CN105553657A - Feature level fused fingerprint fuzzy vault realization method - Google Patents

Feature level fused fingerprint fuzzy vault realization method Download PDF

Info

Publication number
CN105553657A
CN105553657A CN201610038430.1A CN201610038430A CN105553657A CN 105553657 A CN105553657 A CN 105553657A CN 201610038430 A CN201610038430 A CN 201610038430A CN 105553657 A CN105553657 A CN 105553657A
Authority
CN
China
Prior art keywords
fingerprint
point
minutiae point
fuzzy vault
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610038430.1A
Other languages
Chinese (zh)
Other versions
CN105553657B (en
Inventor
游林
占梦
王亭
余红芳
张彩娟
万天添
俞云
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Dianzi University
Original Assignee
Hangzhou Dianzi University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Dianzi University filed Critical Hangzhou Dianzi University
Priority to CN201610038430.1A priority Critical patent/CN105553657B/en
Publication of CN105553657A publication Critical patent/CN105553657A/en
Application granted granted Critical
Publication of CN105553657B publication Critical patent/CN105553657B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints
    • G06V40/1347Preprocessing; Feature extraction

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Theoretical Computer Science (AREA)
  • Collating Specific Patterns (AREA)
  • Image Analysis (AREA)

Abstract

The invention relates to a feature level fused fingerprint fuzzy vault realization method. The invention comprises following steps: step 1, fusing the detail point coordinate information of a fingerprint A and the direction field information of a fingerprint B to obtain a new feature information set; step 2, binding a secret key needed to be protected and the new feature information set obtained in the step 1 by using a locking algorithm, thus generating a fingerprint fuzzy vault; and step 3, extracting the secret key from the fingerprint fuzzy vault by using an unlocking algorithm according to the verified searching fingerprints A' and B' feature information. According to the invention, compared with the single feature generated fingerprint fuzzy vault method, the feature level fusion generated fingerprint fuzzy vault method has stronger security and higher realization efficiency. The secret key only can be extracted by a legal user and two legal fingerprints (namely the two fingerprints for register); therefore, the confidentiality, integrity and usability demanded by the secret key security storage are ensured.

Description

A kind of fingerprint fuzzy vault implementation method of feature-based fusion
Technical field
The invention belongs to cryptography and biometrics identification technology field, be specifically related to a kind of fingerprint fuzzy vault implementation method of feature-based fusion.
Background technology
Propose " AFuzzyVaultScheme " at A.Juels and M.Sudan in 2002.In the fuzzy vault algorithm that it proposes, the key of characteristic set unique for user or other community sets A hybrid subscriber is entered in the national treasury based on Reed-Solomn.User can utilize the community set B having most element identical with set A to recover key.The people such as U.Uludag propose a kind of fuzzy vault algorithm based on fingerprint characteristic, first this algorithm carried out calibrating to the fingerprint of template and input the angle change eliminated because rotation etc. causes before generating fingerprint key, what participate in comparison is plane coordinates value, the field of direction, the minutiae point type of fingerprint minutiae, if the plane coordinates value of certain two point of former and later two fingerprints, field of direction difference is within a threshold value, minutiae point type is identical, then think identical point.Fuzzy vault scheme based on fingerprint characteristic may be used for protection safe storage key.
The present invention that the fingerprint fuzzy vault implementation method using feature based level to merge is core, the uniqueness that security guarantee is merged by the many fingerprint characteristic of sole user or the fingerprint characteristic of multi-user merges provides, and the partial information of just every piece of fingerprint that fuzzy vault comprises, even if reveal, be also difficult to reconstruct.
Summary of the invention
The object of the invention is for the deficiencies in the prior art, under true and reliable experiment condition, provide a kind of fingerprint fuzzy vault implementation method of feature-based fusion.
The present invention solves the technical scheme that its technical problem adopts and comprises the steps:
Step 1, the minutiae point coordinate information of fusion fingerprint A and the directional field information of fingerprint B obtain a new feature information aggregate;
Step 2, utilize and to lock algorithm, the new feature information aggregate needing the key of protection and step 1 to obtain is bound, generation fingerprint fuzzy vault;
Step 3, the query fingerprints A ' of utilization process checking, B ' characteristic information adopt unlock algorithm to extract key from fingerprint fuzzy vault.
The minutiae point coordinate information of fusion fingerprint A described in step 1 and the directional field information of fingerprint B obtain a new feature information aggregate, specific as follows:
1.1 by twice fingerprint minutiae training, and extraction, process finger print information obtain the set of one group of metastable user fingerprints A minutiae point; First utilize Geometric active contours technology that fingerprint A minutiae point is registered a Hash table then the plane coordinates of each minutiae point obtained is quantized to 8 bits respectively, and to be connected in series with high four XORs of ordinate that to obtain a length be the Bit String of 12 by low four of abscissa; Then the data type of all fingerprint A minutiae point is converted into integer, obtains a class range [0,2 12-1] the integer set F in a, the number of stable user fingerprints A minutiae point is designated as N a.
1.2 by twice fingerprint minutiae training, and extraction, process finger print information obtain the set of one group of metastable user fingerprints B minutiae point; First utilize Geometric active contours technology that fingerprint B minutiae point is registered a Hash table then the plane coordinates of each minutiae point obtained is quantized to 8 bits respectively, and serial connection to obtain a length be the Bit String of 16, then the data type of all fingerprint B minutiae point is converted into integer, then can obtains a class range [0,2 16-1] the integer set F in b, the number of stable user fingerprints B minutiae point is designated as N b.
1.3 by extracting, processing finger print information, and obtain the field of direction of each pixel, its scope is in 0-255; Corresponding to the plane coordinates of fingerprint A minutiae point, the field of direction of fingerprint B extracted, the field of direction obtained being quantized to respectively a length is the bit of 4, then can obtain a class range [0,2 4-1] the integer set O in b, wherein the number of the field of direction is N o.
1.4 by integer set F aand O bthe value of middle respective coordinates combines, concrete with F a× 16+O bform obtains a class range [0,2 16-1] the integer set F in, wherein the number of minutiae point is N.
Fingerprint minutiae training method described in step 1.1 and 1.2 is as follows: sample fingerprint is carried out feature registration successively, does not distinguish minutiae point type during registration; Two width fingerprints the minutiae point of registration can be designated as the true detail point of this piece of fingerprint, get the average of two groups of coordinate figures that same true detail o'clock is got at two width images, are recorded as the coordinate figure of this true detail point; The minutiae point that registration is good and the 3rd width sample fingerprint carry out feature registration again; The set of metastable true detail point is obtained after registration completes.
Utilization described in step 2 is locked algorithm, is bound by the new feature information aggregate needing the key of protection and step 1 to obtain, generation fingerprint fuzzy vault, specific as follows:
Key k to be bound to be carried out format process by 2.1, format rule for successively from left to right in order every 16 bit lengths be one piece, note obtains altogether m block; And be integer by every blocks of data conversion in type, obtain a class range [0,2 16-1] the integer set K in.
The 2.2 block number m produced according to key format process, in finite field upper structure multinomial P (x)
P(x)=a mx m+…+a 2x 2+a 1x+a 0(modp)(1)
Wherein, modulus p rule of thumb recommends value to be Big prime 65537, the most high reps m of multinomial according to the general span of key length from 9 to 16.
2.3 add the CRC cyclic redundancy check (CRC) code of 16 bit lengths, to increase the reliability of Protective Key of the present invention for key to be bound; And the data type of this CRC cyclic redundancy check (CRC) code is converted into integer, obtain a scope [0,2 16-1] integer in.
2.4 using the CRC check code that obtains in the key to be bound mentioned in step 2.1 and step 2.3 coefficient as multinomial (1), wherein a 0for CRC check code, a 1..., a mfor key to be bound.Then each minutiae point data in stable integer set F step 1.4 obtained are brought in multinomial (1) as multinomial input value x, try to achieve point set (x, P (x)) | x ∈ F} is the true set in fuzzy vault.
2.5 for fuzzy vault interpolation is far more than the hash point set of truly putting set number, and each group element in the set of hash point produces all at random, and requires each group element and truly put unequal, and each group element does not meet multinomial (1).
2.6 will truly put set and the set of hash point is disorderly put, and final generation one comprises the fingerprint fuzzy vault truly putting set, hash point set and fuzzy vault essential information.
Described fuzzy vault essential information comprises the most high reps m and modulus p of multinomial;
Query fingerprints A ', the B ' characteristic information of the utilization process checking described in step 3 adopt unlock algorithm to extract key from fingerprint fuzzy vault, specific as follows:
3.1 by registering a Hash table to the relevant treatment of query fingerprints A ' and Geometric active contours technology then with the Hash table that obtains in step 1.1 mate, filter out the datum mark set H that matching number is maximum a ', then by obtaining integer set F in step 1.1 amethod obtain F a '; Scope is [0,2 12-1], in, the number of minutiae point is N a '.If N a '>=9, enter step 3.2; Otherwise, re-enter fingerprint A ', repeat this step.
3.2 by registering a Hash table to the relevant treatment of query fingerprints B ' and Geometric active contours technology then with the Hash table that obtains in step 1.2 mate, filter out the datum mark set H that matching number is maximum b ', then by obtaining integer set F in step 1.2 bmethod obtain F b '; Scope is [0,2 16-1], in, the number of minutiae point is N b '.If N b '>=9, enter step 3.3; Otherwise, re-enter fingerprint B ', repeat this step.
3.3 difference value utilizing query fingerprints B ' image direction field, carry out alignement to query fingerprints B ', obtain the field of direction of query fingerprints B '; Then take out and correspond to minutiae point set F a 'in the field of direction value of plane coordinates; And the field of direction value obtained is quantized to 4 bits respectively, obtain a class range [0,2 4-1] the integer set O in b ', its field of direction number N o '.
3.4 by integer set F a 'and O b 'the value of middle respective coordinates combines, concrete with F a '× 16+O b 'form obtains a class range [0,2 16-1] the integer set F ' in, wherein the number of minutiae point is N '.
Query fingerprints A ', B ' minutiae point set F ' are carried out traversal with each group of data in fuzzy vault and contrast by 3.5, if the number of the point conformed to is not less than polynomial most high reps m (i.e. block number) in fuzzy vault, enter step 3.6; Otherwise extract key failure.
The 3.6 pairs of points conformed to found carry out combination and calculate, and every m point is one group, utilize Lagrange's interpolation to attempt recovering possibility key, and the possible key obtained is carried out CRC check to every group.If by CRC check, then extract key success; Otherwise continue next group to attempt, until attempted all combined situation, extract key not yet, then extract key failure.
Beneficial effect of the present invention
Compared with the cryptographic key protection method of single fingerprint characteristic fuzzy vault; the present invention utilizes fingerprint characteristic level to merge the fuzzy vault of generation to realize the protection of key; there is stronger fail safe, higher implementation efficiency; possibility is provided for using under the equipment of the computational resource anxieties such as mobile terminal; also ensure that and only have validated user under legal fingerprint, just can extract key with CRC check function, ensured confidentiality, integrality, availability that secret key safety stores.
Accompanying drawing explanation
The fingerprint fuzzy vault implementation method flow chart of Fig. 1 feature-based fusion.
The unblock flow chart of Fig. 2 fuzzy vault.
The fingerprint fuzzy vault of Fig. 3 feature-based fusion generates analogous diagram.
The unblock analogous diagram of Fig. 4 fuzzy vault.
Embodiment
Below in conjunction with accompanying drawing, the invention will be further described.
The fingerprint fuzzy vault implementation method of feature-based fusion mainly comprises three parts: a first step, and the directional field information of the minutiae point coordinate information and fingerprint B that merge fingerprint A obtains a new feature information aggregate; Second step, utilizes algorithm of locking, and is bound by the new feature information aggregate that the key and step 1 that need protection obtain, generates fingerprint fuzzy vault; 3rd step, query fingerprints A ', the B ' characteristic information of the checking of utilization process adopt unlock algorithm to extract key from fingerprint fuzzy vault.
The minutiae point coordinate information of fusion fingerprint A described in step 1 and the directional field information of fingerprint B obtain a new feature information aggregate (flow chart is as shown in Figure 1), specific as follows:
1.1 by twice fingerprint minutiae training, and extraction, process finger print information obtain the set of one group of metastable user fingerprints A minutiae point; First utilize Geometric active contours technology that fingerprint A minutiae point is registered a Hash table then the plane coordinates of each minutiae point obtained is quantized to 8 bits respectively, and to be connected in series with high four XORs of ordinate that to obtain a length be the Bit String of 12 by low four of abscissa; Then the data type of all fingerprint A minutiae point is converted into integer, obtains a class range [0,2 12-1] the integer set F in a, the number of stable user fingerprints A minutiae point is designated as N a.
1.2 by twice fingerprint minutiae training, and extraction, process finger print information obtain the set of one group of metastable user fingerprints B minutiae point; First utilize Geometric active contours technology that fingerprint B minutiae point is registered a Hash table then the plane coordinates of each minutiae point obtained is quantized to 8 bits respectively, and serial connection to obtain a length be the Bit String of 16, then the data type of all fingerprint B minutiae point is converted into integer, then can obtains a class range [0,2 16-1] the integer set F in b, the number of stable user fingerprints B minutiae point is designated as N b.
1.3 by extracting, processing finger print information, and obtain the field of direction of each pixel, its scope is in 0-255; Corresponding to the plane coordinates of fingerprint A minutiae point, the field of direction of fingerprint B extracted, the field of direction obtained being quantized to respectively a length is the bit of 4, then can obtain a class range [0,2 4-1] the integer set O in b, wherein the number of the field of direction is N o.
1.4 by integer set F aand O bthe value of middle respective coordinates combines, concrete with F a× 16+O bform obtains a class range [0,2 16-1] the integer set F in, wherein the number of minutiae point is N.
Fingerprint minutiae training method described in step 1.1 and 1.2 is as follows: sample fingerprint is carried out feature registration successively, does not distinguish minutiae point type during registration; Two width fingerprints the minutiae point of registration can be designated as the true detail point of this piece of fingerprint, get the average of two groups of coordinate figures that same true detail o'clock is got at two width images, are recorded as the coordinate figure of this true detail point; The minutiae point that registration is good and the 3rd width sample fingerprint carry out feature registration again; The set of metastable true detail point is obtained after registration completes.
Utilization described in step 2 is locked algorithm, is bound by the new feature information aggregate needing the key of protection and step 1 to obtain, generation fingerprint fuzzy vault, specific as follows:
128 bit length keys to be bound to be carried out format process by 2.1, format rule for successively from left to right in order every 16 bit lengths be one piece, note obtains altogether 9 pieces; And be integer by every blocks of data conversion in type, obtain a class range [0,2 16-1] the integer set K in.
The 2.2 block numbers 9 produced according to key format process, in finite field upper structure multinomial P (x)
P(x)=a 9x 9+…+a 2x 2+a 1x+a 0(mod65537)(2)
2.3 add the CRC cyclic redundancy check (CRC) code of 16 bit lengths, to increase the reliability of Protective Key of the present invention for key to be bound; And the data type of this CRC cyclic redundancy check (CRC) code is converted into integer, obtain a scope [0,2 16-1] integer in.
2.4 using the CRC check code that obtains in the key to be bound mentioned in step 2.1 and step 2.3 coefficient as multinomial (2), wherein a 0for CRC check code, a 1..., a mfor key to be bound.Then each minutiae point data in stable integer set F step 1.4 obtained are brought in multinomial (2) as multinomial input value x, try to achieve point set (x, P (x)) | x ∈ F} is the true set in fuzzy vault.
2.5 for fuzzy vault interpolation is far more than the hash point set of truly putting set number, and each group element in the set of hash point produces all at random, and requires each group element and truly put unequal, and each group element does not meet multinomial (2).
2.6 will truly put set and the set of hash point is disorderly put, and final generation one comprises the fingerprint fuzzy vault truly putting set, hash point set and fuzzy vault essential information, as shown in Figure 3.
Described fuzzy vault essential information comprises most high reps 9 and modulus 65537 in multinomial;
Query fingerprints A ', the B ' characteristic information of the utilization process checking described in step 3 adopt unlock algorithm to extract key (flow chart is as shown in Figure 2) from fingerprint fuzzy vault, specific as follows:
3.1 by registering a Hash table to the relevant treatment of query fingerprints A ' and Geometric active contours technology then with the Hash table that obtains in step 1.1 mate, filter out the datum mark set H that matching number is maximum a ', then by obtaining integer set F in step 1.1 amethod obtain F a '; Scope is [0,2 12-1], in, the number of minutiae point is N a '.If N a '>=9, enter step 3.2; Otherwise, re-enter fingerprint A ', repeat this step.
3.2 by registering a Hash table to the relevant treatment of query fingerprints B ' and Geometric active contours technology then with the Hash table that obtains in step 1.2 mate, filter out the datum mark set H that matching number is maximum b ', then by obtaining integer set F in step 1.2 bmethod obtain F b '; Scope is [0,2 16-1], in, the number of minutiae point is N b '.If N b '>=9, enter step 3.3; Otherwise, re-enter fingerprint B ', repeat this step.
3.3 difference value utilizing query fingerprints B ' image direction field, carry out alignement to query fingerprints B ', obtain the field of direction of query fingerprints B '; Then take out and correspond to minutiae point set F a 'in the field of direction value of plane coordinates; And the field of direction value obtained is quantized to 4 bits respectively, obtain a class range [0,2 4-1] the integer set O in b ', its field of direction number N o '.
3.4 by integer set F a 'and O b 'the value of middle respective coordinates combines, concrete with F a '× 16+O b 'form obtains a class range [0,2 16-1] the integer set F ' in, wherein the number of minutiae point is N '.
Query fingerprints A ', B ' minutiae point set F ' are carried out traversal with each group of data in fuzzy vault and contrast by 3.5, if the number of the point conformed to is not less than polynomial most high reps m (i.e. block number) in fuzzy vault, enter step 3.6; Otherwise extract key failure.
The 3.6 pairs of points conformed to found carry out combination and calculate, and every 9 points are one group, and utilizing Lagrange's interpolation to attempt recovering to every group may key, and the possible key obtained is carried out CRC check.If by CRC check, then extract key success, as shown in Figure 4; Otherwise continue next group to attempt, until attempted all combined situation, extract key not yet, then extract key failure.

Claims (4)

1. a fingerprint fuzzy vault implementation method for feature-based fusion, is characterized in that comprising the steps:
Step 1, the minutiae point coordinate information of fusion fingerprint A and the directional field information of fingerprint B obtain a new feature information aggregate;
Step 2, utilize and to lock algorithm, the new feature information aggregate needing the key of protection and step 1 to obtain is bound, generation fingerprint fuzzy vault;
Step 3, the query fingerprints A ' of utilization process checking, B ' characteristic information adopt unlock algorithm to extract key from fingerprint fuzzy vault.
2. the fingerprint fuzzy vault implementation method of a kind of feature-based fusion as claimed in claim 1, is characterized in that the minutiae point coordinate information of fusion fingerprint A described in step 1 and the directional field information of fingerprint B obtain a new feature information aggregate, specific as follows:
1.1 by twice fingerprint minutiae training, and extraction, process finger print information obtain the set of one group of metastable fingerprint A minutiae point; First utilize Geometric active contours technology that fingerprint A minutiae point is registered a Hash table then the plane coordinates of each minutiae point obtained is quantized to 8 bits respectively, and to be connected in series with high four XORs of ordinate that to obtain a length be the Bit String of 12 by low four of abscissa; Then the data type of all fingerprint A minutiae point is converted into integer, obtains a class range [0,2 12-1] the integer set F in a, the number of stable user fingerprints A minutiae point is designated as N a;
1.2 by twice fingerprint minutiae training, and extraction, process finger print information obtain the set of one group of metastable fingerprint B minutiae point; First utilize Geometric active contours technology that fingerprint B minutiae point is registered a Hash table then the plane coordinates of each minutiae point obtained is quantized to 8 bits respectively, and serial connection to obtain a length be the Bit String of 16, then the data type of all fingerprint B minutiae point is converted into integer, then can obtains a class range [0,2 16-1] the integer set F in b, the number of stable user fingerprints B minutiae point is designated as N b;
1.3 by extracting, processing finger print information, and obtain the field of direction of each pixel, its scope is in 0-255; Corresponding to the plane coordinates of fingerprint A minutiae point, the field of direction of fingerprint B extracted, the field of direction obtained being quantized to respectively a length is the bit of 4, then can obtain a class range [0,2 4-1] the integer set O in b, wherein the number of the field of direction is N o;
1.4 by integer set F aand O bthe value of middle respective coordinates combines, concrete with F a× 16+O bform obtains a class range [0,2 16-1] the integer set F in, wherein the number of minutiae point is N.
Fingerprint minutiae training method described in step 1.1 and 1.2 is as follows: sample fingerprint is carried out feature registration successively, does not distinguish minutiae point type during registration; Two width fingerprints the minutiae point of registration can be designated as the true detail point of this piece of fingerprint, get the average of two groups of coordinate figures that same true detail o'clock is got at two width images, are recorded as the coordinate figure of this true detail point; The minutiae point that registration is good and the 3rd width sample fingerprint carry out feature registration again; The set of metastable true detail point is obtained after registration completes.
3. the fingerprint fuzzy vault implementation method of a kind of feature-based fusion as claimed in claim 2; the utilization that it is characterized in that described in step 2 is locked algorithm; the new feature information aggregate that the key and step 1 that need protection obtain is bound, generates fingerprint fuzzy vault, specific as follows:
Key k to be bound to be carried out format process by 2.1, format rule for successively from left to right in order every 16 bit lengths be one piece, note obtains altogether m block; And be integer by every blocks of data conversion in type, obtain a class range [0,2 16-1] the integer set K in;
The 2.2 block number m produced according to key format process, in finite field upper structure multinomial P (x)
P(x)=a mx m+…+a 2x 2+a 1x+a 0(modp)(1)
Wherein, modulus p rule of thumb recommends value to be Big prime 65537, the most high reps m of multinomial according to the general span of key length from 9 to 16;
2.3 add the CRC cyclic redundancy check (CRC) code of 16 bit lengths for key to be bound; And the data type of this CRC cyclic redundancy check (CRC) code is converted into integer, obtain a scope [0,2 16-1] integer in;
2.4 using the CRC check code that obtains in the key to be bound mentioned in step 2.1 and step 2.3 coefficient as multinomial (1), wherein a 0for CRC check code, a 1..., a mfor key to be bound; Then each minutiae point data in stable integer set F step 1.4 obtained are brought in multinomial (1) as multinomial input value x, try to achieve point set (x, P (x)) | x ∈ F} is the true set in fuzzy vault;
2.5 for fuzzy vault interpolation is far more than the hash point set of truly putting set number, and each group element in the set of hash point produces all at random, and requires each group element and truly put unequal, and each group element does not meet multinomial (1);
2.6 will truly put set and the set of hash point is disorderly put, and final generation one comprises the fingerprint fuzzy vault truly putting set, hash point set and fuzzy vault essential information;
Described fuzzy vault essential information comprises the most high reps m and modulus p of multinomial.
4. the fingerprint fuzzy vault implementation method of a kind of feature-based fusion as claimed in claim 3, it is characterized in that query fingerprints A ', the B ' characteristic information of the utilization process checking described in step 3 adopt unlock algorithm to extract key from fingerprint fuzzy vault, specific as follows:
3.1 by registering a Hash table to the relevant treatment of query fingerprints A ' and Geometric active contours technology then with the Hash table that obtains in step 1.1 mate, filter out the datum mark set H that matching number is maximum a ', then by obtaining integer set F in step 1.1 amethod obtain F a '; Scope is [0,2 12-1], in, the number of minutiae point is N a '; If N a '>=9, enter step 3.2; Otherwise, re-enter fingerprint A ', repeat this step;
3.2 by registering a Hash table to the relevant treatment of query fingerprints B ' and Geometric active contours technology then with the Hash table that obtains in step 1.2 mate, filter out the datum mark set H that matching number is maximum b ', then by obtaining integer set F in step 1.2 bmethod obtain F b '; Scope is [0,2 16-1], in, the number of minutiae point is N b '; If N b '>=9, enter step 3.3; Otherwise, re-enter fingerprint B ', repeat this step;
3.3 difference value utilizing query fingerprints B ' image direction field, carry out alignement to query fingerprints B ', obtain the field of direction of query fingerprints B '; Then take out and correspond to minutiae point set F a 'in the field of direction value of plane coordinates; And the field of direction value obtained is quantized to 4 bits respectively, obtain a class range [0,2 4-1] the integer set O in b ', its field of direction number N o ';
3.4 by integer set F a 'and O b 'the value of middle respective coordinates combines, concrete with F a '× 16+O b 'form obtains a class range [0,2 16-1] the integer set F ' in, wherein the number of minutiae point is N ';
Query fingerprints A ', B ' minutiae point set F ' are carried out traversal with each group of data in fuzzy vault and contrast by 3.5, if the number of the point conformed to is not less than polynomial most high reps m in fuzzy vault, enter step 3.6; Otherwise extract key failure;
The 3.6 pairs of points conformed to found carry out combination and calculate, and every m point is one group, utilize Lagrange's interpolation to attempt recovering possibility key, and the possible key obtained is carried out CRC check to every group; If by CRC check, then extract key success; Otherwise continue next group to attempt, until attempted all combined situation, extract key not yet, then extract key failure.
CN201610038430.1A 2016-01-19 2016-01-19 A kind of fingerprint fuzzy vault implementation method of feature-based fusion Expired - Fee Related CN105553657B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610038430.1A CN105553657B (en) 2016-01-19 2016-01-19 A kind of fingerprint fuzzy vault implementation method of feature-based fusion

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610038430.1A CN105553657B (en) 2016-01-19 2016-01-19 A kind of fingerprint fuzzy vault implementation method of feature-based fusion

Publications (2)

Publication Number Publication Date
CN105553657A true CN105553657A (en) 2016-05-04
CN105553657B CN105553657B (en) 2019-02-01

Family

ID=55832600

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610038430.1A Expired - Fee Related CN105553657B (en) 2016-01-19 2016-01-19 A kind of fingerprint fuzzy vault implementation method of feature-based fusion

Country Status (1)

Country Link
CN (1) CN105553657B (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106169062A (en) * 2016-06-08 2016-11-30 杭州电子科技大学 A kind of implementation method referring to that vein merges fuzzy vault
CN106778520A (en) * 2016-11-25 2017-05-31 哈尔滨工程大学 A kind of fuzzy safety box encryption method of finger vena
CN106936586A (en) * 2016-12-07 2017-07-07 中国电子科技集团公司第三十研究所 A kind of biological secret key extracting method based on fingerprint bit string and Error Correction of Coding
CN107181592A (en) * 2017-05-12 2017-09-19 西安电子科技大学 The key bindings method of adaptive fingerprint minutiae quantity
CN107181598A (en) * 2017-07-05 2017-09-19 四川无声信息技术有限公司 Fingerprint key processing method and processing device
CN108429614A (en) * 2018-01-05 2018-08-21 杭州电子科技大学 A kind of fuzzy vault implementation method merged with face characteristic grade based on fingerprint
CN108960039A (en) * 2018-05-07 2018-12-07 西安电子科技大学 A kind of irreversible fingerprint template encryption method based on symmetrical hash
CN110300971A (en) * 2017-02-22 2019-10-01 指纹卡有限公司 Telnet based on biological characteristic
CN113254989A (en) * 2021-04-27 2021-08-13 支付宝(杭州)信息技术有限公司 Fusion method and device of target data and server
CN113507380A (en) * 2021-09-10 2021-10-15 浙江大学 Privacy protection remote unified biometric authentication method and device and electronic equipment
CN116861489A (en) * 2023-02-23 2023-10-10 重庆市规划和自然资源信息中心 Serialization security management method for map two-dimensional data

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102510330A (en) * 2011-11-02 2012-06-20 杭州电子科技大学 Novel fuzzy vault method based on fingerprint characteristic data and matching algorithm
CN102710417A (en) * 2012-06-18 2012-10-03 杭州电子科技大学 Fuzzy vault method based on fingerprint features and Internet key exchange protocol
CN102946310A (en) * 2012-09-03 2013-02-27 杭州电子科技大学 Fingerprint fuzzy vault method based on (k, w) threshold secret sharing scheme

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102510330A (en) * 2011-11-02 2012-06-20 杭州电子科技大学 Novel fuzzy vault method based on fingerprint characteristic data and matching algorithm
CN102710417A (en) * 2012-06-18 2012-10-03 杭州电子科技大学 Fuzzy vault method based on fingerprint features and Internet key exchange protocol
CN102946310A (en) * 2012-09-03 2013-02-27 杭州电子科技大学 Fingerprint fuzzy vault method based on (k, w) threshold secret sharing scheme

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
SHENG LI: "fingerprint combination for privacy protection", 《IEEE》 *
游林: "生物特征密码技术综述", 《杭州电子科技大学学报》 *

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106169062A (en) * 2016-06-08 2016-11-30 杭州电子科技大学 A kind of implementation method referring to that vein merges fuzzy vault
CN106169062B (en) * 2016-06-08 2019-05-21 杭州电子科技大学 A kind of implementation method referring to vein fusion fuzzy vault
CN106778520A (en) * 2016-11-25 2017-05-31 哈尔滨工程大学 A kind of fuzzy safety box encryption method of finger vena
CN106936586A (en) * 2016-12-07 2017-07-07 中国电子科技集团公司第三十研究所 A kind of biological secret key extracting method based on fingerprint bit string and Error Correction of Coding
CN110300971A (en) * 2017-02-22 2019-10-01 指纹卡有限公司 Telnet based on biological characteristic
CN110300971B (en) * 2017-02-22 2022-07-15 指纹卡安娜卡敦知识产权有限公司 Method, network node, client device and storage medium for biometric-based authentication
CN107181592A (en) * 2017-05-12 2017-09-19 西安电子科技大学 The key bindings method of adaptive fingerprint minutiae quantity
CN107181592B (en) * 2017-05-12 2019-11-22 西安电子科技大学 The key bindings method of adaptive fingerprint minutiae quantity
CN107181598A (en) * 2017-07-05 2017-09-19 四川无声信息技术有限公司 Fingerprint key processing method and processing device
CN108429614B (en) * 2018-01-05 2020-10-30 杭州电子科技大学 Fuzzy vault realization method based on fingerprint and face feature level fusion
CN108429614A (en) * 2018-01-05 2018-08-21 杭州电子科技大学 A kind of fuzzy vault implementation method merged with face characteristic grade based on fingerprint
CN108960039A (en) * 2018-05-07 2018-12-07 西安电子科技大学 A kind of irreversible fingerprint template encryption method based on symmetrical hash
CN113254989A (en) * 2021-04-27 2021-08-13 支付宝(杭州)信息技术有限公司 Fusion method and device of target data and server
CN113507380A (en) * 2021-09-10 2021-10-15 浙江大学 Privacy protection remote unified biometric authentication method and device and electronic equipment
CN116861489A (en) * 2023-02-23 2023-10-10 重庆市规划和自然资源信息中心 Serialization security management method for map two-dimensional data
CN116861489B (en) * 2023-02-23 2024-03-08 重庆市规划和自然资源信息中心 Serialization security management method for map two-dimensional data

Also Published As

Publication number Publication date
CN105553657B (en) 2019-02-01

Similar Documents

Publication Publication Date Title
CN105553657A (en) Feature level fused fingerprint fuzzy vault realization method
Panchal et al. A novel approach to fingerprint biometric-based cryptographic key generation and its applications to storage security
Cimato et al. Privacy-aware biometrics: Design and implementation of a multimodal verification system
CN106936586A (en) A kind of biological secret key extracting method based on fingerprint bit string and Error Correction of Coding
CN102710417B (en) Fuzzy vault method based on fingerprint features and Internet key exchange protocol
Liu et al. Encrypted domain matching of fingerprint minutia cylinder-code (MCC) with l1 minimization
Sandhya et al. Cancelable fingerprint cryptosystem using multiple spiral curves and fuzzy commitment scheme
Kaur et al. Cryptographic key generation from multimodal template using fuzzy extractor
CN108429614B (en) Fuzzy vault realization method based on fingerprint and face feature level fusion
Jin et al. A revocable fingerprint template for security and privacy preserving
Shi et al. Fingerprint recognition strategies based on a fuzzy commitment for cloud-assisted IoT: a minutiae-based sector coding approach
CN116010917A (en) Privacy-protected image processing method, identity registration method and identity authentication method
Shukla et al. Securing fingerprint templates by enhanced minutiae‐based encoding scheme in Fuzzy Commitment
CN104320247B (en) A kind of shared key guard method based on elliptic curve and fingerprint fuzzy vault
CN104376307A (en) Fingerprint image information coding method
CN106169062B (en) A kind of implementation method referring to vein fusion fuzzy vault
Sandhya et al. Cancelable fingerprint cryptosystem based on convolution coding
CN114168918A (en) Face information protection and bidirectional authentication system based on PUF
KR101275590B1 (en) Rn-ecc based real fuzzy vault for protecting biometric template
CN112364319B (en) Biological characteristic template protection method and device based on binary tree shuffling
Liu et al. Is fuzzy vault scheme very effective for key binding in biometric cryptosystems?
CN104104501A (en) Fuzzy vault sharing method based on fingerprint characteristic and finite multiplicative group
CN109639414B (en) Fingerprint key generation method based on characteristic distance and generation interval
Han Fingerprint Authentication Schemes for Mobile Devices
Kuznetsov et al. Deep learning based fuzzy extractor for generating strong keys from biometric face images

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190201

Termination date: 20220119

CF01 Termination of patent right due to non-payment of annual fee