CN109787775A - A kind of safety certifying method based on Chen's chaotic system and finger vein auxiliary data - Google Patents
A kind of safety certifying method based on Chen's chaotic system and finger vein auxiliary data Download PDFInfo
- Publication number
- CN109787775A CN109787775A CN201910170057.9A CN201910170057A CN109787775A CN 109787775 A CN109787775 A CN 109787775A CN 201910170057 A CN201910170057 A CN 201910170057A CN 109787775 A CN109787775 A CN 109787775A
- Authority
- CN
- China
- Prior art keywords
- vein
- chen
- auxiliary data
- image
- global characteristics
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Abstract
The present invention discloses a kind of safety certifying method based on Chen's chaotic system and finger vein auxiliary data, belongs to biometric secure and technical field of cryptology.The following steps are included: obtaining user refers to vein image, global characteristics template is extracted, storage refers to vein image centroid position;Scramble global characteristics template location of pixels is converted using Arnold Cat;Refer to that vein auxiliary data combination Chen's chaotic system encrypts global characteristics template grey scale pixel value;Encrypted finger vein global characteristics template matching is completed in encrypted domain.Present invention ensure that referring to the feasibility of the confidentiality of venous information, integrality and system, the function that scramble refers to vein pattern template location of pixels and encryption refers to vein pattern template grey scale pixel value is provided, effectively enhancing refers to that vein pattern template resists correlation analysis and resists the ability of Statistical Analysis Attacks;Auxiliary data is combined in ciphering process, there is larger key space, can be based on realizing on finger vein identity authorization system all kinds of.
Description
Technical field
The invention belongs to biometric secures and technical field of cryptology, and in particular to one kind based on Chen's chaotic system with
The safety certifying method for referring to vein auxiliary data, using referring to vein global characteristics template, refer to vein auxiliary data and Chen Shi chaos
System is to complete user security identity authentication method.
Background technique
Refer to that vein is the biological characteristic under the finger epidermis, it is difficult to be stolen by physics, will not because of external environment and
The variation of skin epidermis and generate change.Contactless acquisition device is safe from harm for human body, acquires the finger vein text of acquisition
Part is small, and matching speed is fast.The above characteristic is widely used in this biometric technology in authentication further.
Refer to vein auxiliary data, from the finger vein pattern information of user.Refer to that the informational capacity of vein auxiliary data is remote
Less than the overall information amount for referring to vein pattern, it will not reveal any significant information for referring to vein pattern about user, can be by it
It is generated and is reconstructed using the key in encryption.
Chaos system conforms to the principle of simplicity unidirectionally to complicate development in recent years, compared to traditional cryptography Encryption Algorithm, chaos system pair
In initial value is more sensitive or even subtle variation occurs for initial value, the corresponding chaos sequence generated can all have it is very big not
Together;Chaos system have interior randomness, have it is difficult to predict and analysis complex behavior and ergodic;It is generated by chaos system
Signal has the statistical information similar to white noise, can be considered a kind of pseudo-random signal.
If not doing any cryptographic operation in the form of plaintext applied in identity authorization system once finger venous information, this refers to
Venous information will be highly prone to the threat of malicious attacker.Attacker can easily obtain the letter relevant to authentication
Breath destroys the safety of identity authorization system to forge false user identity.Therefore, an effective and safe finger vein
Identity authentication scheme becomes necessary research direction now.
" Biometric Data is proposed in Garima Mehta in 2016 and Malay Kishore Dutta
Encryption using 3-D Chaotic System".It, will in the biological attribute data encipherment scheme that they are proposed
The iris feature Template Information of user is encrypted by scramble location of pixels and the method for displacement grey scale pixel value.This method
Although having biggish key space, capable of resisting part attack, have certain safety, there are still some defects for the program.
Key for generating and reconstructing scrambled matrix fully rely on system generation, it is uncorrelated to user's own biological characteristic information so that
The program can be substituted by other intimate schemes.And displacement grey scale pixel value used in scrambled matrix size with it is original
Iris feature template size is different, once cracking this Partial encryption matrix, above-mentioned protection scheme has the risk being broken.
Summary of the invention
In view of the deficiencies of the prior art, the present invention provides a kind of based on Chen's chaotic system and refers to vein auxiliary data
Safety certifying method can effectively avoid the danger being broken in the prior art, improve the reliability and peace for referring to hand vein recognition
Quan Xing.
A kind of safety certifying method based on Chen's chaotic system and finger vein auxiliary data, comprising the following steps:
Step 1: obtaining user and refer to vein image, extract global characteristics template, storage refers to vein image centroid position;
Step 2: converting scramble global characteristics template location of pixels using Arnold Cat;
Step 3: referring to that vein auxiliary data combination Chen's chaotic system encrypts global characteristics template grey scale pixel value;
Step 4: the encrypted matching for referring to vein global characteristics template is completed in encrypted domain.
Further, the step 1 is specific as follows:
Step 1.1 obtains the original finger vein image of user, calculates and obtains image centroid position, is stored in database;
The rotation correction of original image is completed using this centroid position information;ROI (the region of interest for referring to vein is obtained by child window
Domain) image;
The effect of centroid position information is to complete the rotation correction of image using the information in image processing section;With
In the verification process of family, by judging whether registration is in given threshold with the two centroid positions distance obtained when certification, determine
Whether in database correct auxiliary data is obtained, to generate correct scrambled matrix;
Step 1.2 is extracted from current ROI image using Niblack algorithm refers to vein global characteristics template;To global special
Sign template be filtered, fill, image thinning, be finally normalized to 64 × 96 image array, be set as: F.
Further, the step 2 is specific as follows:
Step 2.1: 64 × 96 global characteristics template F is cut, obtain 3 sizes be respectively 64 × 64,32 ×
32,32 × 32 square subcharacter template, is set as: F1,F2,F3;
Step 2.2: 4 location of pixels are randomly selected in current ROI image, are obtained respective pixel gray value, are set as:
f1,f2,f3,f4;Random number of 4 ranges in [1,10000] is generated using randomizer, is set as: r1,r2,r3,r4;It will
f1,f2,f3,f4With r1,r2,r3,r4It is corresponding to be multiplied: a1=f1×r1,b1=f2×r2,c1=f3×r3,d1=f4×r4, gained knot
Fruit forms one 2 × 2 matrix, and it is 1 which, which need to meet, then regenerates matrix;The step is repeated
It executes 3 times, obtains 32 × 2 mutually independent transformation matrixs, be set as: T1,T2,T3;
Step 2.3: prompt user inputs 3 the number of iterations, is set as: k1,k2,k3, value range is [1,108- 1], k1,
k2,k3It is considered as first key group, is set as K1 (k1,k2,k3), it is voluntarily taken care of by user;
User need to correctly enter this 3 the number of iterations in certification, if input error, it will and cause subsequent result to malfunction,
Last authentification failure;
Resulting 3 sub- feature templates, 3 transformation matrixs and 3 the number of iterations are respectively corresponded entrance by step 2.4
In Arnold Cat transformation;Transformed 3 sub- feature templates are spliced into global characteristics template after 64 × 96 transformation again,
It is set as: FT1。
Further, the step 3 is specific as follows:
Step 3.1: it is random to generate 8 row values and 8 train values, it is set as: n1,n2,n3,n4,n5,n6,n7,n8With m1,m2,m3,
m4,m5,m6,m7,m8, the range of ranks value is by currently referring to that vein ROI image size determines;According to these ranks values in current ROI
Corresponding 8 grey scale pixel values are obtained in image, are set as: g (n1,m1),g(n2,m2),g(n3,m3),g(n4,m4),g(n5,m5),
g(n6,m6),g(n7,m7),g(n8,m8);
Step 3.2: current resulting 8 gray values being converted to 8bit binary numbers, and shape is spliced in front and back two-by-two
At 4 16bit binary numbers, it is set as: q1,q2,q3,q4;x0=q1⊕q2⊕q3⊕q4, x0As entrance Chen Shi chaos system
First initial value of system;
By x0It is expressed as 16bit binary numbers: x0=x01 x02 x03…x014 x015 x016, x0Ring shift left one,
Obtain second initial value y0=x016 x01 x02 x03…x014 x015, ring shift left two, obtain third initial value z0=
x015 x016 x01 x02 x03…x014;
(x0,y0,z0) it is considered as second key group, it is set as K2 (x0,y0,z0);
Step 3.3: by the initial value (x of acquisition0,y0,z0) substitute into Chen Shi chaotic maps, 192 acquisitions of iteration are corresponding
Chaos sequence group, is set as: (L1,L2,L3);Wherein L1,L2,L3One group of chaos sequence is respectively represented, the element number of every group of sequence is equal
It is 192;
Step 3.4: retaining L1,L2,L3, L4=L1⊕L2⊕L3, by L1,L2,L3,L4Middle all elements are arranged to make up size
8 × 96 sub- scrambled matrixs;
Step 3.5: above-mentioned 4 steps being repeated into 8 sub- scrambled matrixs for obtaining 8 sizes and being 8 × 96, will be owned
Sub- scrambled matrix splicing, obtains the scrambled matrix E for replacing grey scale pixel value, and size is 64 × 96;
Step 3.6: prompt user inputs storage password ps, which is used to store 64 pairs of ranks value, user is facilitated to exist
It is extracted when certification;In addition, 64 gray values can be otherwise stored, user's input password in certification cannot be extracted directly;
Step 3.7: by the finger vein global characteristics FT of scramble location of pixels1Template and scrambled matrix E exclusive or: FE1=
FT1⊕ E obtains the encrypted feature templates FE of gray value1, it is stored in database, facilitates when certification for matching, arrives this
User's registration is completed.
Further, the step 3 includes:
Step 3.8: when family authenticates, the password ps of information is stored when user being prompted to input registration, judges current input port
Ps' is enabled to correct errors.If password ps' is correct, 64 ranks values for being stored in database are extracted;Such as password ps' mistake, current authentication is terminated
Process.
Further, the step 3 includes:
Step 3.9: calculating finger vein image centroid position obtained in verification process and be stored in centroid position in database
The distance between, parasang here is indicated with element number;
Step 3.10: judging distance whether in given threshold;If two centroid position distances in [0,3], extract registration
When 64 gray values being stored in database profession, directly constitute scrambled matrix using these auxiliary datas;If not in [0,3],
Using the 64 row values and train value of extraction, gray value is obtained in current ROI image according to corresponding position to generate scrambled matrix
And the finger venous information for prompting user currently processed may be wrong;
Step 3.11: the scrambled matrix E ' and the current feature templates FT ' for completing position scramble being currently generated1Exclusive or: FE '1
=FT '1⊕ E ' obtains the global characteristics template FE ' that gray value in verification process has been encrypted1。
Further, the Chen Shi chaotic maps expression formula is as follows:
Further, in the step 3.3, first time modulo operation, modulus are all carried out to the result of iteration each time
Take 2048;After completing iteration, it can be utilized in order to ensure iterative data can fill, to L1,L2,L3Each of element carry out the
Secondary modulus, modulus take 256, so that last data are all distributed among [0,255].
Further, the step 4 is specific as follows:
Step 4.1: FE ' is calculated in encrypted domain1With FE1Between distance, parasang indicates with element number;
Step 4.2: judging distance whether in given threshold;If the distance is in [0,1], user authentication success;If no
In [0,1], user authentication failure.
Beneficial effects of the present invention: the present invention provides a kind of based on Chen's chaotic system and refers to the peace of vein auxiliary data
Full certificate scheme, providing one kind for all kinds of identity authorization systems based on finger vein features, generation key and protection are original indirectly
Refer to the method for vein pattern information security, it is ensured that refer to the feasibility of the confidentiality of venous information, integrality and system.The present invention mentions
Refer to that vein pattern template location of pixels and encryption refer to the function of vein pattern template grey scale pixel value for scramble, effectively enhancing refers to quiet
Arteries and veins feature templates resist correlation analysis and resist the ability of Statistical Analysis Attacks;Auxiliary data is combined in ciphering process,
With larger key space (about 3.4 × 1062).The present invention can be used in all systems for having and referring to vein authentication,
With very strong replicability.
Detailed description of the invention
Safety certification program flow chart of the Fig. 1 based on Chen's chaotic system and finger vein auxiliary data;
The number of iterations of Fig. 2 input error leads to the schematic diagram of authentification failure;
The schematic diagram of Fig. 3 user registration success;
Fig. 4 refers to that vein centroid distance mismatches the schematic diagram for leading to authentification failure;
Fig. 5 user inputs schematic diagram of the correct data by authentication.
Specific embodiment
Technical solution of the present invention is described further below in conjunction with Figure of description.
A kind of safety certifying method based on Chen's chaotic system and finger vein auxiliary data is as shown in Figure 1, include obtaining
User refers to vein image, extracts global characteristics template, and storage refers to vein image centroid position information;It is converted using Arnold Cat
Scramble global characteristics template location of pixels;Refer to vein auxiliary data combination Chen's chaotic system encryption global characteristics template pixel ash
Angle value;Encrypted feature templates are stored for template matching when authenticating;It prompts user to input storage password, stores respective counts
According to.When certification, the centroid position distance obtained when the centroid position currently obtained and registration is compared, judges whether directly to extract auxiliary
Help data for reconstructing scrambled matrix;Encrypted feature templates matching is completed in encrypted domain.
1, user refers to vein global characteristics template extraction part, the specific steps of which are as follows:
1.1 obtain the original finger vein image of user, calculate the centroid position of image, the centroid position for referring to vein image is deposited
In database;The rotation correction of original image is completed using the centroid position information;The ROI for referring to vein is obtained by child window
(area-of-interest) image.
The effect of centroid position information is to complete the rotation correction of image using the information in image processing section;With
In the verification process of family, by judging whether registration is in given threshold at a distance from 2 mass center information that certification obtains, to sentence
It is disconnected whether to obtain correct auxiliary data in database, to generate correct scrambled matrix.It is effectively dropped using centroid position information
Refusing in low verification process is sincere.
1.2 are extracted from obtained finger vein ROI image using Niblack algorithm and refer to vein global characteristics template;It will mention
The global characteristics template taken is filtered, fills, image thinning, is finally normalized to 64 × 96 image array, is set as
F.Rule of thumb, the present invention recommends in Niblack algorithm, and setting window size is 4, coefficient 0.05.
2, Arnold Cat transformation scramble refers to vein global characteristics template location of pixels, the specific steps of which are as follows:
2.1 cut 64 × 96 finger vein global characteristics template F, obtain 3 sizes be respectively 64 × 64,32 ×
32,32 × 32 square subcharacter template, is set as F1,F2,F3。
2.2 randomly select 4 location of pixels in referring to vein ROI image, obtain corresponding grey scale pixel value, if
Are as follows: f1,f2,f3,f4;Random number of 4 ranges in [1,10000] is generated using randomizer, is set as: r1,r2,r3,
r4;By f1,f2,f3,f4With r1,r2,r3,r4It is corresponding to be multiplied: a1=f1×r1,b1=f2×r2,c1=f3×r3,d1=f4×r4, institute
Obtain the matrix that result forms one 2 × 2.
As shown in the Arnold Cat mapping following expression generally used now:
Wherein, xn, ynFor the grayscale position of pixel, M is the size of the image handled instantly, and a, b, c, d meet following item
Part:
If 2 × 2 matrix determinant meets determinant (2), which is considered as an effective transformation matrix;If
No enough row column (2), then regenerate matrix, until meeting the condition of determinant (2).The step is repeated 3 times, is obtained
The mutually independent transformation matrix for obtaining 32 × 2, is set as T1,T2,T3。
2.3 prompt users input 3 the number of iterations, are set as: k1,k2,k3, value range is [1,108- 1], k1,k2,k3Quilt
It is considered as first key group, is set as K1 (k1,k2,k3), it is voluntarily taken care of by user.
User need to correctly enter this 3 the number of iterations in certification, if input error, it will and cause subsequent result to malfunction,
Last authentification failure is as shown in Figure 2.
2.4 respectively correspond resulting 3 sub- feature templates, 3 transformation matrixs and 3 the number of iterations into Arnold
In Cat transformation;Transformed 3 sub- feature templates are spliced into 64 × 96 transformed global characteristics template again, are set as
FT1。
The purpose of the step is the correlation destroyed between primitive character template data, resists related coefficient attack, and reach
To basic visual confusion purpose.
But since the Arnold Cat mapping shaped like expression formula (1) is easy to produce the period, if this means that attacker tastes
It pinged the method for exhaustion and frequently enters different the number of iterations, it is likely that the feature templates that can generate forgery are converted in Arnold Cat
Afterwards, the case where some is original correct transformation results.Further, since scramble location of pixels can't be to pixel grey scale
Value generates substantive influence, and transformed feature templates can not still resist Statistical Analysis Attacks, therefore just need to character modules
Plate grey scale pixel value carries out cryptographic operation, to guarantee that user refers to the safety of venous information.
3, refer to vein auxiliary data combination Chen's chaotic system encrypted feature template grey scale pixel value.
3.1 random 8 row values of generation and 8 train values, are set as n1,n2,n3,n4,n5,n6,n7,n8With m1,m2,m3,m4,m5,
m6,m7,m8, the range of ranks value is by currently referring to that the size of vein ROI image determines;According to these ranks values in current ROI image
It is middle to obtain corresponding 8 grey scale pixel values, it is set as: g (n1,m1),g(n2,m2),g(n3,m3),g(n4,m4),g(n5,m5),g(n6,
m6),g(n7,m7),g(n8,m8)。
Due to the number of pixels in ROI image be much larger than 8, arbitrarily obtain 8 grey scale pixel values will not reveal it is any about
User refers to the significant information of vein pattern, these grey scale pixel values can be considered as auxiliary data, these auxiliary datas be used to give birth to
At the subsequent key for encrypting and using.
3.2 are converted to current resulting 8 gray values 8bit binary numbers, and front and back is spliced to form 4 two-by-two
16bit bit, is set as: q1,q2,q3,q4;x0=q1⊕q2⊕q3⊕q4, x0First as entrance Chen's chaotic system
A initial value.
By x0It is expressed as 16bit binary numbers: x0=x01 x02 x03…x014 x015 x016 ,x0Ring shift left one
Position, obtains second initial value y0=x016 x01 x02 x03…x014 x015, two acquisition third initial value z of ring shift left0=
x015 x016 x01 x02 x03…x014。
x0,y0,z0It is considered as second key group, is set as K2 (x0,y0,z0)。
The Chen's chaotic system being used herein belongs to three-dimensional chaotic system, need to be entered simultaneously using 3 initial values mixed
Ignorant mapping generates corresponding chaos sequence.The one-dimensional chaos system generally used is compared, Chen's chaotic system may be implemented quickly
Diffusion has higher randomness and unpredictability, and key space is bigger, thus it is stronger to resist attacking ability.At this
The Chen Shi chaotic maps expression formula that scheme uses is as follows:
3.3 by the initial value (x of acquisition0,y0,z0) substitute into Chen Shi chaotic maps, obtain corresponding chaos iteration 192 times
Sequence group, is set as: (L1,L2,L3).Wherein L1,L2,L3One group of sequence is respectively represented, the element number of every group of sequence is 192.
It is excessive beyond Computing ability in order to avoid generating data in calculating, herein to iteration each time
As a result first time modulo operation is all carried out, modulus takes 2048;After completing iteration, it can be utilized in order to ensure iterative data can fill,
To L1,L2,L3Each of element carry out second of modulus, modulus takes 256.In this way, being distributed in last data all
[0,255] among.
3.4 retain L1,L2,L3。L4=L1⊕L2⊕L3, by L1,L2,L3,L4It is 8 × 96 that middle all elements, which are arranged to make up size,
Sub- scrambled matrix.
Above-mentioned 4 steps are repeated 8 sub- scrambled matrixs for obtaining 8 sizes and being 8 × 96 by 3.5, and all sons are added
Close matrix splicing, obtains the scrambled matrix E for replacing grey scale pixel value.Matrix E size is 64 × 96.
3.6 prompt users input storage password ps, which facilitates user to mention in certification for storing 64 pairs of ranks values
It takes;In addition, 64 gray values can be otherwise stored, user input password ps in certification cannot be extracted directly.
3.7 by the finger vein global characteristics template FT of scramble location of pixels1With scrambled matrix E exclusive or: FE1=FT1⊕ E, is obtained
Obtain encrypted feature templates FE1.It is stored in database, is facilitated when certification for matching.
It is completed to this user's registration function, display window, which is informed, currently to succeed in registration as shown in Figure 3.
In user authentication, the scramble of the extraction and feature templates location of pixels that refer to vein pattern template all with registration when
Step is identical, but has a little difference in the whole process for generating above-mentioned scrambled matrix.Due to noise, the shadow of the factors such as acquisition angles
It rings, the gray value that the same finger vein of same user generates image in each acquisition can all have certain minor deviations.
Corresponding gray value is obtained in current ROI image according only to 64 ranks values in database, it is heavy using its
It is new to constitute initial value x0′,y0′,z0', and then constitute new scrambled matrix E '.According to chaos system for initial value it is sensitive according to
Lai Xing, being very different when making chaos sequence compared to registration due to the difference of initial value, the E ' so generated must
There is very big difference with the scrambled matrix E generated when registration.This meeting so that this programme in certification there are it is high refuse it is sincere.
In user authentication, prompt user inputs the password ps that information is stored when registration, the current input of judgement first for 3.8 events
Password ps ' corrects errors.If password ps ' is correct, 64 ranks values for being stored in database are extracted;Such as password ps ' mistake, termination is currently recognized
Card process.
Refer to vein image centroid position obtained in 3.9 calculating verification process and is stored in database between centroid position
Distance, parasang here are indicated with element number.
If 3.10 two centroid position distances in threshold value [0, μ], extract 64 gray scales being stored in database profession when registration
Value directly constitutes scrambled matrix using these auxiliary datas;If using 64 ranks values of extraction, being pressed not in threshold value [0, μ]
The finger vein letter for obtaining gray value in current ROI image according to corresponding position to generate scrambled matrix and prompt user currently processed
Breath may be wrong as shown in Figure 4.Rule of thumb, threshold value is recommended to be set as [0,3].
The 3.11 scrambled matrix E ' the being currently generated and current feature templates FT ' for completing position scramble1Exclusive or: FE '1=
FT′1⊕ E ' obtains the global characteristics template FE ' that gray value in verification process has been encrypted1。
4, template matching is carried out in encrypted domain
4.1 because be by feature templates FT for the cryptographic operation of gray value1With scrambled matrix E carry out exclusive or, therefore with
Family certification matching process in, only need to be calculated in encrypted domain two it is encrypted after feature templates between distance.
If 4.2 distances, in the threshold value of design of scheme, user authentication success is as shown in Figure 5;Conversely, user authentication loses
It loses.According to real experience, threshold value is recommended to be set as [0,1].
A kind of safety certification scheme based on Chen's chaotic system and finger vein auxiliary data of the present invention, and it is unlimited
Description in specification and embodiments.All within the spirits and principles of the present invention, any modification for being made is replaced on an equal basis
It changes, improve, be all contained within scope of the presently claimed invention.
Claims (9)
1. a kind of safety certifying method based on Chen's chaotic system and finger vein auxiliary data, it is characterised in that including following step
It is rapid:
Step 1: obtaining user and refer to vein image, extract global characteristics template, storage refers to vein image centroid position;
Step 2: converting scramble global characteristics template location of pixels using Arnold Cat;
Step 3: referring to that vein auxiliary data combination Chen's chaotic system encrypts global characteristics template grey scale pixel value;
Step 4: the encrypted matching for referring to vein global characteristics template is completed in encrypted domain.
2. a kind of safety certifying method based on Chen's chaotic system and finger vein auxiliary data according to claim 1,
It is characterized in that the step 1 is specific as follows:
Step 1.1 obtains the original finger vein image of user, calculates and obtains image centroid position, is stored in database;It utilizes
The rotation correction of this centroid position information completion original image;ROI (area-of-interest) figure for referring to vein is obtained by child window
Picture;
The effect of centroid position information is to complete the rotation correction of image using the information in image processing section;Recognize in user
During card, by judging whether registration is in given threshold with the two centroid positions distance obtained when certification, decide whether
Correct auxiliary data in database is obtained, to generate correct scrambled matrix;
Step 1.2 is extracted from current ROI image using Niblack algorithm refers to vein global characteristics template;To global characteristics mould
Plate is filtered, fills, image thinning, is finally normalized to 64 × 96 image array, is set as: F.
3. a kind of safety certifying method based on Chen's chaotic system and finger vein auxiliary data according to claim 2,
It is characterized in that the step 2 is specific as follows:
Step 2.1: 64 × 96 global characteristics template F being cut, obtaining 3 sizes is respectively 64 × 64,32 × 32,32
× 32 square subcharacter template, is set as: F1,F2,F3;
Step 2.2: randomly selecting 4 location of pixels in current ROI image, obtain respective pixel gray value, be set as: f1,f2,
f3,f4;Random number of 4 ranges in [1,10000] is generated using randomizer, is set as: r1,r2,r3,r4;By f1,f2,
f3,f4With r1,r2,r3,r4It is corresponding to be multiplied: a1=f1×r1,b1=f2×r2,c1=f3×r3,d1=f4×r4, acquired results composition
One 2 × 2 matrix, it is 1 which, which need to meet, then regenerates matrix;The step is repeated 3
It is secondary, 32 × 2 mutually independent transformation matrixs are obtained, are set as: T1,T2,T3;
Step 2.3: prompt user inputs 3 the number of iterations, is set as: k1,k2,k3, value range is [1,108- 1], k1,k2,k3
It is considered as first key group, is set as K1 (k1,k2,k3), it is voluntarily taken care of by user;
User need to correctly enter this 3 the number of iterations in certification, if input error, it will cause subsequent result to malfunction, finally
Authentification failure;
Step 2.4 respectively corresponds resulting 3 sub- feature templates, 3 transformation matrixs and 3 the number of iterations into Arnold
In Cat transformation;Transformed 3 sub- feature templates are spliced into global characteristics template after 64 × 96 transformation again, are set as:
FT1。
4. a kind of safety certifying method based on Chen's chaotic system and finger vein auxiliary data according to claim 1,
It is characterized in that the step 3 is specific as follows:
Step 3.1: it is random to generate 8 row values and 8 train values, it is set as: n1,n2,n3,n4,n5,n6,n7,n8With m1,m2,m3,m4,m5,
m6,m7,m8, the range of ranks value is by currently referring to that vein ROI image size determines;According to these ranks values in current ROI image
Corresponding 8 grey scale pixel values are obtained, are set as: g (n1,m1),g(n2,m2),g(n3,m3),g(n4,m4),g(n5,m5),g(n6,
m6),g(n7,m7),g(n8,m8);
Step 3.2: current resulting 8 gray values being converted to 8bit binary numbers, and front and back is spliced to form 4 two-by-two
16bit binary numbers, are set as: q1,q2,q3,q4;x0=q1⊕q2⊕q3⊕q4, x0As entering the of Chen's chaotic system
One initial value;
By x0It is expressed as 16bit binary numbers: x0=x01 x02 x03…x014 x015 x016, x0It ring shift left one, obtains
Second initial value y0=x016 x01 x02 x03…x014 x015, ring shift left two, obtain third initial value z0=x015
x016 x01 x02 x03…x014;
(x0,y0,z0) it is considered as second key group, it is set as K2 (x0,y0,z0);
Step 3.3: by the initial value (x of acquisition0,y0,z0) substitute into Chen Shi chaotic maps, obtain corresponding chaos iteration 192 times
Sequence group, is set as: (L1,L2,L3);Wherein L1,L2,L3One group of chaos sequence is respectively represented, the element number of every group of sequence is
192;
Step 3.4: retaining L1,L2,L3, L4=L1⊕L2⊕L3, by L1,L2,L3,L4Middle all elements be arranged to make up size be 8 ×
96 sub- scrambled matrixs;
Step 3.5: above-mentioned 4 steps being repeated into 8 sub- scrambled matrixs for obtaining 8 sizes and being 8 × 96, all sons are added
Close matrix splicing, obtains the scrambled matrix E for replacing grey scale pixel value, and size is 64 × 96;
Step 3.6: prompt user inputs storage password ps, which is used to store 64 pairs of ranks value, user is facilitated to authenticate
When extract;In addition, 64 gray values can be otherwise stored, user's input password in certification cannot be extracted directly;
Step 3.7: by the finger vein global characteristics FT of scramble location of pixels1Template and scrambled matrix E exclusive or: FE1=FT1
⊕ E obtains the encrypted feature templates FE of gray value1, it is stored in database, is facilitated for matching when certification, to this use
Family registration is completed.
5. a kind of safety certifying method based on Chen's chaotic system and finger vein auxiliary data according to claim 4,
It is characterized in that the step 3 includes:
Step 3.8: when family authenticates, the password ps of information is stored when user being prompted to input registration, judges current input password ps'
It corrects errors.If password ps' is correct, 64 ranks values for being stored in database are extracted;Such as password ps' mistake, current authentication process is terminated.
6. a kind of safety certifying method based on Chen's chaotic system and finger vein auxiliary data according to claim 5,
It is characterized in that the step 3 includes:
Step 3.9: calculating finger vein image centroid position obtained in verification process and be stored in database between centroid position
Distance, parasang here indicates with element number;
Step 3.10: judging distance whether in given threshold;If two centroid position distances in [0,3], are deposited when extracting registration
64 gray values being stored in database directly constitute scrambled matrix using these auxiliary datas;If being utilized not in [0,3]
The 64 row values and train value extracted, obtain gray value in current ROI image according to corresponding position to generate scrambled matrix and mention
Show that the currently processed finger venous information of user may be wrong;
Step 3.11: the scrambled matrix E ' and the current feature templates FT ' for completing position scramble being currently generated1Exclusive or: FE '1=
FT′1⊕ E ' obtains the global characteristics template FE ' that gray value in verification process has been encrypted1。
7. a kind of safety certifying method based on Chen's chaotic system and finger vein auxiliary data according to claim 4,
It is characterized in that the Chen Shi chaotic maps expression formula is as follows:
8. a kind of safety certifying method based on Chen's chaotic system and finger vein auxiliary data according to claim 4,
It is characterized in that all carrying out first time modulo operation to the result of iteration each time, modulus takes 2048 in the step 3.3;
After completing iteration, it can be utilized in order to ensure iterative data can fill, to L1,L2,L3Each of element taken for the second time
Mould, modulus take 256, so that last data are all distributed among [0,255].
9. a kind of safety certifying method based on Chen's chaotic system and finger vein auxiliary data according to claim 1,
It is characterized in that the step 4 is specific as follows:
Step 4.1: FE ' is calculated in encrypted domain1With FE1Between distance, parasang indicates with element number;
Step 4.2: judging distance whether in given threshold;If the distance is in [0,1], user authentication success;If not [0,
1] in, user authentication failure.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910170057.9A CN109787775B (en) | 2019-03-06 | 2019-03-06 | Security authentication method based on Chen chaos system and finger vein auxiliary data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910170057.9A CN109787775B (en) | 2019-03-06 | 2019-03-06 | Security authentication method based on Chen chaos system and finger vein auxiliary data |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109787775A true CN109787775A (en) | 2019-05-21 |
CN109787775B CN109787775B (en) | 2021-10-22 |
Family
ID=66486280
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910170057.9A Active CN109787775B (en) | 2019-03-06 | 2019-03-06 | Security authentication method based on Chen chaos system and finger vein auxiliary data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109787775B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113034139A (en) * | 2021-03-15 | 2021-06-25 | 中国人民大学 | Block chain multi-currency wallet based on living body biological feature authentication and implementation method thereof |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103731271A (en) * | 2013-12-30 | 2014-04-16 | 北京工业大学 | On-line face identity authentication method based on homomorphic encrypting and chaotic scrambling |
US20170161905A1 (en) * | 2015-12-07 | 2017-06-08 | Avigilon Analytics Corporation | System and method for background and foreground segmentation |
CN107169444A (en) * | 2017-05-11 | 2017-09-15 | 重庆科技学院 | Finger vein recognition system and method based on smart mobile phone separating treatment |
CN109190509A (en) * | 2018-08-13 | 2019-01-11 | 阿里巴巴集团控股有限公司 | A kind of personal identification method, device and computer readable storage medium |
-
2019
- 2019-03-06 CN CN201910170057.9A patent/CN109787775B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103731271A (en) * | 2013-12-30 | 2014-04-16 | 北京工业大学 | On-line face identity authentication method based on homomorphic encrypting and chaotic scrambling |
US20170161905A1 (en) * | 2015-12-07 | 2017-06-08 | Avigilon Analytics Corporation | System and method for background and foreground segmentation |
CN107169444A (en) * | 2017-05-11 | 2017-09-15 | 重庆科技学院 | Finger vein recognition system and method based on smart mobile phone separating treatment |
CN109190509A (en) * | 2018-08-13 | 2019-01-11 | 阿里巴巴集团控股有限公司 | A kind of personal identification method, device and computer readable storage medium |
Non-Patent Citations (1)
Title |
---|
GARIMA MEHTA; MALAY KISHORE DUTTA; PYUNG SOOKIM: "《Biometric Data Encryption using 3-D Chaotic System》", 《2016 2ND INTERNATIONAL CONFERENCE ON COMMUNICATION CONTROL AND INTELLIGENT SYSTEMS (CCIS)》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113034139A (en) * | 2021-03-15 | 2021-06-25 | 中国人民大学 | Block chain multi-currency wallet based on living body biological feature authentication and implementation method thereof |
CN113034139B (en) * | 2021-03-15 | 2023-12-26 | 中国人民大学 | Block chain multi-coin wallet based on living organism biological characteristic authentication and implementation method thereof |
Also Published As
Publication number | Publication date |
---|---|
CN109787775B (en) | 2021-10-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Lee et al. | Biometric key binding: Fuzzy vault based on iris images | |
Uludag et al. | Biometric cryptosystems: issues and challenges | |
Lee et al. | A new method for generating an invariant iris private key based on the fuzzy vault system | |
Gaddam et al. | Efficient Cancelable Biometric Key Generation Scheme for Cryptography. | |
Leng et al. | Dual-key-binding cancelable palmprint cryptosystem for palmprint protection and information security | |
Joshi et al. | Security vulnerabilities against fingerprint biometric system | |
Cavoukian et al. | Biometric encryption: The new breed of untraceable biometrics | |
Moon et al. | Fuzzy fingerprint vault using multiple polynomials | |
Al-Assam et al. | Combining steganography and biometric cryptosystems for secure mutual authentication and key exchange | |
Shankar et al. | Providing security to land record with the computation of iris, blockchain, and one time password | |
Ziauddin et al. | Robust iris verification for key management | |
CN109787775A (en) | A kind of safety certifying method based on Chen's chaotic system and finger vein auxiliary data | |
Nandini et al. | Efficient cryptographic key generation from fingerprint using symmetric hash functions | |
CN110516425A (en) | A kind of privacy sharing method and system | |
Wilber et al. | PRIVV: Private remote iris-authentication with Vaulted Verification | |
Han | Fingerprint Authentication Schemes for Mobile Devices | |
Maji et al. | A novel biometric template encryption scheme using sudoku puzzle | |
EP2187338A1 (en) | Biometric pseudonyms of a fixed-sized template | |
CN106712957A (en) | Two-factor authentication method based on convolutional coding | |
Gudavalli et al. | A template protection scheme for multimodal biometric system with fingerprint, palmprint, iris and retinal traits | |
Ibjaoun et al. | Biometric template privacy using visual cryptography | |
Reddy et al. | Authentication using fuzzy vault based on iris textures | |
Kelkboom et al. | On the performance of helper data template protection schemes | |
CN105323072B (en) | Identity identifying method based on graphic code secret sharing mechanism | |
Ramu et al. | Biometric template security: an overview |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
EE01 | Entry into force of recordation of patent licensing contract |
Application publication date: 20190521 Assignee: Zhejiang haomeng Technology Co.,Ltd. Assignor: HANGZHOU DIANZI University Contract record no.: X2022980024264 Denomination of invention: A security authentication method based on Chen's chaotic system and digital vein auxiliary data Granted publication date: 20211022 License type: Common License Record date: 20221202 |
|
EE01 | Entry into force of recordation of patent licensing contract |