate IC and face characteristic masterplate AC, and by FC, IC and tri-kinds of feature masterplates of AC composite character masterplate MC that permeates;
(1c) utilize fuzzy extracting method, from feature masterplate MC, extract binary code word BC, and by m cryptographic Hash function, code word BC is mapped as to cryptographic Hash function value matrix E;
(1d) set Gaussian distribution matrix F, homogeneous matrix A, and calculate Gaussian mode matrix number F ', field element matrix U and excursion matrix S:
F′=Fmodq,
U=AF′modq,
S=F′-E,
Wherein, q is prime number, and mod represents modulo operation, and modq represents that modulus is the modulo operation of q;
(1e) homogeneous matrix A, field element matrix U are converted to homogeneous matrix image A I, field element matrix image UI, and homogeneous matrix image A I, field element matrix image UI are stored in population information database;
(1f) excursion matrix S is converted to excursion matrix image SI, and excursion matrix image SI is stored in I.D. chip;
(2) I.D. and possessor's homogeneity authenticating step:
(2a) while authenticating, certification end captured identity card possessor's fingerprint image FP ', iris image IR ' and facial image FA ';
(2b) the individual essential information PI in reading identity card chip and excursion matrix image SI;
(2c) to citizen's fingerprint image FP ', iris image IR ' and facial image FA ' take the fingerprint respectively feature masterplate FC ', iris feature masterplate IC ' and face characteristic masterplate AC ', and by FC ', IC ' and tri-kinds of feature masterplates of AC ' composite character masterplate MC ' that permeates;
(2d) utilize fuzzy extracting method, extraction binary code word BC ' from feature masterplate MC ', and by m cryptographic Hash function, code word BC ' is mapped as to cryptographic Hash function value matrix E ';
(2e) excursion matrix image SI is converted to excursion matrix S, and according to Hash cipher function value matrix E ' calculating Gaussian mode matrix number F ":
F″=S+E′;
(2f) according to individual essential information PI, in population information database, retrieve corresponding homogeneous matrix image A I, field element matrix image UI, and homogeneous matrix image A I, field element matrix image UI are converted to respectively to homogeneous matrix A, field element matrix U;
(2g) utilize Gaussian mode matrix number F ", result of calculation matrix F N:
FN=U-AF″modq,
Wherein, q is prime number, and mod represents modulo operation, and modq represents that modulus is the modulo operation of q, and whether judged result matrix F N is full null matrix, if matrix of consequence FN is full null matrix, illustrates that I.D. and its possessor have homogeneity; Otherwise I.D. and its possessor do not have homogeneity.
Compared with prior art, tool of the present invention has the following advantages:
1, the present invention selects three kinds of biological characteristics to identify authentication, compare with one or both living things feature recognition of use, greatly reduce false acceptance rate and false rejection rate, further promoted the accuracy rate of authentication, thereby effectively prevented the forgery of resident identification card or counterfeit.
2, the present invention is merged three kinds of biological characteristics at feature level, compare with other method that these three kinds of biological characteristics of same selection are identified, reduced the biological information number needing protection, effectively raise the security of biological characteristic privacy and Verification System integral body, reduce the expense of Verification System aspect safeguard protection, improved the effective rate of utilization of resource;
3, the present invention only stores homogeneous matrix image A I, field element matrix image UI and excursion matrix image SI, even if assailant gets image A I, UI and SI also cannot recover original biological information, more impossible other rights and interests of stealing validated user by cross-application.Therefore, the present invention, in the biological characteristic personal secrets protection of strengthening citizen, is effectively reduced in the potential safety hazard existing in cross-application process.
Accompanying drawing explanation
Fig. 1 the present invention is based on the I.D. of multi-biological characteristic and possessor's homogeneity authentication schematic diagram;
Fig. 2 is that in the present invention, certification end specifically authenticates sub-process figure.
Embodiment
Below in conjunction with accompanying drawing, describe the idiographic flow of a complete I.D. based on multi-biological characteristic and possessor's homogeneity authentication method in detail.
With reference to Fig. 1, the present invention includes: citizen's biological attribute data typing stage during certificates handling and I.D. and possessor's homogeneity authentication phase, wherein, I.D. and possessor's homogeneity authentication phase comprises: the homogeneity that reads and carry out according to the storage information authentication to the collection of I.D. possessor biological characteristic, ID (identity number) card information.Concrete steps are as follows:
One. the biological attribute data typing stage
Step 1: when citizen handles I.D., by I.D., the department that handles gathers citizen's fingerprint, iris and three kinds of biological characteristics of people's face respectively by fingerprint, iris and people's face Acquisition Instrument, obtains citizen's fingerprint image FP, iris image IR and facial image FA.
Step 2: from fingerprint image FP, the iris image IR and facial image FA that collect, the feature that takes the fingerprint respectively masterplate FC, iris feature masterplate IC and face characteristic masterplate AC, and by FC, IC and tri-kinds of feature masterplates of AC composite character masterplate MC that permeates:
2a) fingerprint image FP is carried out to the pretreatment operation that the cutting apart of image, enhancing and the field of direction are extracted successively, again pretreated fingerprint image is carried out to crestal line refinement, extract position and the directional information of minutiae point, and minutiae point position and the directional information extracted are quantized, generate fingerprint characteristic masterplate FC, the detailed step of quantification is referring to document " Generating revocable fingerprint template using polar grid based 3-tuple quantization technique.2011IEEE 54 thinternational Midwest Symposium on Circuits and Systems (MWSCAS), pp:1-4,2011 ";
2b) iris image IR is strengthened, again to the iris image after strengthening carry out successively the burn into iris region of eyelid eyelashes Boundary Detection, cut apart and extract, the iris region extracting is normalized to operation, and use in the iris image of Gabor wave filter from processing and extract iris feature information, according to the iris feature Information generation iris feature masterplate IC extracting;
2c) facial image FA is carried out to the pretreatment operation of brightness rectification, geometric calibration and histogram equalization successively, utilize integral projection method from pretreated facial image, to determine face feature point, extract the local feature information of face feature point, according to the local feature Information generation face characteristic masterplate AC of face feature point;
2d) utilize the biological characteristic fusion method on feature level, by fingerprint characteristic masterplate FC, iris feature masterplate IC and tri-kinds of masterplates of face characteristic masterplate AC composite character masterplate MC that permeates, the detailed step of the biological characteristic fusion method on feature level is referring to document " Multibiometric Cryptosystems Based on Feature-Level Fusion.IEEE Transactions on Information Forensics and Security; vol.7; pp:255-268,2012.
Step 3: extract binary code word BC from feature masterplate MC, and by m cryptographic Hash function, code word BC is mapped as to cryptographic Hash function value matrix E:
3a) according to fuzzy extracting method performance, setting the set of biological characteristic masterplate is that M, binary keys length are that k, error correcting capability are t, selection is with (M, k, t) be the fuzzy extracting method of parameter, referring to document " Fuzzy Extractors:How to Generate Strong Keys from Biometrics and Other Noisy Data.Computer Science, vol.3027; pp:523-540,2004 ";
3b) utilize selected with (M, k, t) be parameter fuzzy extracting method, from feature masterplate MC, extract the long binary code word BC of k, the detailed step extracting is referring to document " Fuzzy Extractors:How to Generate Strong Keys from Biometrics and Other Noisy Data.Computer Science; vol.3027, pp:523-540,2004 ";
3c) according to m cryptographic Hash function H 1, H 2..., H mbinary code word BC with extracting, calculates respectively cryptographic Hash HV 1, HV 2..., HV m:
Choosing referring to document " Trapdoors for hard lattices and new cryptographic constructions.In Proc.40 of parameter m thaCM SymP.on Theory of Computing (STOC), pp:197-206,2008 ";
3d) according to the cryptographic Hash function value HV obtaining 1, HV 2..., HV m, calculate cryptographic Hash function value matrix E:
Step 4: set Gaussian distribution matrix F, homogeneous matrix A, calculate Gaussian mode matrix number F ', field element matrix U and excursion matrix S:
4a) determine security parameter n, from (0,255) the interval interior random prime number q of selecting, judge whether prime number q is the polynomial expression of n, if so, according to selected prime number q, determine q unit integer field
Figure BDA00001646426700072
and at q unit integer field
Figure BDA00001646426700073
in random n * m dimension homogeneous matrix A that generates,
Figure BDA00001646426700074
otherwise, again choose at random prime number q; Security parameter n and q unit integer field
Figure BDA00001646426700075
determine, referring to document " Trapdoors for hard lattices and new cryptographic constructions.In Proc.40 thaCM SymP.on Theory of Computing (STOC), pp:197-206,2008 ";
4b) at set of integers
Figure BDA00001646426700076
in, select at random a Gaussian Distribution Parameters r, and determine the set of m dimension integer vectors according to the individual numerical value m of cryptographic Hash function
Figure BDA00001646426700077
with discrete Gaussian distribution
Figure BDA00001646426700078
according to first cryptographic Hash function value HV 1binary representation length l, call l SampleD method from discrete Gaussian distribution
Figure BDA00001646426700079
in choose m * l dimension Gaussian distribution matrix F,
Figure BDA000016464267000710
The detailed step of SampleD method is referring to document " Trapdoors for hard lattices and new cryptographic constructions.In Proc.40 thaCM SymP.on Theory of Computing (STOC), pp:197-206,2008 ";
4c) according to Gaussian distribution matrix F, calculate Gaussian mode matrix number F ':
F′=Fmodq,
Wherein, mod represents modulo operation, and modq represents that modulus is the modulo operation of q;
4d) according to homogeneous matrix A and Gaussian mode matrix number F ', computational fields matrix of elements U,
U=AF′modq;
4e) according to Gaussian mode matrix number F ' and cryptographic Hash function value matrix E, calculate excursion matrix S,
S=F′-E。
Step 5: homogeneous matrix A, field element matrix U are carried out respectively to image conversion and process operation: each element in homogeneous matrix A, according to the gray level of image successively conversion imaging prime information, is obtained to homogeneous matrix image A I; Each element in field element matrix U, according to the gray level of image successively conversion imaging prime information, is obtained to field element matrix image UI; Again homogeneous matrix image A I, field element matrix image UI are stored in population information database.
Step 6: excursion matrix S is carried out to image conversion and process operation, soon each element in excursion matrix S, according to the gray level of image successively conversion imaging prime information, obtains excursion matrix image SI, then excursion matrix image SI is stored in I.D. chip.
Two. I.D. and possessor's homogeneity authentication phase
With reference to Fig. 2, the homogeneity authenticating step in this stage is as follows:
Step 7: during authentication, fingerprint, iris and people's face Acquisition Instrument captured identity card possessor's fingerprint image FP ', iris image IR ' and facial image FA ' used respectively in certification end.
Step 8: certification end utilizes identity card reader, the individual essential information PI in reading identity card chip and excursion matrix image SI.
Step 9: certification end is to citizen's fingerprint image FP ', iris image IR ' and facial image FA ' take the fingerprint respectively feature masterplate FC ', iris feature masterplate IC ' and face characteristic masterplate AC ', and by FC ', IC ' and tri-kinds of feature masterplates of AC ' composite character masterplate MC ' that permeates:
9a) fingerprint image FP ' is carried out to the pretreatment operation that the cutting apart of image, enhancing and the field of direction are extracted successively, again pretreated fingerprint image is carried out to crestal line refinement, extract position and the directional information of minutiae point, and minutiae point position and the directional information extracted are quantized, generate fingerprint characteristic masterplate FC ', the detailed step of quantification is referring to document " Generating revocable fingerprint template using polar grid based 3-tuple quantization technique.2011IEEE 54 thinternational Midwest Symposium on Circuits and Systems (MWSCAS), pp:1-4,2011 ";
9b) iris image IR ' is strengthened, again to the iris image after strengthening carry out successively the burn into iris region of eyelid eyelashes Boundary Detection, cut apart and extract, the iris region extracting is normalized to operation, and use in the iris image of Gabor wave filter from processing and extract iris feature information, according to the iris feature Information generation iris feature masterplate IC ' extracting;
9c) facial image FA ' is carried out to the pretreatment operation of brightness rectification, geometric calibration and histogram equalization successively, utilize integral projection method from pretreated facial image, to determine face feature point, extract the local feature information of face feature point, according to the local feature Information generation face characteristic masterplate AC ' of face feature point;
9d) utilize the biological characteristic fusion method on feature level, by fingerprint characteristic masterplate FC ', iris feature masterplate IC ' and tri-kinds of masterplates of face characteristic masterplate AC ' composite character masterplate MC ' that permeates.The detailed step of the biological characteristic fusion method on feature level is referring to document " Multibiometric Cryptosystems Based on Feature-Level Fusion.IEEE Transactions on Information Forensics and Security; vol.7; pp:255-268,2012.
Step 10: utilize fuzzy extracting method, extraction binary code word BC ' from feature masterplate MC ', and by m cryptographic Hash function, code word BC ' is mapped as to cryptographic Hash function value matrix E ':
10a) utilize step 3 selected with (M, k, t) be the fuzzy extracting method of parameter, the long binary code word BC ' of extraction k from feature masterplate MC ', the detailed step extracting is referring to document " Fuzzy Extractors:How to Generate Strong Keys from Biometrics and Other Noisy Data.Computer Science; vol.3027, pp:523-540,2004 ";
10b) according to m cryptographic Hash function H 1, H 2..., H mbinary code word BC ' with extracting, calculates respectively cryptographic Hash HV 1', HV 2' ..., HV m':
Figure BDA00001646426700091
10c) according to the cryptographic Hash function value HV obtaining 1', HV 2' ..., HV m', calculate cryptographic Hash function value matrix E ':
Step 11: excursion matrix image SI is read according to the matrix-style of image, obtain excursion matrix S, and according to Hash cipher function value matrix E ' calculating Gaussian mode matrix number F ":
F″=S+E′。
Step 12: retrieve corresponding homogeneous matrix image A I, field element matrix image UI according to individual essential information PI in population information database, and homogeneous matrix image A I, field element matrix image UI are read according to the matrix-style of image respectively, read the homogeneous matrix A corresponding with homogeneous matrix image A I, field element matrix image UI, field element matrix U.
Step 13: utilize Gaussian mode matrix number F ", result of calculation matrix F N:
FN=U-AF″modq,
Wherein, q is prime number, and mod represents modulo operation, and modq represents that modulus is the modulo operation of q, and whether judged result matrix F N is full null matrix, if matrix of consequence FN is full null matrix, illustrates that I.D. and its possessor have homogeneity; Otherwise I.D. and its possessor do not have homogeneity.
By above 13 steps, I.D. based on multi-biological characteristic and possessor's homogeneity authentication method have been realized.
I.D. based on multi-biological characteristic of the present invention and possessor's homogeneity authentication method are not limited in the description in instructions and embodiment.Within the spirit and principles in the present invention all, any modification of making, equal replacement, improvement etc., within being all included in claim scope of the present invention.Explanation of nouns:
FP: the fingerprint image collecting when citizen handles I.D.
IR: the iris image collecting when citizen handles I.D.
FA: the facial image collecting when citizen handles I.D.
FC: the fingerprint characteristic masterplate extracting the fingerprint image FP gathering when citizen handles I.D.
IC: the iris feature masterplate extracting the iris image IR gathering when citizen handles I.D.
AC: the face characteristic masterplate extracting the facial image FA gathering when citizen handles I.D.
MC: the fingerprint characteristic masterplate FC, the iris feature masterplate IC that extract and face characteristic masterplate AC are merged to the rear mixed feature templates generating on feature level
M: one of parameter in fuzzy extracting method, represent biometric templates set, comprising: fingerprint characteristic template, iris feature template and skin detection etc.
K: one of parameter in fuzzy extracting method, the length of the binary code word that expression extracts from biometric templates, k value is positive integer
T: one of parameter in fuzzy extracting method, represent the error correcting capability of fuzzy extractive technique, t value is positive integer
BC: the binary code word that the length of extracting from composite character template MC is k
M: the number of cryptographic Hash function, m value is positive integer
N: security parameter, according to security of system, require to determine, n value is positive integer
Q: prime number, span is interval (0,255)
HV i: i cryptographic Hash function value, i=1,2 ..., m
L: first cryptographic Hash function value HV 1binary representation length, l value is positive integer
H 1: cryptographic Hash function, H 1: { 0,1} k→ { 0,1} l
H i: cryptographic Hash function, H i: { 0,1} l→ { 0,1} l, i=2,3 ..., m
E:m * l dimension cryptographic Hash function value matrix, E is comprised of m cryptographic Hash function value
Figure BDA00001646426700111
: set of integers
: q unit integer field
Figure BDA00001646426700113
: m * l ties up set of matrices, and each element in matrix exists
Figure BDA00001646426700114
in
Figure BDA00001646426700115
: n * m ties up set of matrices, and each element in matrix exists in
: n * l ties up set of matrices, and each element in matrix exists
Figure BDA00001646426700118
in
A:n * m ties up homogeneous matrix,
R: Gaussian Distribution Parameters, r value is positive integer
Figure BDA000016464267001110
: m the vectorial set that integer forms
Figure BDA000016464267001111
: according to parameter r and
Figure BDA000016464267001112
definite Gaussian distribution
F:m * l dimension Gaussian distribution matrix
F ': m * l dimension Gaussian mode matrix number
Mod: modulo operation
Mod q: the modulo operation that modulus is q
S:m * l ties up excursion matrix
U:n * l dimension field element matrix,
Figure BDA00001646426700121
AI: the image format of homogeneous matrix A
UI: the image format of field element matrix U
SI: the image format of excursion matrix S
PI: be stored in the individual citizens essential information in I.D. chip
FP ': during authentication, the fingerprint image that certification end gathers
IR ': during authentication, the iris image that certification end gathers
FA ': during authentication, the facial image that certification end gathers
FC ': the fingerprint characteristic masterplate extracting the fingerprint image FP ' gathering from certification end
IC ': the iris feature masterplate extracting the iris image IR ' gathering from certification end
AC ': the face characteristic masterplate extracting the facial image FA ' gathering from certification end
MC ': the fingerprint characteristic masterplate FC ', the iris feature masterplate IC ' that extract and face characteristic masterplate AC ' are merged to the rear mixed feature templates generating on feature level
BC ': the binary code word that the length of extraction is k from composite character template MC '
HV i': the cryptographic Hash function value calculating by i cryptographic Hash function during authentication, i=1,2 ..., m
E ': m * l dimension cryptographic Hash function value matrix
F ": m * l dimension Gaussian mode matrix number
FN:n * l ties up matrix of consequence

Claims (4)

1. the I.D. based on multi-biological characteristic and possessor's a homogeneity authentication method, comprising:
(1) biological attribute data typing step:
(1a) while handling I.D., gather fingerprint, iris and three kinds of biological characteristics of people's face of citizen, obtain citizen's fingerprint image FP, iris image IR and facial image FA;
(1b) from fingerprint image FP, iris image IR and facial image FA, take the fingerprint respectively feature masterplate FC, iris feature masterplate IC and face characteristic masterplate AC, and by FC, IC and tri-kinds of feature masterplates of AC composite character masterplate MC that permeates;
(1c) utilize fuzzy extracting method, from feature masterplate MC, extract binary code word BC, and by m cryptographic Hash function, code word BC is mapped as to cryptographic Hash function value matrix E;
(1d) set Gaussian distribution matrix F, homogeneous matrix A, carry out as follows:
(1d1) at set of integers
Figure FDA0000409704900000011
in, select at random a Gaussian Distribution Parameters r, and determine the set of m dimension integer vectors according to the individual numerical value m of cryptographic Hash function with discrete Gaussian distribution
Figure FDA0000409704900000013
(1d2) according to first cryptographic Hash function value HV 1binary representation length l, call l SampleD method from discrete Gaussian distribution in choose Gaussian distribution matrix F;
(1d3) determine security parameter n, from (0,255) the interval interior random prime number q of selecting, judge that whether prime number q is the polynomial expression of n, if so, carries out step (1d4); Otherwise, again choose at random prime number q;
(1d4), according to selected prime number q, determine q unit integer field
Figure FDA0000409704900000015
and at q unit integer field
Figure FDA0000409704900000016
in the random homogeneous matrix A that generates:
(1e) calculate Gaussian mode matrix number F ', field element matrix U and excursion matrix S:
F′=Fmodq,
U=AF′modq,
S=F′-E,
Wherein, q is prime number, and mod represents modulo operation, and modq represents that modulus is the modulo operation of q;
(1f) homogeneous matrix A, field element matrix U are converted to homogeneous matrix image A I, field element matrix image UI, and homogeneous matrix image A I, field element matrix image UI are stored in population information database;
(1g) excursion matrix S is converted to excursion matrix image SI, and excursion matrix image SI is stored in I.D. chip;
(2) I.D. and possessor's homogeneity authenticating step:
(2a) while authenticating, certification end captured identity card possessor's fingerprint image FP ', iris image IR ' and facial image FA ';
(2b) the individual essential information PI in reading identity card chip and excursion matrix image SI;
(2c) to citizen's fingerprint image FP ', iris image IR ' and facial image FA ' take the fingerprint respectively feature masterplate FC ', iris feature masterplate IC ' and face characteristic masterplate AC ', and by FC ', IC ' and tri-kinds of feature masterplates of AC ' composite character masterplate MC ' that permeates;
(2d) utilize fuzzy extracting method, extraction binary code word BC ' from feature masterplate MC ', and by m cryptographic Hash function, code word BC ' is mapped as to cryptographic Hash function value matrix E ';
(2e) excursion matrix image SI is converted to excursion matrix S, and according to Hash cipher function value matrix E ' calculating Gaussian mode matrix number F ' ':
F′′=S+E′;
(2f) according to individual essential information PI, in population information database, retrieve corresponding homogeneous matrix image A I, field element matrix image UI, and homogeneous matrix image A I, field element matrix image UI are converted to respectively to homogeneous matrix A, field element matrix U;
(2g) utilize Gaussian mode matrix number F ' ', result of calculation matrix F N:
FN=U-AF′′modq,
Wherein, q is prime number, and mod represents modulo operation, and modq represents that modulus is the modulo operation of q, and whether judged result matrix F N is full null matrix, if matrix of consequence FN is full null matrix, illustrates that I.D. and its possessor have homogeneity; Otherwise I.D. and its possessor do not have homogeneity.
2. I.D. based on multi-biological characteristic according to claim 1 and possessor's homogeneity authentication method, the feature masterplate FC that takes the fingerprint from fingerprint image FP in wherein said step (1b), carries out as follows:
(1b1) fingerprint image FP is carried out to the pre-service that the cutting apart of fingerprint image, enhancing and the field of direction are extracted successively;
(1b2) pretreated fingerprint image is carried out to crestal line Refinement operation, extract position and the directional information of minutiae point;
(1b3) according to the position of minutiae point and directional information, generate fingerprint characteristic masterplate FC.
3. I.D. based on multi-biological characteristic according to claim 1 and possessor's homogeneity authentication method extract iris feature masterplate IC from iris image IR in wherein said step (1b), carry out as follows:
(1b4) iris image IR is strengthened;
(1b5) to the iris image after strengthening carry out successively the burn into iris region of eyelid eyelashes Boundary Detection, cut apart and extract;
(1b6) to the iris region normalization of extracting, use Gabor wave filter to extract iris feature, generate iris feature masterplate IC.
4. I.D. based on multi-biological characteristic according to claim 1 and possessor's homogeneity authentication method extract face characteristic masterplate AC from facial image FA in wherein said step (1b), carry out as follows:
(1b7) facial image FA is carried out to the pre-service of brightness rectification, geometric calibration and histogram equalization successively;
(1b8) to pretreated facial image, utilize integral projection method to determine face feature point, extract the local feature information of face feature point;
(1b9) according to the local feature Information generation face characteristic masterplate AC of face feature point.
CN201210151300.0A 2012-05-16 2012-05-16 Identity authentication method of identity card and holder based on multi-biological characteristics Expired - Fee Related CN102722696B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210151300.0A CN102722696B (en) 2012-05-16 2012-05-16 Identity authentication method of identity card and holder based on multi-biological characteristics

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210151300.0A CN102722696B (en) 2012-05-16 2012-05-16 Identity authentication method of identity card and holder based on multi-biological characteristics

Publications (2)

Publication Number Publication Date
CN102722696A CN102722696A (en) 2012-10-10
CN102722696B true CN102722696B (en) 2014-04-16

Family

ID=46948446

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210151300.0A Expired - Fee Related CN102722696B (en) 2012-05-16 2012-05-16 Identity authentication method of identity card and holder based on multi-biological characteristics

Country Status (1)

Country Link
CN (1) CN102722696B (en)

Families Citing this family (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103699879A (en) * 2013-12-10 2014-04-02 柳州译海网络科技有限公司 Identity authentication device based on biometric information
CN103886283A (en) * 2014-03-03 2014-06-25 天津科技大学 Method for fusing multi-biometric image information for mobile user and application thereof
CN105224842B (en) * 2014-06-04 2020-04-28 中兴通讯股份有限公司 Method and device for confirming user identity in VTM system
CN104134065A (en) * 2014-07-11 2014-11-05 北京航天金盾科技有限公司 Office business system with face comparison and fingerprint identification functions for notary office
CN104639546B (en) * 2014-12-31 2019-01-25 北京眼神智能科技有限公司 The methods, devices and systems of multi-biological characteristic inclusive authentication
CN105608355A (en) * 2015-07-08 2016-05-25 宇龙计算机通信科技(深圳)有限公司 Biological information verification method, biological information verification system and terminal
CN105160315A (en) * 2015-08-31 2015-12-16 宇龙计算机通信科技(深圳)有限公司 Fingerprint verification method and device and terminal
CN105162606B (en) * 2015-09-28 2017-06-16 公安部第一研究所 A kind of method based on electronic legislative identity certificate entity card generation network mapping certificate
JP7421766B2 (en) * 2015-11-13 2024-01-25 バッジ インコーポレイテッド Public key/private key biometric authentication system
CN106059753B (en) * 2016-03-10 2019-03-26 西京学院 A kind of fingerprint key generation new method for digital signature
CN106485118A (en) * 2016-09-19 2017-03-08 信利光电股份有限公司 Electronic equipment and its identifying system, decryption method
CN106485240A (en) * 2016-10-28 2017-03-08 南京信息职业技术学院 A kind of system of monitoring resident identification card state and its monitoring method
CN107426240A (en) * 2017-08-24 2017-12-01 中国银行股份有限公司 Auth method, device and server
CN107832710A (en) * 2017-11-13 2018-03-23 上海聚虹光电科技有限公司 Iris self-help registration method
CN110069964A (en) * 2018-01-24 2019-07-30 南京机器人研究院有限公司 A kind of method of robot identification user identity
CN110069965A (en) * 2018-01-24 2019-07-30 南京机器人研究院有限公司 A kind of robot personal identification method
CN109145551A (en) * 2018-06-27 2019-01-04 珠海宏桥高科技有限公司 A kind of method and apparatus of quick verification residential identity
CN109308727B (en) * 2018-09-07 2020-11-10 腾讯科技(深圳)有限公司 Virtual image model generation method and device and storage medium
CN109522827A (en) * 2018-10-31 2019-03-26 维沃移动通信有限公司 A kind of method, apparatus and terminal device acquiring biological characteristic
TWI690856B (en) * 2019-01-07 2020-04-11 國立交通大學 Identity recognition system and identity recognition method
CN113312950A (en) * 2020-09-24 2021-08-27 一令通(上海)科技有限公司 Identity authentication method based on face and iris characteristics
CN112863593B (en) * 2021-02-05 2024-02-20 厦门大学 Identification feature extraction method and system based on skin metagenome data
CN114780769B (en) * 2022-06-13 2022-09-13 杭州合众数据技术有限公司 Personnel checking method based on bloom filter
CN117240607B (en) * 2023-11-10 2024-02-13 北京云尚汇信息技术有限责任公司 Security authentication method based on security computer
CN117371048B (en) * 2023-12-08 2024-03-29 深圳市研盛芯控电子技术有限公司 Remote access data processing method, device, equipment and storage medium

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2437761A (en) * 2006-05-03 2007-11-07 Qusharat Hussain Virtual identity and authentication employing a mobile device
CN101345625B (en) * 2008-08-15 2010-08-25 西安电子科技大学 Remote authentication method based on biological characteristic
CN101567033B (en) * 2009-06-03 2011-03-02 西北工业大学 Biological authentication method for resisting privacy disclosure
CN201838011U (en) * 2010-05-26 2011-05-18 中国科学院自动化研究所 Identity authentication equipment based on second-generation ID cards and multimode biological features

Also Published As

Publication number Publication date
CN102722696A (en) 2012-10-10

Similar Documents

Publication Publication Date Title
CN102722696B (en) Identity authentication method of identity card and holder based on multi-biological characteristics
Breebaart et al. A reference architecture for biometric template protection based on pseudo identities
CN100593790C (en) Highly precise safe palm recognition method encrypted based on phase characteristic of Log-Gabor mixed filtering
CN106936586A (en) A kind of biological secret key extracting method based on fingerprint bit string and Error Correction of Coding
Ali et al. Fingerprint shell construction with prominent minutiae points
Ayoup et al. Cancellable Multi-Biometric Template Generation Based on Arnold Cat Map and Aliasing.
Saraswathi et al. Retinal biometrics based authentication and key exchange system
Brindha Biometric template security using fuzzy vault
Balakumar et al. Secure biometric key generation scheme for cryptography using combined biometric features of fingerprint and iris
KR20050094228A (en) Fingerprint recognition method
Sharma et al. Encryption of text using fingerprints as input to various algorithms
Sowkarthika et al. Securing iris and fingerprint templates using fuzzy vault and symmetric algorithm
Islam et al. Technology review: image enhancement, feature extraction and template protection of a fingerprint authentication system
Selwal et al. Performance analysis of template data security and protection in biometric systems
Divan et al. A fingerprint matching technique using minutiae based algorithm for voting system: A survey
Bayly et al. Fractional biometrics: safeguarding privacy in biometric applications
EP3093793A1 (en) Fingerprint identification method and device using same
Sinduja et al. Sheltered iris attestation by means of visual cryptography (sia-vc)
Ashish et al. Biometric: fingerprints protection
Meenakshi et al. Retina and Iris based multimodal biometric Fuzzy Vault
Cimato et al. Biometrics and privacy
Ashraf et al. THE FRAMEWORK DESIGN FOR INCREASING SECURITY OF MULTI-MODAL BIOMETRIC AUTHENTICATION SYSTEM WITH DNN.
Kumar et al. Design and development of biometrics secure person detection system for E-passport using cryptographic security protocols
Altarawneh Cancelable fingerprint features using chaff points encapsulation
Sirdeshpande et al. Amended Biometric Authentication using Secret Sharing

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20140416

Termination date: 20190516

CF01 Termination of patent right due to non-payment of annual fee