CN106452779A - Encryption method and apparatus of fingerprint image data - Google Patents

Encryption method and apparatus of fingerprint image data Download PDF

Info

Publication number
CN106452779A
CN106452779A CN201610785868.6A CN201610785868A CN106452779A CN 106452779 A CN106452779 A CN 106452779A CN 201610785868 A CN201610785868 A CN 201610785868A CN 106452779 A CN106452779 A CN 106452779A
Authority
CN
China
Prior art keywords
pixel
encrypted
fingerprint image
image data
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610785868.6A
Other languages
Chinese (zh)
Inventor
林晖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Landi Commercial Equipment Co Ltd
Original Assignee
Fujian Landi Commercial Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Landi Commercial Equipment Co Ltd filed Critical Fujian Landi Commercial Equipment Co Ltd
Priority to CN201610785868.6A priority Critical patent/CN106452779A/en
Publication of CN106452779A publication Critical patent/CN106452779A/en
Priority to PCT/CN2017/096823 priority patent/WO2018040878A1/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0625Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Abstract

The invention provides an encryption method of fingerprint image data, for providing a novel scheme for performing rapid encryption on fingerprint image big data and a 3DES algorithm. The method comprises the following steps: obtaining a digital sequence to be encrypted by performing binary conversion processing on original fingerprint image data; obtaining a cipher table by encrypting 256 combinations which may be composed of digits to be encrypted by use of a preset secret key; and performing grouping on the digital sequence to be encrypted by taking eight bytes as a unit, searching the cipher table for a password corresponding to each group, and obtaining an encryption result by splicing the passwords. The invention also simultaneously provides an encryption apparatus of fingerprint image data, for realizing the method. According to the technical scheme, when a large volume of fingerprint image data is encrypted by use of 3DES, the encryption time can be greatly shortened, and user experience is improved.

Description

The encryption method of fingerprint image data and device
Technical field
The present invention relates to fingerprint recognition and field of encryption, particularly to a kind of encryption method of fingerprint image data and dress Put.
Background technology
In financial payment field, in addition to carrying out financial business transaction using traditional password, bio-identification is increasingly Many is applied in payment transaction, such as fingerprint recognition.The hidden danger that traditional password presence is easily stolen, inputs password in addition More time-consuming, Consumer's Experience is not good.And fingerprint recognition has uniqueness, also there is safer and more easily advantage.
Paid it is necessary first to by fingerprint data collection to backstage using fingerprint recognition, it usually needs collection (and plus Close) multiple without overcompression fingerprint image data to backstage, in order to ensure the safety of fingerprint image data, need by terminal-pair Fingerprint image data is encrypted, and encryption data is delivered to backstage, and encryption key is consulted to draw by backstage and terminal;AES Be usually used is 3DES algorithm, and the data being about 500,000 bytes for size is encrypted, if calculated using the 3DES of standard Method is encrypted, and 1024 bytes calculate 3DES, take around 20ms, total encryption times take around 10s, and this makes user's body Test extreme difference.
Content of the invention
For this reason, it may be necessary to provide a kind of new scheme that fingerprint image big data is quickly encrypted with 3DES algorithm.
For achieving the above object, inventor provide a kind of encryption method of fingerprint image data, comprise the steps:
Binaryzation conversion process is done to original fingerprint view data, obtains a Serial No. to be encrypted;
It is encrypted using 256 kinds of combinations that preset-key may form to numeral to be encrypted, obtain cipher table;
Serial No. to be encrypted is grouped in units of 8 bytes, in cipher table, searches the corresponding password of each group, and Splicing password obtains encrypted result.
Further, in the encryption method of described fingerprint image data, step " does two-value to original fingerprint view data Change is processed " specifically include:The pixel value of each pixel in original fingerprint image is classified as by 0 or 255 with preset algorithm.
Further, in the encryption method of described fingerprint image data, described preset algorithm specifically includes:Judge image In the pixel value of each pixel whether be more than predetermined threshold value, if more than the pixel value making this pixel is 255, otherwise for 0;Or
Calculate pixel average in the region of pre-set dimension and using this mean value as the pixel threshold in this region, judge In region, whether the pixel value of each pixel is more than the size of the pixel threshold in described region, if being more than, makes the picture of this pixel Element value is 255, otherwise for 0;Or
Calculate the adaptive threshold of each pixel in image with difference adaptive algorithm, and judge the pixel value of each pixel Whether it is more than described adaptive threshold;If more than the pixel value making this pixel is 255, otherwise for 0.
Further, in the encryption method of described fingerprint image data, 256 kinds of combinations that numeral to be encrypted may form In each combination all comprise 8 numerals.
Further, in the encryption method of described fingerprint image data, step is " to Serial No. to be encrypted with 8 bytes It is grouped for unit, the lookup corresponding password of each group in cipher table, and is spliced password and obtained encrypted result " in, splicing is close During code to the splicing order of each group password with Serial No. to be encrypted is grouped in units of 8 bytes after order of packets one Cause.
Inventor additionally provides a kind of encryption device of fingerprint image data simultaneously, including binaryzation converting unit, encryption Unit, memory cell, grouped element, searching unit and concatenation unit;
Described binaryzation conversion unit is used for doing binaryzation conversion process to original fingerprint view data, obtains one to be encrypted Serial No.;
256 kinds of combinations that described ciphering unit is used for using preset-key may form to numeral to be encrypted are encrypted, Obtain cipher table, described memory cell is used for storing described cipher table;
Described grouped element is used for Serial No. to be encrypted is grouped in units of 8 bytes, and described searching unit is used In searching the corresponding password of each group in the cipher table of memory cell, described concatenation unit is used for splicing password and obtains encryption knot Really.
Further, in the encryption device of described fingerprint image data, binaryzation converting unit is to original fingerprint image Data is done binary conversion treatment and is specifically included:With preset algorithm by the pixel value of each pixel in original fingerprint image classify as 0 or 255.
Further, in the encryption device of described fingerprint image data, described preset algorithm specifically includes:Judge image In the pixel value of each pixel whether be more than predetermined threshold value, if more than the pixel value making this pixel is 255, otherwise for 0;Or
Calculate pixel average in the region of pre-set dimension and using this mean value as the pixel threshold in this region, judge In region, whether the pixel value of each pixel is more than the size of the pixel threshold in described region, if being more than, makes the picture of this pixel Element value is 255, otherwise for 0;Or
Calculate the adaptive threshold of each pixel in image with difference adaptive algorithm, and judge the pixel value of each pixel Whether it is more than described adaptive threshold;If more than the pixel value making this pixel is 255, otherwise for 0.
Further, in the encryption device of described fingerprint image data, 256 kinds of combinations that numeral to be encrypted may form In each combination all comprise 8 numerals.
Further, in the encryption device of described fingerprint image data, to each group password during concatenation unit splicing password Splicing order with grouped element, Serial No. to be encrypted is grouped in units of 8 bytes after order of packets consistent.
It is different from prior art, technique scheme carries out 3DES and carries out adding to the fingerprint image data being related to big data quantity When close, can greatly shorten encryption times, improve Consumer's Experience.From the point of view of Consumer's Experience performance index, two field picture is carried out The time of 3DES encryption is within 2s;And, when data volume infinitely increases, encryption times are held essentially constant.
Brief description
Fig. 1 is the flow chart of the encryption method of fingerprint image data described in an embodiment of the present invention;
Fig. 2 is the structural representation of the encryption device of fingerprint image data described in an embodiment of the present invention.
Description of reference numerals:
1- binaryzation converting unit
2- ciphering unit
3- memory cell
4- grouped element
5- searching unit
6- concatenation unit
Specific embodiment
By the technology contents of detailed description technical scheme, structural feature, realized purpose and effect, below in conjunction with concrete reality Apply example and coordinate accompanying drawing to be explained in detail.
Refer to Fig. 1, be the flow chart of the encryption method of fingerprint image data described in an embodiment of the present invention;Described Method comprises the steps:
S1, binaryzation conversion process is done to original fingerprint view data, obtain a Serial No. to be encrypted;
S2, using preset-key to be encrypted numeral may composition 256 kinds of combinations be encrypted, obtain cipher table;
S3, Serial No. to be encrypted is grouped in units of 8 bytes, cipher table is searched each group corresponding close Code, and splice password and obtain encrypted result.
Further, in the encryption method of described fingerprint image data, described in step S1 " to original fingerprint picture number According to doing binary conversion treatment " specifically include:With preset algorithm by the pixel value of each pixel in original fingerprint image classify as 0 or 255.
The pixel value gray value of the raw image data described in step S1 is between 0-255, special due to fingerprint image Property, what Fingerprint recognition relied primarily on is fingerprint textural characteristics, as long as therefore not destroying the texture features of fingerprint image, permissible Binary conversion treatment is carried out by fingerprint image, to simplify image data pixel values;By algorithm general at present, by image each The pixel value of pixel is referred to 0 or 255, and then data to be encrypted is become by 0 or 255 by the sequence that different pixel values form The sequence of composition.
Further, in present embodiment, described in step S1, preset algorithm is specially:Judge the picture of each pixel in image Whether element value is more than predetermined threshold value, if more than the pixel value making this pixel is 255, otherwise for 0.
In other embodiments, described preset algorithm can also be:
Calculate pixel average in the region of pre-set dimension and using this mean value as the pixel threshold in this region, judge In region, whether the pixel value of each pixel is more than the size of the pixel threshold in described region, if being more than, makes the picture of this pixel Element value is 255, otherwise for 0;Or
Calculate the adaptive threshold of each pixel in image with difference adaptive algorithm, and judge the pixel value of each pixel Whether it is more than described adaptive threshold;If more than the pixel value making this pixel is 255, otherwise for 0.
In the encryption method of the fingerprint image data described in present embodiment, 256 kinds of groups that numeral to be encrypted may form In conjunction, each combination all comprises 8 numerals.
Further, in the encryption method of described fingerprint image data, step S3 is " to Serial No. to be encrypted with 8 words Save and be grouped for unit, search the corresponding password of each group in cipher table, and splice password and obtain encrypted result " in, splicing During password to the splicing order of each group password with Serial No. to be encrypted is grouped in units of 8 bytes after order of packets Unanimously.
That is, present embodiment is exactly to make use of 3DES algorithm to have to enter row operation in units of 8 bytes, for many The data of individual byte, 8 bytes are grouped for unit, encrypted result are spliced successively the feature of composition.For big data quantity number According to being encrypted, the key value of use is identical, the data carrying out after binary conversion treatment is encrypted, with 8 bytes is Unit is grouped, and each group each data only has two values:The be-encrypted data of 0 or 255, therefore 8 bytes is a sequence Row are combined by the sequence of 0 and 255;The possible combination of 8 byte be-encrypted data, one has 256 kinds of combinations;As long as to above 256 Plant the data of combination, using key encryption it is possible to obtain corresponding 256 groups of corresponding encrypted result;And for big data quantity Encryption, the encrypted result of any one 8 byte is it is only necessary to be can get by searching corresponding 256 kinds of encrypted result;For big Data volume encrypted result, by 8 byte packet, searches the corresponding corresponding encrypted result of 8 bytes, then is obtained whole by each splicing The encrypted result of individual big data quantity.
Refer to Fig. 2, be the structural representation of the encryption device of fingerprint image data described in an embodiment of the present invention; The encryption device of described fingerprint image data include binaryzation converting unit 1, ciphering unit 2, memory cell 3, grouped element 4, Searching unit 5 and concatenation unit 6;
Described binaryzation conversion unit 1 is used for doing binaryzation conversion process to original fingerprint view data, obtains one to be added Close Serial No..The pixel value gray value of described raw image data between 0-255, due to the particularity of fingerprint image, What Fingerprint recognition relied primarily on is fingerprint textural characteristics, as long as therefore not destroying the texture features of fingerprint image, Ke Yitong Cross fingerprint image and carry out binary conversion treatment, to simplify image data pixel values;By algorithm general at present, by each picture of image The pixel value of element is referred to 0 or 255, and then data to be encrypted is become by 0 or 255 group by the sequence that different pixel values form The sequence becoming.
256 kinds of combinations that described ciphering unit 2 is used for using preset-key may form to numeral to be encrypted are encrypted, Obtain cipher table, described memory cell 3 is used for storing described cipher table;
Described grouped element 4 is used for Serial No. to be encrypted is grouped in units of 8 bytes, described searching unit 5 For searching the corresponding password of each group in the cipher table of memory cell 3, described concatenation unit 6 is used for splicing password to be encrypted Result.
Further, in the encryption device of described fingerprint image data, binaryzation converting unit 1 is to original fingerprint image Data is done binary conversion treatment and is specifically included:With preset algorithm by the pixel value of each pixel in original fingerprint image classify as 0 or 255.
In the present embodiment, described preset algorithm is specially:Judge whether the pixel value of each pixel in image is more than Predetermined threshold value, if more than the pixel value making this pixel is 255, otherwise for 0.
In other embodiments, described preset algorithm can also be:
Calculate pixel average in the region of pre-set dimension and using this mean value as the pixel threshold in this region, judge In region, whether the pixel value of each pixel is more than the size of the pixel threshold in described region, if being more than, makes the picture of this pixel Element value is 255, otherwise for 0;Or
Calculate the adaptive threshold of each pixel in image with difference adaptive algorithm, and judge the pixel value of each pixel Whether it is more than described adaptive threshold;If more than the pixel value making this pixel is 255, otherwise for 0.
In present embodiment, each combination in 256 kinds of combinations that numeral to be encrypted may form all comprises 8 numerals.
Further, in the encryption device of described fingerprint image data, to each group password during concatenation unit 6 splicing password Splicing order with grouped element 4, Serial No. to be encrypted is grouped in units of 8 bytes after order of packets consistent.
That is, present embodiment is exactly to make use of 3DES algorithm to have to enter row operation in units of 8 bytes, for many The data of individual byte, 8 bytes are grouped for unit, encrypted result are spliced successively the feature of composition.For big data quantity number According to being encrypted, the key value of use is identical, the data carrying out after binary conversion treatment is encrypted, with 8 bytes is Unit is grouped, and each group each data only has two values:The be-encrypted data of 0 or 255, therefore 8 bytes is a sequence Row are combined by the sequence of 0 and 255;The possible combination of 8 byte be-encrypted data, one has 256 kinds of combinations;As long as to above 256 Plant the data of combination, using key encryption it is possible to obtain corresponding 256 groups of corresponding encrypted result;And for big data quantity Encryption, the encrypted result of any one 8 byte is it is only necessary to be can get by searching corresponding 256 kinds of encrypted result;For big Data volume encrypted result, by 8 byte packet, searches the corresponding corresponding encrypted result of 8 bytes, then is obtained whole by each splicing The encrypted result of individual big data quantity.
Refer to following table, be the efficiency comparative of technical solution of the present invention and normal 3DES encryption.
As can be seen here, it is different from prior art, the encryption device of fingerprint image data of the present invention and encryption method When 3DES being carried out to the fingerprint image data being related to big data quantity being encrypted, can greatly shorten encryption times, improve user Experience.From the point of view of Consumer's Experience performance index, two field picture is carried out with the time of 3DES encryption within 2s;And, work as data volume During unlimited increase, encryption times are held essentially constant.
It should be noted that herein, such as first and second or the like relational terms are used merely to a reality Body or operation are made a distinction with another entity or operation, and not necessarily require or imply these entities or deposit between operating In any this actual relation or order.And, term " inclusion ", "comprising" or its any other variant are intended to The comprising of nonexcludability, so that include a series of process of key elements, method, article or terminal device not only include those Key element, but also include other key elements being not expressly set out, or also include for this process, method, article or end The intrinsic key element of end equipment.In the absence of more restrictions, limited by sentence " including ... " or " comprising ... " It is not excluded that also there is other key element in process, method, article or the terminal device including described key element in key element.This Outward, herein, " more than ", " less than ", " exceeding " etc. be interpreted as not including this number;" more than ", " below ", " within " etc. understand It is including this number.
Those skilled in the art are it should be appreciated that the various embodiments described above can be provided as method, device or computer program product Product.These embodiments can be using complete hardware embodiment, complete software embodiment or the embodiment combining software and hardware aspect Form.All or part of step in the method that the various embodiments described above are related to can be instructed by program correlation hardware Lai Complete, described program can be stored in the storage medium that computer equipment can read, for executing the various embodiments described above side All or part of step described in method.Described computer equipment, including but not limited to:Personal computer, server, general-purpose computations Machine, special-purpose computer, the network equipment, embedded device, programmable device, intelligent mobile terminal, intelligent home device, Wearable Smart machine, vehicle intelligent equipment etc.;Described storage medium, including but not limited to:RAM, ROM, magnetic disc, tape, CD, sudden strain of a muscle Deposit, USB flash disk, portable hard drive, storage card, memory stick, webserver storage, network cloud storage etc..
The various embodiments described above are with reference to the method according to embodiment, equipment (system) and computer program Flow chart and/or block diagram are describing.It should be understood that can be by every in computer program instructions flowchart and/or block diagram Flow process in one flow process and/or square frame and flow chart and/or block diagram and/or the combination of square frame.These computers can be provided Programmed instruction to computer equipment processor to produce a machine so that by the finger of the computing device of computer equipment Order produces and is used for what realization was specified in one flow process of flow chart or multiple flow process and/or one square frame of block diagram or multiple square frame The device of function.
These computer program instructions may be alternatively stored in and the computer that computer equipment works in a specific way can be guided to set So that the instruction being stored in this computer equipment readable memory produces the manufacture including command device in standby readable memory Product, this command device is realized in one flow process of flow chart or multiple flow process and/or one square frame of block diagram or multiple square frame middle finger Fixed function.
These computer program instructions also can be loaded on computer equipment so that executing a series of on a computing device Operating procedure is to produce computer implemented process, thus the instruction executing on a computing device is provided for realizing in flow process The step of the function of specifying in one flow process of figure or multiple flow process and/or one square frame of block diagram or multiple square frame.
Although being described to the various embodiments described above, those skilled in the art once know basic wound The property made concept, then can make other change and modification to these embodiments, so the foregoing is only embodiments of the invention, Not thereby the equivalent structure that the scope of patent protection of the restriction present invention, every utilization description of the invention and accompanying drawing content are made Or equivalent flow conversion, or directly or indirectly it is used in other related technical fields, all include the patent in the present invention in the same manner Within protection domain.

Claims (10)

1. a kind of encryption method of fingerprint image data is it is characterised in that comprise the steps:
Binaryzation conversion process is done to original fingerprint view data, obtains a Serial No. to be encrypted;
It is encrypted using 256 kinds of combinations that preset-key may form to numeral to be encrypted, obtain cipher table;
Serial No. to be encrypted is grouped in units of 8 bytes, searches the corresponding password of each group in cipher table, and splice Password obtains encrypted result.
2. the encryption method of fingerprint image data as claimed in claim 1 is it is characterised in that step is " to original fingerprint image Data does binary conversion treatment " specifically include:With preset algorithm by the pixel value of each pixel in original fingerprint image classify as 0 or 255.
3. the encryption method of fingerprint image data as claimed in claim 2 is it is characterised in that described preset algorithm is specifically wrapped Include:
Judge that whether the pixel value of each pixel in image is more than predetermined threshold value, if more than the pixel value making this pixel is 255, otherwise for 0;Or
Calculate pre-set dimension region in pixel average and using this mean value as the pixel threshold in this region, judge region In each pixel pixel value whether more than the size of the pixel threshold in described region, if more than making the pixel value of this pixel For 255, otherwise for 0;Or
Calculate the adaptive threshold of each pixel in image with difference adaptive algorithm, and whether judge the pixel value of each pixel More than described adaptive threshold;If more than the pixel value making this pixel is 255, otherwise for 0.
4. the encryption method of fingerprint image data as claimed in claim 1 or 2 is it is characterised in that numeral to be encrypted may group Each combination in the 256 kinds of combinations becoming all comprises 8 numerals.
5. the encryption method of fingerprint image data as claimed in claim 1 or 2 is it is characterised in that step is " to numeral to be encrypted Sequence is grouped in units of 8 bytes, in cipher table search the corresponding password of each group, and splice password obtain encryption knot In really ", during splicing password to the splicing order of each group password with Serial No. to be encrypted is grouped in units of 8 bytes after Order of packets consistent.
6. a kind of encryption device of fingerprint image data is it is characterised in that include binaryzation converting unit, ciphering unit, storage Unit, grouped element, searching unit and concatenation unit;
Described binaryzation conversion unit is used for doing binaryzation conversion process to original fingerprint view data, obtains a numeral to be encrypted Sequence;
256 kinds of combinations that described ciphering unit is used for using preset-key may form to numeral to be encrypted are encrypted, and obtain Cipher table, described memory cell is used for storing described cipher table;
Described grouped element is used for Serial No. to be encrypted is grouped in units of 8 bytes, and described searching unit is used for The corresponding password of each group is searched, described concatenation unit is used for splicing password and obtains encrypted result in the cipher table of memory cell.
7. the encryption device of fingerprint image data as claimed in claim 6 is it is characterised in that binaryzation converting unit is to original Fingerprint image data does binary conversion treatment and specifically includes:With preset algorithm, the pixel value of each pixel in original fingerprint image is returned Class is 0 or 255.
8. the encryption device of fingerprint image data as claimed in claim 7 is it is characterised in that described preset algorithm is specifically wrapped Include:Judge that whether the pixel value of each pixel in image is more than predetermined threshold value, if more than the pixel value making this pixel is 255, otherwise for 0;Or
Calculate pre-set dimension region in pixel average and using this mean value as the pixel threshold in this region, judge region In each pixel pixel value whether more than the size of the pixel threshold in described region, if more than making the pixel value of this pixel For 255, otherwise for 0;Or
Calculate the adaptive threshold of each pixel in image with difference adaptive algorithm, and whether judge the pixel value of each pixel More than described adaptive threshold;If more than the pixel value making this pixel is 255, otherwise for 0.
9. the encryption device of fingerprint image data as claimed in claims 6 or 7 is it is characterised in that numeral to be encrypted may group Each combination in the 256 kinds of combinations becoming all comprises 8 numerals.
10. the encryption device of fingerprint image data as claimed in claims 6 or 7 is it is characterised in that concatenation unit splices password When the splicing order of each group password is grouped to Serial No. to be encrypted with grouped element in units of 8 bytes after packet Sequence consensus.
CN201610785868.6A 2016-08-31 2016-08-31 Encryption method and apparatus of fingerprint image data Pending CN106452779A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201610785868.6A CN106452779A (en) 2016-08-31 2016-08-31 Encryption method and apparatus of fingerprint image data
PCT/CN2017/096823 WO2018040878A1 (en) 2016-08-31 2017-08-10 Method and device for encrypting fingerprint image data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610785868.6A CN106452779A (en) 2016-08-31 2016-08-31 Encryption method and apparatus of fingerprint image data

Publications (1)

Publication Number Publication Date
CN106452779A true CN106452779A (en) 2017-02-22

Family

ID=58090573

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610785868.6A Pending CN106452779A (en) 2016-08-31 2016-08-31 Encryption method and apparatus of fingerprint image data

Country Status (2)

Country Link
CN (1) CN106452779A (en)
WO (1) WO2018040878A1 (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107659399A (en) * 2017-10-09 2018-02-02 四川巧夺天工信息安全智能设备有限公司 It is a kind of to be pretended, solved the method for camouflage to character based on not repeating key
WO2018040878A1 (en) * 2016-08-31 2018-03-08 福建联迪商用设备有限公司 Method and device for encrypting fingerprint image data
CN107977166A (en) * 2017-11-27 2018-05-01 广西塔锡科技有限公司 A kind of date storage method and system
CN110162951A (en) * 2019-05-28 2019-08-23 吉林无罔生物识别科技有限公司 Iris information registration and verification method, system and computer readable storage medium
CN110516462A (en) * 2019-08-30 2019-11-29 京东数字科技控股有限公司 Method and apparatus for encryption data
CN111476701A (en) * 2020-03-18 2020-07-31 创驱(上海)新能源科技有限公司 Digital image encryption method and decryption method based on Rijndael symmetric block encryption technology
CN116320202A (en) * 2023-03-15 2023-06-23 北京拙河科技有限公司 Camera image encryption method and device
CN117424968A (en) * 2023-12-15 2024-01-19 深圳市贝铂智能科技有限公司 Intelligent scanning data safety transmission method and device and intelligent scanning pen

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109918882B (en) * 2019-02-01 2023-11-21 维沃移动通信有限公司 Image encryption method and mobile terminal
CN115811577A (en) * 2022-12-09 2023-03-17 探长信息技术(苏州)有限公司 Video remote monitoring system for communication cabinet
CN116055131A (en) * 2022-12-26 2023-05-02 重庆至道科技股份有限公司 Working method for realizing data security encryption aiming at massive images
CN116347090B (en) * 2023-05-26 2023-08-11 深圳市科盾科技有限公司 Network information encryption method in big data environment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101206714A (en) * 2007-04-13 2008-06-25 李皓辰 Fingerprint identification method and fingerprint payment system based on DSP
CN104518865A (en) * 2014-12-12 2015-04-15 南京邮电大学 Data encryption method based on password book

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100412883C (en) * 2006-03-23 2008-08-20 北京中控科技发展有限公司 Fingerprint identifying method and system
CN101079102A (en) * 2007-06-28 2007-11-28 中南大学 Fingerprint identification method based on statistic method
CN101996321A (en) * 2009-08-24 2011-03-30 北京易创科技有限公司 Fingerprint recognition pretreatment method and device
CN106452779A (en) * 2016-08-31 2017-02-22 福建联迪商用设备有限公司 Encryption method and apparatus of fingerprint image data

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101206714A (en) * 2007-04-13 2008-06-25 李皓辰 Fingerprint identification method and fingerprint payment system based on DSP
CN104518865A (en) * 2014-12-12 2015-04-15 南京邮电大学 Data encryption method based on password book

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018040878A1 (en) * 2016-08-31 2018-03-08 福建联迪商用设备有限公司 Method and device for encrypting fingerprint image data
CN107659399A (en) * 2017-10-09 2018-02-02 四川巧夺天工信息安全智能设备有限公司 It is a kind of to be pretended, solved the method for camouflage to character based on not repeating key
CN107977166A (en) * 2017-11-27 2018-05-01 广西塔锡科技有限公司 A kind of date storage method and system
CN110162951A (en) * 2019-05-28 2019-08-23 吉林无罔生物识别科技有限公司 Iris information registration and verification method, system and computer readable storage medium
CN110516462A (en) * 2019-08-30 2019-11-29 京东数字科技控股有限公司 Method and apparatus for encryption data
CN111476701A (en) * 2020-03-18 2020-07-31 创驱(上海)新能源科技有限公司 Digital image encryption method and decryption method based on Rijndael symmetric block encryption technology
CN116320202A (en) * 2023-03-15 2023-06-23 北京拙河科技有限公司 Camera image encryption method and device
CN117424968A (en) * 2023-12-15 2024-01-19 深圳市贝铂智能科技有限公司 Intelligent scanning data safety transmission method and device and intelligent scanning pen

Also Published As

Publication number Publication date
WO2018040878A1 (en) 2018-03-08

Similar Documents

Publication Publication Date Title
CN106452779A (en) Encryption method and apparatus of fingerprint image data
TWI724579B (en) Block chain data processing method, device, system, processing equipment and storage medium
CN104283975B (en) Document distribution method and device
CN110224808B (en) Bank data sharing method and device based on block chain, computer equipment and storage medium
CN110266682B (en) Data encryption method and device, mobile terminal and decryption method
US10083194B2 (en) Process for obtaining candidate data from a remote storage server for comparison to a data to be identified
CN106874348A (en) File is stored and the method for indexing means, device and reading file
CN113742764B (en) Trusted data secure storage method, retrieval method and equipment based on block chain
CN106878367A (en) The implementation method and device of service interface asynchronous call
CN109460667A (en) Document handling method, system and terminal device in bidding and tendering process
CN104954329A (en) Method and apparatus for processing biological characteristic information
CN105827582A (en) Communication encryption method, device and system
CN108960645A (en) A kind of risk prevention system method, system and terminal device
CN117390657A (en) Data encryption method, device, computer equipment and storage medium
CN113590551A (en) Material digital extended format system, method, medium and equipment
CN111191253B (en) Data encryption combination method
CN112733169A (en) Data management method, system and terminal equipment based on block chain
CN110245520A (en) A kind of file enciphering method, file encryption device and terminal device
CN115757535A (en) Data query method, data storage method and device and electronic equipment
CN109255225A (en) Hard disc data security control apparatus based on dual-identity authentication
CN104008334A (en) Clustering method and device of files
CN106529328A (en) Secure storing method and device for picture files
CN106209349A (en) Data ciphering method based on 3DES algorithm and device
CN106570410B (en) Data encryption method, data decryption method, device and system
CN110363000A (en) Identify method, apparatus, electronic equipment and the storage medium of malicious file

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170222