CN106452779A - Encryption method and apparatus of fingerprint image data - Google Patents
Encryption method and apparatus of fingerprint image data Download PDFInfo
- Publication number
- CN106452779A CN106452779A CN201610785868.6A CN201610785868A CN106452779A CN 106452779 A CN106452779 A CN 106452779A CN 201610785868 A CN201610785868 A CN 201610785868A CN 106452779 A CN106452779 A CN 106452779A
- Authority
- CN
- China
- Prior art keywords
- pixel
- encrypted
- fingerprint image
- image data
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0625—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/50—Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Life Sciences & Earth Sciences (AREA)
- Biodiversity & Conservation Biology (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Collating Specific Patterns (AREA)
Abstract
The invention provides an encryption method of fingerprint image data, for providing a novel scheme for performing rapid encryption on fingerprint image big data and a 3DES algorithm. The method comprises the following steps: obtaining a digital sequence to be encrypted by performing binary conversion processing on original fingerprint image data; obtaining a cipher table by encrypting 256 combinations which may be composed of digits to be encrypted by use of a preset secret key; and performing grouping on the digital sequence to be encrypted by taking eight bytes as a unit, searching the cipher table for a password corresponding to each group, and obtaining an encryption result by splicing the passwords. The invention also simultaneously provides an encryption apparatus of fingerprint image data, for realizing the method. According to the technical scheme, when a large volume of fingerprint image data is encrypted by use of 3DES, the encryption time can be greatly shortened, and user experience is improved.
Description
Technical field
The present invention relates to fingerprint recognition and field of encryption, particularly to a kind of encryption method of fingerprint image data and dress
Put.
Background technology
In financial payment field, in addition to carrying out financial business transaction using traditional password, bio-identification is increasingly
Many is applied in payment transaction, such as fingerprint recognition.The hidden danger that traditional password presence is easily stolen, inputs password in addition
More time-consuming, Consumer's Experience is not good.And fingerprint recognition has uniqueness, also there is safer and more easily advantage.
Paid it is necessary first to by fingerprint data collection to backstage using fingerprint recognition, it usually needs collection (and plus
Close) multiple without overcompression fingerprint image data to backstage, in order to ensure the safety of fingerprint image data, need by terminal-pair
Fingerprint image data is encrypted, and encryption data is delivered to backstage, and encryption key is consulted to draw by backstage and terminal;AES
Be usually used is 3DES algorithm, and the data being about 500,000 bytes for size is encrypted, if calculated using the 3DES of standard
Method is encrypted, and 1024 bytes calculate 3DES, take around 20ms, total encryption times take around 10s, and this makes user's body
Test extreme difference.
Content of the invention
For this reason, it may be necessary to provide a kind of new scheme that fingerprint image big data is quickly encrypted with 3DES algorithm.
For achieving the above object, inventor provide a kind of encryption method of fingerprint image data, comprise the steps:
Binaryzation conversion process is done to original fingerprint view data, obtains a Serial No. to be encrypted;
It is encrypted using 256 kinds of combinations that preset-key may form to numeral to be encrypted, obtain cipher table;
Serial No. to be encrypted is grouped in units of 8 bytes, in cipher table, searches the corresponding password of each group, and
Splicing password obtains encrypted result.
Further, in the encryption method of described fingerprint image data, step " does two-value to original fingerprint view data
Change is processed " specifically include:The pixel value of each pixel in original fingerprint image is classified as by 0 or 255 with preset algorithm.
Further, in the encryption method of described fingerprint image data, described preset algorithm specifically includes:Judge image
In the pixel value of each pixel whether be more than predetermined threshold value, if more than the pixel value making this pixel is 255, otherwise for 0;Or
Calculate pixel average in the region of pre-set dimension and using this mean value as the pixel threshold in this region, judge
In region, whether the pixel value of each pixel is more than the size of the pixel threshold in described region, if being more than, makes the picture of this pixel
Element value is 255, otherwise for 0;Or
Calculate the adaptive threshold of each pixel in image with difference adaptive algorithm, and judge the pixel value of each pixel
Whether it is more than described adaptive threshold;If more than the pixel value making this pixel is 255, otherwise for 0.
Further, in the encryption method of described fingerprint image data, 256 kinds of combinations that numeral to be encrypted may form
In each combination all comprise 8 numerals.
Further, in the encryption method of described fingerprint image data, step is " to Serial No. to be encrypted with 8 bytes
It is grouped for unit, the lookup corresponding password of each group in cipher table, and is spliced password and obtained encrypted result " in, splicing is close
During code to the splicing order of each group password with Serial No. to be encrypted is grouped in units of 8 bytes after order of packets one
Cause.
Inventor additionally provides a kind of encryption device of fingerprint image data simultaneously, including binaryzation converting unit, encryption
Unit, memory cell, grouped element, searching unit and concatenation unit;
Described binaryzation conversion unit is used for doing binaryzation conversion process to original fingerprint view data, obtains one to be encrypted
Serial No.;
256 kinds of combinations that described ciphering unit is used for using preset-key may form to numeral to be encrypted are encrypted,
Obtain cipher table, described memory cell is used for storing described cipher table;
Described grouped element is used for Serial No. to be encrypted is grouped in units of 8 bytes, and described searching unit is used
In searching the corresponding password of each group in the cipher table of memory cell, described concatenation unit is used for splicing password and obtains encryption knot
Really.
Further, in the encryption device of described fingerprint image data, binaryzation converting unit is to original fingerprint image
Data is done binary conversion treatment and is specifically included:With preset algorithm by the pixel value of each pixel in original fingerprint image classify as 0 or
255.
Further, in the encryption device of described fingerprint image data, described preset algorithm specifically includes:Judge image
In the pixel value of each pixel whether be more than predetermined threshold value, if more than the pixel value making this pixel is 255, otherwise for 0;Or
Calculate pixel average in the region of pre-set dimension and using this mean value as the pixel threshold in this region, judge
In region, whether the pixel value of each pixel is more than the size of the pixel threshold in described region, if being more than, makes the picture of this pixel
Element value is 255, otherwise for 0;Or
Calculate the adaptive threshold of each pixel in image with difference adaptive algorithm, and judge the pixel value of each pixel
Whether it is more than described adaptive threshold;If more than the pixel value making this pixel is 255, otherwise for 0.
Further, in the encryption device of described fingerprint image data, 256 kinds of combinations that numeral to be encrypted may form
In each combination all comprise 8 numerals.
Further, in the encryption device of described fingerprint image data, to each group password during concatenation unit splicing password
Splicing order with grouped element, Serial No. to be encrypted is grouped in units of 8 bytes after order of packets consistent.
It is different from prior art, technique scheme carries out 3DES and carries out adding to the fingerprint image data being related to big data quantity
When close, can greatly shorten encryption times, improve Consumer's Experience.From the point of view of Consumer's Experience performance index, two field picture is carried out
The time of 3DES encryption is within 2s;And, when data volume infinitely increases, encryption times are held essentially constant.
Brief description
Fig. 1 is the flow chart of the encryption method of fingerprint image data described in an embodiment of the present invention;
Fig. 2 is the structural representation of the encryption device of fingerprint image data described in an embodiment of the present invention.
Description of reference numerals:
1- binaryzation converting unit
2- ciphering unit
3- memory cell
4- grouped element
5- searching unit
6- concatenation unit
Specific embodiment
By the technology contents of detailed description technical scheme, structural feature, realized purpose and effect, below in conjunction with concrete reality
Apply example and coordinate accompanying drawing to be explained in detail.
Refer to Fig. 1, be the flow chart of the encryption method of fingerprint image data described in an embodiment of the present invention;Described
Method comprises the steps:
S1, binaryzation conversion process is done to original fingerprint view data, obtain a Serial No. to be encrypted;
S2, using preset-key to be encrypted numeral may composition 256 kinds of combinations be encrypted, obtain cipher table;
S3, Serial No. to be encrypted is grouped in units of 8 bytes, cipher table is searched each group corresponding close
Code, and splice password and obtain encrypted result.
Further, in the encryption method of described fingerprint image data, described in step S1 " to original fingerprint picture number
According to doing binary conversion treatment " specifically include:With preset algorithm by the pixel value of each pixel in original fingerprint image classify as 0 or
255.
The pixel value gray value of the raw image data described in step S1 is between 0-255, special due to fingerprint image
Property, what Fingerprint recognition relied primarily on is fingerprint textural characteristics, as long as therefore not destroying the texture features of fingerprint image, permissible
Binary conversion treatment is carried out by fingerprint image, to simplify image data pixel values;By algorithm general at present, by image each
The pixel value of pixel is referred to 0 or 255, and then data to be encrypted is become by 0 or 255 by the sequence that different pixel values form
The sequence of composition.
Further, in present embodiment, described in step S1, preset algorithm is specially:Judge the picture of each pixel in image
Whether element value is more than predetermined threshold value, if more than the pixel value making this pixel is 255, otherwise for 0.
In other embodiments, described preset algorithm can also be:
Calculate pixel average in the region of pre-set dimension and using this mean value as the pixel threshold in this region, judge
In region, whether the pixel value of each pixel is more than the size of the pixel threshold in described region, if being more than, makes the picture of this pixel
Element value is 255, otherwise for 0;Or
Calculate the adaptive threshold of each pixel in image with difference adaptive algorithm, and judge the pixel value of each pixel
Whether it is more than described adaptive threshold;If more than the pixel value making this pixel is 255, otherwise for 0.
In the encryption method of the fingerprint image data described in present embodiment, 256 kinds of groups that numeral to be encrypted may form
In conjunction, each combination all comprises 8 numerals.
Further, in the encryption method of described fingerprint image data, step S3 is " to Serial No. to be encrypted with 8 words
Save and be grouped for unit, search the corresponding password of each group in cipher table, and splice password and obtain encrypted result " in, splicing
During password to the splicing order of each group password with Serial No. to be encrypted is grouped in units of 8 bytes after order of packets
Unanimously.
That is, present embodiment is exactly to make use of 3DES algorithm to have to enter row operation in units of 8 bytes, for many
The data of individual byte, 8 bytes are grouped for unit, encrypted result are spliced successively the feature of composition.For big data quantity number
According to being encrypted, the key value of use is identical, the data carrying out after binary conversion treatment is encrypted, with 8 bytes is
Unit is grouped, and each group each data only has two values:The be-encrypted data of 0 or 255, therefore 8 bytes is a sequence
Row are combined by the sequence of 0 and 255;The possible combination of 8 byte be-encrypted data, one has 256 kinds of combinations;As long as to above 256
Plant the data of combination, using key encryption it is possible to obtain corresponding 256 groups of corresponding encrypted result;And for big data quantity
Encryption, the encrypted result of any one 8 byte is it is only necessary to be can get by searching corresponding 256 kinds of encrypted result;For big
Data volume encrypted result, by 8 byte packet, searches the corresponding corresponding encrypted result of 8 bytes, then is obtained whole by each splicing
The encrypted result of individual big data quantity.
Refer to Fig. 2, be the structural representation of the encryption device of fingerprint image data described in an embodiment of the present invention;
The encryption device of described fingerprint image data include binaryzation converting unit 1, ciphering unit 2, memory cell 3, grouped element 4,
Searching unit 5 and concatenation unit 6;
Described binaryzation conversion unit 1 is used for doing binaryzation conversion process to original fingerprint view data, obtains one to be added
Close Serial No..The pixel value gray value of described raw image data between 0-255, due to the particularity of fingerprint image,
What Fingerprint recognition relied primarily on is fingerprint textural characteristics, as long as therefore not destroying the texture features of fingerprint image, Ke Yitong
Cross fingerprint image and carry out binary conversion treatment, to simplify image data pixel values;By algorithm general at present, by each picture of image
The pixel value of element is referred to 0 or 255, and then data to be encrypted is become by 0 or 255 group by the sequence that different pixel values form
The sequence becoming.
256 kinds of combinations that described ciphering unit 2 is used for using preset-key may form to numeral to be encrypted are encrypted,
Obtain cipher table, described memory cell 3 is used for storing described cipher table;
Described grouped element 4 is used for Serial No. to be encrypted is grouped in units of 8 bytes, described searching unit 5
For searching the corresponding password of each group in the cipher table of memory cell 3, described concatenation unit 6 is used for splicing password to be encrypted
Result.
Further, in the encryption device of described fingerprint image data, binaryzation converting unit 1 is to original fingerprint image
Data is done binary conversion treatment and is specifically included:With preset algorithm by the pixel value of each pixel in original fingerprint image classify as 0 or
255.
In the present embodiment, described preset algorithm is specially:Judge whether the pixel value of each pixel in image is more than
Predetermined threshold value, if more than the pixel value making this pixel is 255, otherwise for 0.
In other embodiments, described preset algorithm can also be:
Calculate pixel average in the region of pre-set dimension and using this mean value as the pixel threshold in this region, judge
In region, whether the pixel value of each pixel is more than the size of the pixel threshold in described region, if being more than, makes the picture of this pixel
Element value is 255, otherwise for 0;Or
Calculate the adaptive threshold of each pixel in image with difference adaptive algorithm, and judge the pixel value of each pixel
Whether it is more than described adaptive threshold;If more than the pixel value making this pixel is 255, otherwise for 0.
In present embodiment, each combination in 256 kinds of combinations that numeral to be encrypted may form all comprises 8 numerals.
Further, in the encryption device of described fingerprint image data, to each group password during concatenation unit 6 splicing password
Splicing order with grouped element 4, Serial No. to be encrypted is grouped in units of 8 bytes after order of packets consistent.
That is, present embodiment is exactly to make use of 3DES algorithm to have to enter row operation in units of 8 bytes, for many
The data of individual byte, 8 bytes are grouped for unit, encrypted result are spliced successively the feature of composition.For big data quantity number
According to being encrypted, the key value of use is identical, the data carrying out after binary conversion treatment is encrypted, with 8 bytes is
Unit is grouped, and each group each data only has two values:The be-encrypted data of 0 or 255, therefore 8 bytes is a sequence
Row are combined by the sequence of 0 and 255;The possible combination of 8 byte be-encrypted data, one has 256 kinds of combinations;As long as to above 256
Plant the data of combination, using key encryption it is possible to obtain corresponding 256 groups of corresponding encrypted result;And for big data quantity
Encryption, the encrypted result of any one 8 byte is it is only necessary to be can get by searching corresponding 256 kinds of encrypted result;For big
Data volume encrypted result, by 8 byte packet, searches the corresponding corresponding encrypted result of 8 bytes, then is obtained whole by each splicing
The encrypted result of individual big data quantity.
Refer to following table, be the efficiency comparative of technical solution of the present invention and normal 3DES encryption.
As can be seen here, it is different from prior art, the encryption device of fingerprint image data of the present invention and encryption method
When 3DES being carried out to the fingerprint image data being related to big data quantity being encrypted, can greatly shorten encryption times, improve user
Experience.From the point of view of Consumer's Experience performance index, two field picture is carried out with the time of 3DES encryption within 2s;And, work as data volume
During unlimited increase, encryption times are held essentially constant.
It should be noted that herein, such as first and second or the like relational terms are used merely to a reality
Body or operation are made a distinction with another entity or operation, and not necessarily require or imply these entities or deposit between operating
In any this actual relation or order.And, term " inclusion ", "comprising" or its any other variant are intended to
The comprising of nonexcludability, so that include a series of process of key elements, method, article or terminal device not only include those
Key element, but also include other key elements being not expressly set out, or also include for this process, method, article or end
The intrinsic key element of end equipment.In the absence of more restrictions, limited by sentence " including ... " or " comprising ... "
It is not excluded that also there is other key element in process, method, article or the terminal device including described key element in key element.This
Outward, herein, " more than ", " less than ", " exceeding " etc. be interpreted as not including this number;" more than ", " below ", " within " etc. understand
It is including this number.
Those skilled in the art are it should be appreciated that the various embodiments described above can be provided as method, device or computer program product
Product.These embodiments can be using complete hardware embodiment, complete software embodiment or the embodiment combining software and hardware aspect
Form.All or part of step in the method that the various embodiments described above are related to can be instructed by program correlation hardware Lai
Complete, described program can be stored in the storage medium that computer equipment can read, for executing the various embodiments described above side
All or part of step described in method.Described computer equipment, including but not limited to:Personal computer, server, general-purpose computations
Machine, special-purpose computer, the network equipment, embedded device, programmable device, intelligent mobile terminal, intelligent home device, Wearable
Smart machine, vehicle intelligent equipment etc.;Described storage medium, including but not limited to:RAM, ROM, magnetic disc, tape, CD, sudden strain of a muscle
Deposit, USB flash disk, portable hard drive, storage card, memory stick, webserver storage, network cloud storage etc..
The various embodiments described above are with reference to the method according to embodiment, equipment (system) and computer program
Flow chart and/or block diagram are describing.It should be understood that can be by every in computer program instructions flowchart and/or block diagram
Flow process in one flow process and/or square frame and flow chart and/or block diagram and/or the combination of square frame.These computers can be provided
Programmed instruction to computer equipment processor to produce a machine so that by the finger of the computing device of computer equipment
Order produces and is used for what realization was specified in one flow process of flow chart or multiple flow process and/or one square frame of block diagram or multiple square frame
The device of function.
These computer program instructions may be alternatively stored in and the computer that computer equipment works in a specific way can be guided to set
So that the instruction being stored in this computer equipment readable memory produces the manufacture including command device in standby readable memory
Product, this command device is realized in one flow process of flow chart or multiple flow process and/or one square frame of block diagram or multiple square frame middle finger
Fixed function.
These computer program instructions also can be loaded on computer equipment so that executing a series of on a computing device
Operating procedure is to produce computer implemented process, thus the instruction executing on a computing device is provided for realizing in flow process
The step of the function of specifying in one flow process of figure or multiple flow process and/or one square frame of block diagram or multiple square frame.
Although being described to the various embodiments described above, those skilled in the art once know basic wound
The property made concept, then can make other change and modification to these embodiments, so the foregoing is only embodiments of the invention,
Not thereby the equivalent structure that the scope of patent protection of the restriction present invention, every utilization description of the invention and accompanying drawing content are made
Or equivalent flow conversion, or directly or indirectly it is used in other related technical fields, all include the patent in the present invention in the same manner
Within protection domain.
Claims (10)
1. a kind of encryption method of fingerprint image data is it is characterised in that comprise the steps:
Binaryzation conversion process is done to original fingerprint view data, obtains a Serial No. to be encrypted;
It is encrypted using 256 kinds of combinations that preset-key may form to numeral to be encrypted, obtain cipher table;
Serial No. to be encrypted is grouped in units of 8 bytes, searches the corresponding password of each group in cipher table, and splice
Password obtains encrypted result.
2. the encryption method of fingerprint image data as claimed in claim 1 is it is characterised in that step is " to original fingerprint image
Data does binary conversion treatment " specifically include:With preset algorithm by the pixel value of each pixel in original fingerprint image classify as 0 or
255.
3. the encryption method of fingerprint image data as claimed in claim 2 is it is characterised in that described preset algorithm is specifically wrapped
Include:
Judge that whether the pixel value of each pixel in image is more than predetermined threshold value, if more than the pixel value making this pixel is
255, otherwise for 0;Or
Calculate pre-set dimension region in pixel average and using this mean value as the pixel threshold in this region, judge region
In each pixel pixel value whether more than the size of the pixel threshold in described region, if more than making the pixel value of this pixel
For 255, otherwise for 0;Or
Calculate the adaptive threshold of each pixel in image with difference adaptive algorithm, and whether judge the pixel value of each pixel
More than described adaptive threshold;If more than the pixel value making this pixel is 255, otherwise for 0.
4. the encryption method of fingerprint image data as claimed in claim 1 or 2 is it is characterised in that numeral to be encrypted may group
Each combination in the 256 kinds of combinations becoming all comprises 8 numerals.
5. the encryption method of fingerprint image data as claimed in claim 1 or 2 is it is characterised in that step is " to numeral to be encrypted
Sequence is grouped in units of 8 bytes, in cipher table search the corresponding password of each group, and splice password obtain encryption knot
In really ", during splicing password to the splicing order of each group password with Serial No. to be encrypted is grouped in units of 8 bytes after
Order of packets consistent.
6. a kind of encryption device of fingerprint image data is it is characterised in that include binaryzation converting unit, ciphering unit, storage
Unit, grouped element, searching unit and concatenation unit;
Described binaryzation conversion unit is used for doing binaryzation conversion process to original fingerprint view data, obtains a numeral to be encrypted
Sequence;
256 kinds of combinations that described ciphering unit is used for using preset-key may form to numeral to be encrypted are encrypted, and obtain
Cipher table, described memory cell is used for storing described cipher table;
Described grouped element is used for Serial No. to be encrypted is grouped in units of 8 bytes, and described searching unit is used for
The corresponding password of each group is searched, described concatenation unit is used for splicing password and obtains encrypted result in the cipher table of memory cell.
7. the encryption device of fingerprint image data as claimed in claim 6 is it is characterised in that binaryzation converting unit is to original
Fingerprint image data does binary conversion treatment and specifically includes:With preset algorithm, the pixel value of each pixel in original fingerprint image is returned
Class is 0 or 255.
8. the encryption device of fingerprint image data as claimed in claim 7 is it is characterised in that described preset algorithm is specifically wrapped
Include:Judge that whether the pixel value of each pixel in image is more than predetermined threshold value, if more than the pixel value making this pixel is
255, otherwise for 0;Or
Calculate pre-set dimension region in pixel average and using this mean value as the pixel threshold in this region, judge region
In each pixel pixel value whether more than the size of the pixel threshold in described region, if more than making the pixel value of this pixel
For 255, otherwise for 0;Or
Calculate the adaptive threshold of each pixel in image with difference adaptive algorithm, and whether judge the pixel value of each pixel
More than described adaptive threshold;If more than the pixel value making this pixel is 255, otherwise for 0.
9. the encryption device of fingerprint image data as claimed in claims 6 or 7 is it is characterised in that numeral to be encrypted may group
Each combination in the 256 kinds of combinations becoming all comprises 8 numerals.
10. the encryption device of fingerprint image data as claimed in claims 6 or 7 is it is characterised in that concatenation unit splices password
When the splicing order of each group password is grouped to Serial No. to be encrypted with grouped element in units of 8 bytes after packet
Sequence consensus.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610785868.6A CN106452779A (en) | 2016-08-31 | 2016-08-31 | Encryption method and apparatus of fingerprint image data |
PCT/CN2017/096823 WO2018040878A1 (en) | 2016-08-31 | 2017-08-10 | Method and device for encrypting fingerprint image data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610785868.6A CN106452779A (en) | 2016-08-31 | 2016-08-31 | Encryption method and apparatus of fingerprint image data |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106452779A true CN106452779A (en) | 2017-02-22 |
Family
ID=58090573
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610785868.6A Pending CN106452779A (en) | 2016-08-31 | 2016-08-31 | Encryption method and apparatus of fingerprint image data |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN106452779A (en) |
WO (1) | WO2018040878A1 (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107659399A (en) * | 2017-10-09 | 2018-02-02 | 四川巧夺天工信息安全智能设备有限公司 | It is a kind of to be pretended, solved the method for camouflage to character based on not repeating key |
WO2018040878A1 (en) * | 2016-08-31 | 2018-03-08 | 福建联迪商用设备有限公司 | Method and device for encrypting fingerprint image data |
CN107977166A (en) * | 2017-11-27 | 2018-05-01 | 广西塔锡科技有限公司 | A kind of date storage method and system |
CN110162951A (en) * | 2019-05-28 | 2019-08-23 | 吉林无罔生物识别科技有限公司 | Iris information registration and verification method, system and computer readable storage medium |
CN110516462A (en) * | 2019-08-30 | 2019-11-29 | 京东数字科技控股有限公司 | Method and apparatus for encryption data |
CN111476701A (en) * | 2020-03-18 | 2020-07-31 | 创驱(上海)新能源科技有限公司 | Digital image encryption method and decryption method based on Rijndael symmetric block encryption technology |
CN116320202A (en) * | 2023-03-15 | 2023-06-23 | 北京拙河科技有限公司 | Camera image encryption method and device |
CN117424968A (en) * | 2023-12-15 | 2024-01-19 | 深圳市贝铂智能科技有限公司 | Intelligent scanning data safety transmission method and device and intelligent scanning pen |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109918882B (en) * | 2019-02-01 | 2023-11-21 | 维沃移动通信有限公司 | Image encryption method and mobile terminal |
CN115811577A (en) * | 2022-12-09 | 2023-03-17 | 探长信息技术(苏州)有限公司 | Video remote monitoring system for communication cabinet |
CN116055131A (en) * | 2022-12-26 | 2023-05-02 | 重庆至道科技股份有限公司 | Working method for realizing data security encryption aiming at massive images |
CN116347090B (en) * | 2023-05-26 | 2023-08-11 | 深圳市科盾科技有限公司 | Network information encryption method in big data environment |
CN118368368B (en) * | 2024-06-17 | 2024-08-20 | 广东电网有限责任公司湛江供电局 | Encryption method, encryption device, storage medium and program product for aerial image |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101206714A (en) * | 2007-04-13 | 2008-06-25 | 李皓辰 | Fingerprint identification method and fingerprint payment system based on DSP |
CN104518865A (en) * | 2014-12-12 | 2015-04-15 | 南京邮电大学 | Data encryption method based on password book |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100412883C (en) * | 2006-03-23 | 2008-08-20 | 北京中控科技发展有限公司 | Fingerprint identifying method and system |
CN101079102A (en) * | 2007-06-28 | 2007-11-28 | 中南大学 | Fingerprint identification method based on statistic method |
CN101996321A (en) * | 2009-08-24 | 2011-03-30 | 北京易创科技有限公司 | Fingerprint recognition pretreatment method and device |
CN106452779A (en) * | 2016-08-31 | 2017-02-22 | 福建联迪商用设备有限公司 | Encryption method and apparatus of fingerprint image data |
-
2016
- 2016-08-31 CN CN201610785868.6A patent/CN106452779A/en active Pending
-
2017
- 2017-08-10 WO PCT/CN2017/096823 patent/WO2018040878A1/en active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101206714A (en) * | 2007-04-13 | 2008-06-25 | 李皓辰 | Fingerprint identification method and fingerprint payment system based on DSP |
CN104518865A (en) * | 2014-12-12 | 2015-04-15 | 南京邮电大学 | Data encryption method based on password book |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018040878A1 (en) * | 2016-08-31 | 2018-03-08 | 福建联迪商用设备有限公司 | Method and device for encrypting fingerprint image data |
CN107659399A (en) * | 2017-10-09 | 2018-02-02 | 四川巧夺天工信息安全智能设备有限公司 | It is a kind of to be pretended, solved the method for camouflage to character based on not repeating key |
CN107977166A (en) * | 2017-11-27 | 2018-05-01 | 广西塔锡科技有限公司 | A kind of date storage method and system |
CN110162951A (en) * | 2019-05-28 | 2019-08-23 | 吉林无罔生物识别科技有限公司 | Iris information registration and verification method, system and computer readable storage medium |
CN110516462A (en) * | 2019-08-30 | 2019-11-29 | 京东数字科技控股有限公司 | Method and apparatus for encryption data |
CN111476701A (en) * | 2020-03-18 | 2020-07-31 | 创驱(上海)新能源科技有限公司 | Digital image encryption method and decryption method based on Rijndael symmetric block encryption technology |
CN116320202A (en) * | 2023-03-15 | 2023-06-23 | 北京拙河科技有限公司 | Camera image encryption method and device |
CN117424968A (en) * | 2023-12-15 | 2024-01-19 | 深圳市贝铂智能科技有限公司 | Intelligent scanning data safety transmission method and device and intelligent scanning pen |
Also Published As
Publication number | Publication date |
---|---|
WO2018040878A1 (en) | 2018-03-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106452779A (en) | Encryption method and apparatus of fingerprint image data | |
TWI724579B (en) | Block chain data processing method, device, system, processing equipment and storage medium | |
CN110224808B (en) | Bank data sharing method and device based on block chain, computer equipment and storage medium | |
CN110266682B (en) | Data encryption method and device, mobile terminal and decryption method | |
US10083194B2 (en) | Process for obtaining candidate data from a remote storage server for comparison to a data to be identified | |
CN109460667A (en) | Document handling method, system and terminal device in bidding and tendering process | |
CN109409101B (en) | Data encryption method and terminal equipment | |
CN104954329A (en) | Method and apparatus for processing biological characteristic information | |
CN112733169A (en) | Data management method, system and terminal equipment based on block chain | |
CN117978446A (en) | Chip communication transmission encryption method, device, computer equipment and storage medium | |
CN110245520A (en) | A kind of file enciphering method, file encryption device and terminal device | |
CN111191253A (en) | Data encryption combination method | |
CN104008334A (en) | Clustering method and device of files | |
CN113590551A (en) | Material digital extended format system, method, medium and equipment | |
CN115757535A (en) | Data query method, data storage method and device and electronic equipment | |
CN106570410B (en) | Data encryption method, data decryption method, device and system | |
CN104821873B (en) | A kind of implementation method of cryptosecurity | |
CN109495444B (en) | Encryption request processing method | |
CN106209349A (en) | Data ciphering method based on 3DES algorithm and device | |
CN114095406B (en) | Ciphertext data confidentiality detection method and electronic device | |
CN106972925A (en) | A kind of information ciphering method and its device | |
CN105959327A (en) | Member information processing system | |
CN117667016A (en) | Random number generation method, device, computer equipment and storage medium | |
CN118036027A (en) | Data decryption method, device, computer equipment and storage medium | |
CN105205369A (en) | Palm vein image data processing method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170222 |