CN109787775A - A kind of safety certifying method based on Chen's chaotic system and finger vein auxiliary data - Google Patents

A kind of safety certifying method based on Chen's chaotic system and finger vein auxiliary data Download PDF

Info

Publication number
CN109787775A
CN109787775A CN201910170057.9A CN201910170057A CN109787775A CN 109787775 A CN109787775 A CN 109787775A CN 201910170057 A CN201910170057 A CN 201910170057A CN 109787775 A CN109787775 A CN 109787775A
Authority
CN
China
Prior art keywords
vein
chen
auxiliary data
image
global characteristics
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910170057.9A
Other languages
Chinese (zh)
Other versions
CN109787775B (en
Inventor
游林
蓝婷婷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Dianzi University
Original Assignee
Hangzhou Dianzi University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Dianzi University filed Critical Hangzhou Dianzi University
Priority to CN201910170057.9A priority Critical patent/CN109787775B/en
Publication of CN109787775A publication Critical patent/CN109787775A/en
Application granted granted Critical
Publication of CN109787775B publication Critical patent/CN109787775B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The present invention discloses a kind of safety certifying method based on Chen's chaotic system and finger vein auxiliary data, belongs to biometric secure and technical field of cryptology.The following steps are included: obtaining user refers to vein image, global characteristics template is extracted, storage refers to vein image centroid position;Scramble global characteristics template location of pixels is converted using Arnold Cat;Refer to that vein auxiliary data combination Chen's chaotic system encrypts global characteristics template grey scale pixel value;Encrypted finger vein global characteristics template matching is completed in encrypted domain.Present invention ensure that referring to the feasibility of the confidentiality of venous information, integrality and system, the function that scramble refers to vein pattern template location of pixels and encryption refers to vein pattern template grey scale pixel value is provided, effectively enhancing refers to that vein pattern template resists correlation analysis and resists the ability of Statistical Analysis Attacks;Auxiliary data is combined in ciphering process, there is larger key space, can be based on realizing on finger vein identity authorization system all kinds of.

Description

A kind of safety certifying method based on Chen's chaotic system and finger vein auxiliary data
Technical field
The invention belongs to biometric secures and technical field of cryptology, and in particular to one kind based on Chen's chaotic system with The safety certifying method for referring to vein auxiliary data, using referring to vein global characteristics template, refer to vein auxiliary data and Chen Shi chaos System is to complete user security identity authentication method.
Background technique
Refer to that vein is the biological characteristic under the finger epidermis, it is difficult to be stolen by physics, will not because of external environment and The variation of skin epidermis and generate change.Contactless acquisition device is safe from harm for human body, acquires the finger vein text of acquisition Part is small, and matching speed is fast.The above characteristic is widely used in this biometric technology in authentication further.
Refer to vein auxiliary data, from the finger vein pattern information of user.Refer to that the informational capacity of vein auxiliary data is remote Less than the overall information amount for referring to vein pattern, it will not reveal any significant information for referring to vein pattern about user, can be by it It is generated and is reconstructed using the key in encryption.
Chaos system conforms to the principle of simplicity unidirectionally to complicate development in recent years, compared to traditional cryptography Encryption Algorithm, chaos system pair In initial value is more sensitive or even subtle variation occurs for initial value, the corresponding chaos sequence generated can all have it is very big not Together;Chaos system have interior randomness, have it is difficult to predict and analysis complex behavior and ergodic;It is generated by chaos system Signal has the statistical information similar to white noise, can be considered a kind of pseudo-random signal.
If not doing any cryptographic operation in the form of plaintext applied in identity authorization system once finger venous information, this refers to Venous information will be highly prone to the threat of malicious attacker.Attacker can easily obtain the letter relevant to authentication Breath destroys the safety of identity authorization system to forge false user identity.Therefore, an effective and safe finger vein Identity authentication scheme becomes necessary research direction now.
" Biometric Data is proposed in Garima Mehta in 2016 and Malay Kishore Dutta Encryption using 3-D Chaotic System".It, will in the biological attribute data encipherment scheme that they are proposed The iris feature Template Information of user is encrypted by scramble location of pixels and the method for displacement grey scale pixel value.This method Although having biggish key space, capable of resisting part attack, have certain safety, there are still some defects for the program. Key for generating and reconstructing scrambled matrix fully rely on system generation, it is uncorrelated to user's own biological characteristic information so that The program can be substituted by other intimate schemes.And displacement grey scale pixel value used in scrambled matrix size with it is original Iris feature template size is different, once cracking this Partial encryption matrix, above-mentioned protection scheme has the risk being broken.
Summary of the invention
In view of the deficiencies of the prior art, the present invention provides a kind of based on Chen's chaotic system and refers to vein auxiliary data Safety certifying method can effectively avoid the danger being broken in the prior art, improve the reliability and peace for referring to hand vein recognition Quan Xing.
A kind of safety certifying method based on Chen's chaotic system and finger vein auxiliary data, comprising the following steps:
Step 1: obtaining user and refer to vein image, extract global characteristics template, storage refers to vein image centroid position;
Step 2: converting scramble global characteristics template location of pixels using Arnold Cat;
Step 3: referring to that vein auxiliary data combination Chen's chaotic system encrypts global characteristics template grey scale pixel value;
Step 4: the encrypted matching for referring to vein global characteristics template is completed in encrypted domain.
Further, the step 1 is specific as follows:
Step 1.1 obtains the original finger vein image of user, calculates and obtains image centroid position, is stored in database; The rotation correction of original image is completed using this centroid position information;ROI (the region of interest for referring to vein is obtained by child window Domain) image;
The effect of centroid position information is to complete the rotation correction of image using the information in image processing section;With In the verification process of family, by judging whether registration is in given threshold with the two centroid positions distance obtained when certification, determine Whether in database correct auxiliary data is obtained, to generate correct scrambled matrix;
Step 1.2 is extracted from current ROI image using Niblack algorithm refers to vein global characteristics template;To global special Sign template be filtered, fill, image thinning, be finally normalized to 64 × 96 image array, be set as: F.
Further, the step 2 is specific as follows:
Step 2.1: 64 × 96 global characteristics template F is cut, obtain 3 sizes be respectively 64 × 64,32 × 32,32 × 32 square subcharacter template, is set as: F1,F2,F3
Step 2.2: 4 location of pixels are randomly selected in current ROI image, are obtained respective pixel gray value, are set as: f1,f2,f3,f4;Random number of 4 ranges in [1,10000] is generated using randomizer, is set as: r1,r2,r3,r4;It will f1,f2,f3,f4With r1,r2,r3,r4It is corresponding to be multiplied: a1=f1×r1,b1=f2×r2,c1=f3×r3,d1=f4×r4, gained knot Fruit forms one 2 × 2 matrix, and it is 1 which, which need to meet, then regenerates matrix;The step is repeated It executes 3 times, obtains 32 × 2 mutually independent transformation matrixs, be set as: T1,T2,T3
Step 2.3: prompt user inputs 3 the number of iterations, is set as: k1,k2,k3, value range is [1,108- 1], k1, k2,k3It is considered as first key group, is set as K1 (k1,k2,k3), it is voluntarily taken care of by user;
User need to correctly enter this 3 the number of iterations in certification, if input error, it will and cause subsequent result to malfunction, Last authentification failure;
Resulting 3 sub- feature templates, 3 transformation matrixs and 3 the number of iterations are respectively corresponded entrance by step 2.4 In Arnold Cat transformation;Transformed 3 sub- feature templates are spliced into global characteristics template after 64 × 96 transformation again, It is set as: FT1
Further, the step 3 is specific as follows:
Step 3.1: it is random to generate 8 row values and 8 train values, it is set as: n1,n2,n3,n4,n5,n6,n7,n8With m1,m2,m3, m4,m5,m6,m7,m8, the range of ranks value is by currently referring to that vein ROI image size determines;According to these ranks values in current ROI Corresponding 8 grey scale pixel values are obtained in image, are set as: g (n1,m1),g(n2,m2),g(n3,m3),g(n4,m4),g(n5,m5), g(n6,m6),g(n7,m7),g(n8,m8);
Step 3.2: current resulting 8 gray values being converted to 8bit binary numbers, and shape is spliced in front and back two-by-two At 4 16bit binary numbers, it is set as: q1,q2,q3,q4;x0=q1⊕q2⊕q3⊕q4, x0As entrance Chen Shi chaos system First initial value of system;
By x0It is expressed as 16bit binary numbers: x0=x01 x02 x03…x014 x015 x016, x0Ring shift left one, Obtain second initial value y0=x016 x01 x02 x03…x014 x015, ring shift left two, obtain third initial value z0= x015 x016 x01 x02 x03…x014
(x0,y0,z0) it is considered as second key group, it is set as K2 (x0,y0,z0);
Step 3.3: by the initial value (x of acquisition0,y0,z0) substitute into Chen Shi chaotic maps, 192 acquisitions of iteration are corresponding Chaos sequence group, is set as: (L1,L2,L3);Wherein L1,L2,L3One group of chaos sequence is respectively represented, the element number of every group of sequence is equal It is 192;
Step 3.4: retaining L1,L2,L3, L4=L1⊕L2⊕L3, by L1,L2,L3,L4Middle all elements are arranged to make up size 8 × 96 sub- scrambled matrixs;
Step 3.5: above-mentioned 4 steps being repeated into 8 sub- scrambled matrixs for obtaining 8 sizes and being 8 × 96, will be owned Sub- scrambled matrix splicing, obtains the scrambled matrix E for replacing grey scale pixel value, and size is 64 × 96;
Step 3.6: prompt user inputs storage password ps, which is used to store 64 pairs of ranks value, user is facilitated to exist It is extracted when certification;In addition, 64 gray values can be otherwise stored, user's input password in certification cannot be extracted directly;
Step 3.7: by the finger vein global characteristics FT of scramble location of pixels1Template and scrambled matrix E exclusive or: FE1= FT1⊕ E obtains the encrypted feature templates FE of gray value1, it is stored in database, facilitates when certification for matching, arrives this User's registration is completed.
Further, the step 3 includes:
Step 3.8: when family authenticates, the password ps of information is stored when user being prompted to input registration, judges current input port Ps' is enabled to correct errors.If password ps' is correct, 64 ranks values for being stored in database are extracted;Such as password ps' mistake, current authentication is terminated Process.
Further, the step 3 includes:
Step 3.9: calculating finger vein image centroid position obtained in verification process and be stored in centroid position in database The distance between, parasang here is indicated with element number;
Step 3.10: judging distance whether in given threshold;If two centroid position distances in [0,3], extract registration When 64 gray values being stored in database profession, directly constitute scrambled matrix using these auxiliary datas;If not in [0,3], Using the 64 row values and train value of extraction, gray value is obtained in current ROI image according to corresponding position to generate scrambled matrix And the finger venous information for prompting user currently processed may be wrong;
Step 3.11: the scrambled matrix E ' and the current feature templates FT ' for completing position scramble being currently generated1Exclusive or: FE '1 =FT '1⊕ E ' obtains the global characteristics template FE ' that gray value in verification process has been encrypted1
Further, the Chen Shi chaotic maps expression formula is as follows:
Further, in the step 3.3, first time modulo operation, modulus are all carried out to the result of iteration each time Take 2048;After completing iteration, it can be utilized in order to ensure iterative data can fill, to L1,L2,L3Each of element carry out the Secondary modulus, modulus take 256, so that last data are all distributed among [0,255].
Further, the step 4 is specific as follows:
Step 4.1: FE ' is calculated in encrypted domain1With FE1Between distance, parasang indicates with element number;
Step 4.2: judging distance whether in given threshold;If the distance is in [0,1], user authentication success;If no In [0,1], user authentication failure.
Beneficial effects of the present invention: the present invention provides a kind of based on Chen's chaotic system and refers to the peace of vein auxiliary data Full certificate scheme, providing one kind for all kinds of identity authorization systems based on finger vein features, generation key and protection are original indirectly Refer to the method for vein pattern information security, it is ensured that refer to the feasibility of the confidentiality of venous information, integrality and system.The present invention mentions Refer to that vein pattern template location of pixels and encryption refer to the function of vein pattern template grey scale pixel value for scramble, effectively enhancing refers to quiet Arteries and veins feature templates resist correlation analysis and resist the ability of Statistical Analysis Attacks;Auxiliary data is combined in ciphering process, With larger key space (about 3.4 × 1062).The present invention can be used in all systems for having and referring to vein authentication, With very strong replicability.
Detailed description of the invention
Safety certification program flow chart of the Fig. 1 based on Chen's chaotic system and finger vein auxiliary data;
The number of iterations of Fig. 2 input error leads to the schematic diagram of authentification failure;
The schematic diagram of Fig. 3 user registration success;
Fig. 4 refers to that vein centroid distance mismatches the schematic diagram for leading to authentification failure;
Fig. 5 user inputs schematic diagram of the correct data by authentication.
Specific embodiment
Technical solution of the present invention is described further below in conjunction with Figure of description.
A kind of safety certifying method based on Chen's chaotic system and finger vein auxiliary data is as shown in Figure 1, include obtaining User refers to vein image, extracts global characteristics template, and storage refers to vein image centroid position information;It is converted using Arnold Cat Scramble global characteristics template location of pixels;Refer to vein auxiliary data combination Chen's chaotic system encryption global characteristics template pixel ash Angle value;Encrypted feature templates are stored for template matching when authenticating;It prompts user to input storage password, stores respective counts According to.When certification, the centroid position distance obtained when the centroid position currently obtained and registration is compared, judges whether directly to extract auxiliary Help data for reconstructing scrambled matrix;Encrypted feature templates matching is completed in encrypted domain.
1, user refers to vein global characteristics template extraction part, the specific steps of which are as follows:
1.1 obtain the original finger vein image of user, calculate the centroid position of image, the centroid position for referring to vein image is deposited In database;The rotation correction of original image is completed using the centroid position information;The ROI for referring to vein is obtained by child window (area-of-interest) image.
The effect of centroid position information is to complete the rotation correction of image using the information in image processing section;With In the verification process of family, by judging whether registration is in given threshold at a distance from 2 mass center information that certification obtains, to sentence It is disconnected whether to obtain correct auxiliary data in database, to generate correct scrambled matrix.It is effectively dropped using centroid position information Refusing in low verification process is sincere.
1.2 are extracted from obtained finger vein ROI image using Niblack algorithm and refer to vein global characteristics template;It will mention The global characteristics template taken is filtered, fills, image thinning, is finally normalized to 64 × 96 image array, is set as F.Rule of thumb, the present invention recommends in Niblack algorithm, and setting window size is 4, coefficient 0.05.
2, Arnold Cat transformation scramble refers to vein global characteristics template location of pixels, the specific steps of which are as follows:
2.1 cut 64 × 96 finger vein global characteristics template F, obtain 3 sizes be respectively 64 × 64,32 × 32,32 × 32 square subcharacter template, is set as F1,F2,F3
2.2 randomly select 4 location of pixels in referring to vein ROI image, obtain corresponding grey scale pixel value, if Are as follows: f1,f2,f3,f4;Random number of 4 ranges in [1,10000] is generated using randomizer, is set as: r1,r2,r3, r4;By f1,f2,f3,f4With r1,r2,r3,r4It is corresponding to be multiplied: a1=f1×r1,b1=f2×r2,c1=f3×r3,d1=f4×r4, institute Obtain the matrix that result forms one 2 × 2.
As shown in the Arnold Cat mapping following expression generally used now:
Wherein, xn, ynFor the grayscale position of pixel, M is the size of the image handled instantly, and a, b, c, d meet following item Part:
If 2 × 2 matrix determinant meets determinant (2), which is considered as an effective transformation matrix;If No enough row column (2), then regenerate matrix, until meeting the condition of determinant (2).The step is repeated 3 times, is obtained The mutually independent transformation matrix for obtaining 32 × 2, is set as T1,T2,T3
2.3 prompt users input 3 the number of iterations, are set as: k1,k2,k3, value range is [1,108- 1], k1,k2,k3Quilt It is considered as first key group, is set as K1 (k1,k2,k3), it is voluntarily taken care of by user.
User need to correctly enter this 3 the number of iterations in certification, if input error, it will and cause subsequent result to malfunction, Last authentification failure is as shown in Figure 2.
2.4 respectively correspond resulting 3 sub- feature templates, 3 transformation matrixs and 3 the number of iterations into Arnold In Cat transformation;Transformed 3 sub- feature templates are spliced into 64 × 96 transformed global characteristics template again, are set as FT1
The purpose of the step is the correlation destroyed between primitive character template data, resists related coefficient attack, and reach To basic visual confusion purpose.
But since the Arnold Cat mapping shaped like expression formula (1) is easy to produce the period, if this means that attacker tastes It pinged the method for exhaustion and frequently enters different the number of iterations, it is likely that the feature templates that can generate forgery are converted in Arnold Cat Afterwards, the case where some is original correct transformation results.Further, since scramble location of pixels can't be to pixel grey scale Value generates substantive influence, and transformed feature templates can not still resist Statistical Analysis Attacks, therefore just need to character modules Plate grey scale pixel value carries out cryptographic operation, to guarantee that user refers to the safety of venous information.
3, refer to vein auxiliary data combination Chen's chaotic system encrypted feature template grey scale pixel value.
3.1 random 8 row values of generation and 8 train values, are set as n1,n2,n3,n4,n5,n6,n7,n8With m1,m2,m3,m4,m5, m6,m7,m8, the range of ranks value is by currently referring to that the size of vein ROI image determines;According to these ranks values in current ROI image It is middle to obtain corresponding 8 grey scale pixel values, it is set as: g (n1,m1),g(n2,m2),g(n3,m3),g(n4,m4),g(n5,m5),g(n6, m6),g(n7,m7),g(n8,m8)。
Due to the number of pixels in ROI image be much larger than 8, arbitrarily obtain 8 grey scale pixel values will not reveal it is any about User refers to the significant information of vein pattern, these grey scale pixel values can be considered as auxiliary data, these auxiliary datas be used to give birth to At the subsequent key for encrypting and using.
3.2 are converted to current resulting 8 gray values 8bit binary numbers, and front and back is spliced to form 4 two-by-two 16bit bit, is set as: q1,q2,q3,q4;x0=q1⊕q2⊕q3⊕q4, x0First as entrance Chen's chaotic system A initial value.
By x0It is expressed as 16bit binary numbers: x0=x01 x02 x03…x014 x015 x016 ,x0Ring shift left one Position, obtains second initial value y0=x016 x01 x02 x03…x014 x015, two acquisition third initial value z of ring shift left0= x015 x016 x01 x02 x03…x014
x0,y0,z0It is considered as second key group, is set as K2 (x0,y0,z0)。
The Chen's chaotic system being used herein belongs to three-dimensional chaotic system, need to be entered simultaneously using 3 initial values mixed Ignorant mapping generates corresponding chaos sequence.The one-dimensional chaos system generally used is compared, Chen's chaotic system may be implemented quickly Diffusion has higher randomness and unpredictability, and key space is bigger, thus it is stronger to resist attacking ability.At this The Chen Shi chaotic maps expression formula that scheme uses is as follows:
3.3 by the initial value (x of acquisition0,y0,z0) substitute into Chen Shi chaotic maps, obtain corresponding chaos iteration 192 times Sequence group, is set as: (L1,L2,L3).Wherein L1,L2,L3One group of sequence is respectively represented, the element number of every group of sequence is 192.
It is excessive beyond Computing ability in order to avoid generating data in calculating, herein to iteration each time As a result first time modulo operation is all carried out, modulus takes 2048;After completing iteration, it can be utilized in order to ensure iterative data can fill, To L1,L2,L3Each of element carry out second of modulus, modulus takes 256.In this way, being distributed in last data all [0,255] among.
3.4 retain L1,L2,L3。L4=L1⊕L2⊕L3, by L1,L2,L3,L4It is 8 × 96 that middle all elements, which are arranged to make up size, Sub- scrambled matrix.
Above-mentioned 4 steps are repeated 8 sub- scrambled matrixs for obtaining 8 sizes and being 8 × 96 by 3.5, and all sons are added Close matrix splicing, obtains the scrambled matrix E for replacing grey scale pixel value.Matrix E size is 64 × 96.
3.6 prompt users input storage password ps, which facilitates user to mention in certification for storing 64 pairs of ranks values It takes;In addition, 64 gray values can be otherwise stored, user input password ps in certification cannot be extracted directly.
3.7 by the finger vein global characteristics template FT of scramble location of pixels1With scrambled matrix E exclusive or: FE1=FT1⊕ E, is obtained Obtain encrypted feature templates FE1.It is stored in database, is facilitated when certification for matching.
It is completed to this user's registration function, display window, which is informed, currently to succeed in registration as shown in Figure 3.
In user authentication, the scramble of the extraction and feature templates location of pixels that refer to vein pattern template all with registration when Step is identical, but has a little difference in the whole process for generating above-mentioned scrambled matrix.Due to noise, the shadow of the factors such as acquisition angles It rings, the gray value that the same finger vein of same user generates image in each acquisition can all have certain minor deviations.
Corresponding gray value is obtained in current ROI image according only to 64 ranks values in database, it is heavy using its It is new to constitute initial value x0′,y0′,z0', and then constitute new scrambled matrix E '.According to chaos system for initial value it is sensitive according to Lai Xing, being very different when making chaos sequence compared to registration due to the difference of initial value, the E ' so generated must There is very big difference with the scrambled matrix E generated when registration.This meeting so that this programme in certification there are it is high refuse it is sincere.
In user authentication, prompt user inputs the password ps that information is stored when registration, the current input of judgement first for 3.8 events Password ps ' corrects errors.If password ps ' is correct, 64 ranks values for being stored in database are extracted;Such as password ps ' mistake, termination is currently recognized Card process.
Refer to vein image centroid position obtained in 3.9 calculating verification process and is stored in database between centroid position Distance, parasang here are indicated with element number.
If 3.10 two centroid position distances in threshold value [0, μ], extract 64 gray scales being stored in database profession when registration Value directly constitutes scrambled matrix using these auxiliary datas;If using 64 ranks values of extraction, being pressed not in threshold value [0, μ] The finger vein letter for obtaining gray value in current ROI image according to corresponding position to generate scrambled matrix and prompt user currently processed Breath may be wrong as shown in Figure 4.Rule of thumb, threshold value is recommended to be set as [0,3].
The 3.11 scrambled matrix E ' the being currently generated and current feature templates FT ' for completing position scramble1Exclusive or: FE '1= FT′1⊕ E ' obtains the global characteristics template FE ' that gray value in verification process has been encrypted1
4, template matching is carried out in encrypted domain
4.1 because be by feature templates FT for the cryptographic operation of gray value1With scrambled matrix E carry out exclusive or, therefore with Family certification matching process in, only need to be calculated in encrypted domain two it is encrypted after feature templates between distance.
If 4.2 distances, in the threshold value of design of scheme, user authentication success is as shown in Figure 5;Conversely, user authentication loses It loses.According to real experience, threshold value is recommended to be set as [0,1].
A kind of safety certification scheme based on Chen's chaotic system and finger vein auxiliary data of the present invention, and it is unlimited Description in specification and embodiments.All within the spirits and principles of the present invention, any modification for being made is replaced on an equal basis It changes, improve, be all contained within scope of the presently claimed invention.

Claims (9)

1. a kind of safety certifying method based on Chen's chaotic system and finger vein auxiliary data, it is characterised in that including following step It is rapid:
Step 1: obtaining user and refer to vein image, extract global characteristics template, storage refers to vein image centroid position;
Step 2: converting scramble global characteristics template location of pixels using Arnold Cat;
Step 3: referring to that vein auxiliary data combination Chen's chaotic system encrypts global characteristics template grey scale pixel value;
Step 4: the encrypted matching for referring to vein global characteristics template is completed in encrypted domain.
2. a kind of safety certifying method based on Chen's chaotic system and finger vein auxiliary data according to claim 1, It is characterized in that the step 1 is specific as follows:
Step 1.1 obtains the original finger vein image of user, calculates and obtains image centroid position, is stored in database;It utilizes The rotation correction of this centroid position information completion original image;ROI (area-of-interest) figure for referring to vein is obtained by child window Picture;
The effect of centroid position information is to complete the rotation correction of image using the information in image processing section;Recognize in user During card, by judging whether registration is in given threshold with the two centroid positions distance obtained when certification, decide whether Correct auxiliary data in database is obtained, to generate correct scrambled matrix;
Step 1.2 is extracted from current ROI image using Niblack algorithm refers to vein global characteristics template;To global characteristics mould Plate is filtered, fills, image thinning, is finally normalized to 64 × 96 image array, is set as: F.
3. a kind of safety certifying method based on Chen's chaotic system and finger vein auxiliary data according to claim 2, It is characterized in that the step 2 is specific as follows:
Step 2.1: 64 × 96 global characteristics template F being cut, obtaining 3 sizes is respectively 64 × 64,32 × 32,32 × 32 square subcharacter template, is set as: F1,F2,F3
Step 2.2: randomly selecting 4 location of pixels in current ROI image, obtain respective pixel gray value, be set as: f1,f2, f3,f4;Random number of 4 ranges in [1,10000] is generated using randomizer, is set as: r1,r2,r3,r4;By f1,f2, f3,f4With r1,r2,r3,r4It is corresponding to be multiplied: a1=f1×r1,b1=f2×r2,c1=f3×r3,d1=f4×r4, acquired results composition One 2 × 2 matrix, it is 1 which, which need to meet, then regenerates matrix;The step is repeated 3 It is secondary, 32 × 2 mutually independent transformation matrixs are obtained, are set as: T1,T2,T3
Step 2.3: prompt user inputs 3 the number of iterations, is set as: k1,k2,k3, value range is [1,108- 1], k1,k2,k3 It is considered as first key group, is set as K1 (k1,k2,k3), it is voluntarily taken care of by user;
User need to correctly enter this 3 the number of iterations in certification, if input error, it will cause subsequent result to malfunction, finally Authentification failure;
Step 2.4 respectively corresponds resulting 3 sub- feature templates, 3 transformation matrixs and 3 the number of iterations into Arnold In Cat transformation;Transformed 3 sub- feature templates are spliced into global characteristics template after 64 × 96 transformation again, are set as: FT1
4. a kind of safety certifying method based on Chen's chaotic system and finger vein auxiliary data according to claim 1, It is characterized in that the step 3 is specific as follows:
Step 3.1: it is random to generate 8 row values and 8 train values, it is set as: n1,n2,n3,n4,n5,n6,n7,n8With m1,m2,m3,m4,m5, m6,m7,m8, the range of ranks value is by currently referring to that vein ROI image size determines;According to these ranks values in current ROI image Corresponding 8 grey scale pixel values are obtained, are set as: g (n1,m1),g(n2,m2),g(n3,m3),g(n4,m4),g(n5,m5),g(n6, m6),g(n7,m7),g(n8,m8);
Step 3.2: current resulting 8 gray values being converted to 8bit binary numbers, and front and back is spliced to form 4 two-by-two 16bit binary numbers, are set as: q1,q2,q3,q4;x0=q1⊕q2⊕q3⊕q4, x0As entering the of Chen's chaotic system One initial value;
By x0It is expressed as 16bit binary numbers: x0=x01 x02 x03…x014 x015 x016, x0It ring shift left one, obtains Second initial value y0=x016 x01 x02 x03…x014 x015, ring shift left two, obtain third initial value z0=x015 x016 x01 x02 x03…x014
(x0,y0,z0) it is considered as second key group, it is set as K2 (x0,y0,z0);
Step 3.3: by the initial value (x of acquisition0,y0,z0) substitute into Chen Shi chaotic maps, obtain corresponding chaos iteration 192 times Sequence group, is set as: (L1,L2,L3);Wherein L1,L2,L3One group of chaos sequence is respectively represented, the element number of every group of sequence is 192;
Step 3.4: retaining L1,L2,L3, L4=L1⊕L2⊕L3, by L1,L2,L3,L4Middle all elements be arranged to make up size be 8 × 96 sub- scrambled matrixs;
Step 3.5: above-mentioned 4 steps being repeated into 8 sub- scrambled matrixs for obtaining 8 sizes and being 8 × 96, all sons are added Close matrix splicing, obtains the scrambled matrix E for replacing grey scale pixel value, and size is 64 × 96;
Step 3.6: prompt user inputs storage password ps, which is used to store 64 pairs of ranks value, user is facilitated to authenticate When extract;In addition, 64 gray values can be otherwise stored, user's input password in certification cannot be extracted directly;
Step 3.7: by the finger vein global characteristics FT of scramble location of pixels1Template and scrambled matrix E exclusive or: FE1=FT1 ⊕ E obtains the encrypted feature templates FE of gray value1, it is stored in database, is facilitated for matching when certification, to this use Family registration is completed.
5. a kind of safety certifying method based on Chen's chaotic system and finger vein auxiliary data according to claim 4, It is characterized in that the step 3 includes:
Step 3.8: when family authenticates, the password ps of information is stored when user being prompted to input registration, judges current input password ps' It corrects errors.If password ps' is correct, 64 ranks values for being stored in database are extracted;Such as password ps' mistake, current authentication process is terminated.
6. a kind of safety certifying method based on Chen's chaotic system and finger vein auxiliary data according to claim 5, It is characterized in that the step 3 includes:
Step 3.9: calculating finger vein image centroid position obtained in verification process and be stored in database between centroid position Distance, parasang here indicates with element number;
Step 3.10: judging distance whether in given threshold;If two centroid position distances in [0,3], are deposited when extracting registration 64 gray values being stored in database directly constitute scrambled matrix using these auxiliary datas;If being utilized not in [0,3] The 64 row values and train value extracted, obtain gray value in current ROI image according to corresponding position to generate scrambled matrix and mention Show that the currently processed finger venous information of user may be wrong;
Step 3.11: the scrambled matrix E ' and the current feature templates FT ' for completing position scramble being currently generated1Exclusive or: FE '1= FT′1⊕ E ' obtains the global characteristics template FE ' that gray value in verification process has been encrypted1
7. a kind of safety certifying method based on Chen's chaotic system and finger vein auxiliary data according to claim 4, It is characterized in that the Chen Shi chaotic maps expression formula is as follows:
8. a kind of safety certifying method based on Chen's chaotic system and finger vein auxiliary data according to claim 4, It is characterized in that all carrying out first time modulo operation to the result of iteration each time, modulus takes 2048 in the step 3.3; After completing iteration, it can be utilized in order to ensure iterative data can fill, to L1,L2,L3Each of element taken for the second time Mould, modulus take 256, so that last data are all distributed among [0,255].
9. a kind of safety certifying method based on Chen's chaotic system and finger vein auxiliary data according to claim 1, It is characterized in that the step 4 is specific as follows:
Step 4.1: FE ' is calculated in encrypted domain1With FE1Between distance, parasang indicates with element number;
Step 4.2: judging distance whether in given threshold;If the distance is in [0,1], user authentication success;If not [0, 1] in, user authentication failure.
CN201910170057.9A 2019-03-06 2019-03-06 Security authentication method based on Chen chaos system and finger vein auxiliary data Active CN109787775B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910170057.9A CN109787775B (en) 2019-03-06 2019-03-06 Security authentication method based on Chen chaos system and finger vein auxiliary data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910170057.9A CN109787775B (en) 2019-03-06 2019-03-06 Security authentication method based on Chen chaos system and finger vein auxiliary data

Publications (2)

Publication Number Publication Date
CN109787775A true CN109787775A (en) 2019-05-21
CN109787775B CN109787775B (en) 2021-10-22

Family

ID=66486280

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910170057.9A Active CN109787775B (en) 2019-03-06 2019-03-06 Security authentication method based on Chen chaos system and finger vein auxiliary data

Country Status (1)

Country Link
CN (1) CN109787775B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113034139A (en) * 2021-03-15 2021-06-25 中国人民大学 Block chain multi-currency wallet based on living body biological feature authentication and implementation method thereof

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103731271A (en) * 2013-12-30 2014-04-16 北京工业大学 On-line face identity authentication method based on homomorphic encrypting and chaotic scrambling
US20170161905A1 (en) * 2015-12-07 2017-06-08 Avigilon Analytics Corporation System and method for background and foreground segmentation
CN107169444A (en) * 2017-05-11 2017-09-15 重庆科技学院 Finger vein recognition system and method based on smart mobile phone separating treatment
CN109190509A (en) * 2018-08-13 2019-01-11 阿里巴巴集团控股有限公司 A kind of personal identification method, device and computer readable storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103731271A (en) * 2013-12-30 2014-04-16 北京工业大学 On-line face identity authentication method based on homomorphic encrypting and chaotic scrambling
US20170161905A1 (en) * 2015-12-07 2017-06-08 Avigilon Analytics Corporation System and method for background and foreground segmentation
CN107169444A (en) * 2017-05-11 2017-09-15 重庆科技学院 Finger vein recognition system and method based on smart mobile phone separating treatment
CN109190509A (en) * 2018-08-13 2019-01-11 阿里巴巴集团控股有限公司 A kind of personal identification method, device and computer readable storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
GARIMA MEHTA; MALAY KISHORE DUTTA; PYUNG SOOKIM: "《Biometric Data Encryption using 3-D Chaotic System》", 《2016 2ND INTERNATIONAL CONFERENCE ON COMMUNICATION CONTROL AND INTELLIGENT SYSTEMS (CCIS)》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113034139A (en) * 2021-03-15 2021-06-25 中国人民大学 Block chain multi-currency wallet based on living body biological feature authentication and implementation method thereof
CN113034139B (en) * 2021-03-15 2023-12-26 中国人民大学 Block chain multi-coin wallet based on living organism biological characteristic authentication and implementation method thereof

Also Published As

Publication number Publication date
CN109787775B (en) 2021-10-22

Similar Documents

Publication Publication Date Title
Lee et al. Biometric key binding: Fuzzy vault based on iris images
Uludag et al. Biometric cryptosystems: issues and challenges
Lee et al. A new method for generating an invariant iris private key based on the fuzzy vault system
Gaddam et al. Efficient Cancelable Biometric Key Generation Scheme for Cryptography.
Leng et al. Dual-key-binding cancelable palmprint cryptosystem for palmprint protection and information security
Joshi et al. Security vulnerabilities against fingerprint biometric system
Cavoukian et al. Biometric encryption: The new breed of untraceable biometrics
Moon et al. Fuzzy fingerprint vault using multiple polynomials
Al-Assam et al. Combining steganography and biometric cryptosystems for secure mutual authentication and key exchange
Shankar et al. Providing security to land record with the computation of iris, blockchain, and one time password
Ziauddin et al. Robust iris verification for key management
CN109787775A (en) A kind of safety certifying method based on Chen's chaotic system and finger vein auxiliary data
Nandini et al. Efficient cryptographic key generation from fingerprint using symmetric hash functions
CN110516425A (en) A kind of privacy sharing method and system
Wilber et al. PRIVV: Private remote iris-authentication with Vaulted Verification
Han Fingerprint Authentication Schemes for Mobile Devices
Maji et al. A novel biometric template encryption scheme using sudoku puzzle
EP2187338A1 (en) Biometric pseudonyms of a fixed-sized template
CN106712957A (en) Two-factor authentication method based on convolutional coding
Gudavalli et al. A template protection scheme for multimodal biometric system with fingerprint, palmprint, iris and retinal traits
Ibjaoun et al. Biometric template privacy using visual cryptography
Reddy et al. Authentication using fuzzy vault based on iris textures
Kelkboom et al. On the performance of helper data template protection schemes
CN105323072B (en) Identity identifying method based on graphic code secret sharing mechanism
Ramu et al. Biometric template security: an overview

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20190521

Assignee: Zhejiang haomeng Technology Co.,Ltd.

Assignor: HANGZHOU DIANZI University

Contract record no.: X2022980024264

Denomination of invention: A security authentication method based on Chen's chaotic system and digital vein auxiliary data

Granted publication date: 20211022

License type: Common License

Record date: 20221202

EE01 Entry into force of recordation of patent licensing contract