CN109840487B - Private key generation method and system of block chain electronic wallet based on fingerprint information - Google Patents

Private key generation method and system of block chain electronic wallet based on fingerprint information Download PDF

Info

Publication number
CN109840487B
CN109840487B CN201910066429.3A CN201910066429A CN109840487B CN 109840487 B CN109840487 B CN 109840487B CN 201910066429 A CN201910066429 A CN 201910066429A CN 109840487 B CN109840487 B CN 109840487B
Authority
CN
China
Prior art keywords
private key
fingerprint
elements
matrix
point
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910066429.3A
Other languages
Chinese (zh)
Other versions
CN109840487A (en
Inventor
金以东
李雪莉
王语莫
周大胜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ebaonet Healthcare Information Technology Beijing Co ltd
Original Assignee
Ebaonet Healthcare Information Technology Beijing Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ebaonet Healthcare Information Technology Beijing Co ltd filed Critical Ebaonet Healthcare Information Technology Beijing Co ltd
Priority to CN201910066429.3A priority Critical patent/CN109840487B/en
Publication of CN109840487A publication Critical patent/CN109840487A/en
Application granted granted Critical
Publication of CN109840487B publication Critical patent/CN109840487B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Collating Specific Patterns (AREA)
  • Image Input (AREA)

Abstract

The application provides a private key generation method and a private key generation system of a block chain electronic wallet based on fingerprint information, wherein the private key generation method comprises the following steps: carrying out image acquisition on the user fingerprint; carrying out binarization processing on the fingerprint image to obtain a binarized fingerprint image; extracting fingerprint feature points from the binary fingerprint image, and constructing a feature point set according to all the extracted fingerprint feature points; obtaining a normalized matrix according to the feature point set; and generating a private key corresponding to the user fingerprint by using the normalized matrix. The private key is generated based on the strong authentication biological characteristic information, the correlation between the private key and the fingerprint characteristic information of the user is strong, the safety of the private key can be improved, and the private key cannot be easily calculated out to obtain a specific value. In addition, the private key no longer needs to be stored, and the risks of being stolen and illegally used can be avoided. When the private key is lost or the storage device is forgotten to be carried, the private key can be reproduced according to the fingerprint characteristic information of the user.

Description

Private key generation method and system of block chain electronic wallet based on fingerprint information
Technical Field
The application belongs to the technical field of information security, and particularly relates to a private key generation method and system of a block chain electronic wallet based on fingerprint information.
Background
In the block chain-based electronic wallet technology, the asymmetric encryption technology has a crucial influence on the security and reliability of the transaction. In the asymmetric encryption technology, a public key and a private key are generated through an encryption algorithm, the public key is used for encryption, and the private key is used for decryption. Typically, the public and private keys of the e-wallet user are generated at registration time and remain unchanged. The private key is held by the user and cannot be disclosed to other people, otherwise the security of the transaction is greatly threatened.
In the prior art, a public key and a private key are randomly generated based on the condition of an encryption algorithm and are stored in a certain database or equipment. Although the storage environment for the private key may be secure and confidential, the risk of theft of the private key is still not completely avoided. If the private key is stored in a centralized database of a certain operator, there may also be a risk that the operator violates the viewing of the user's private key. The greatest advantage of the personal electronic wallet based on the blockchain is a decentralized storage mode, and if the private key is stored in a centralized manner by an operator, the characteristics and advantages of the blockchain cannot be fully exerted.
In the actual application process, the operator acquires the fingerprint of the user and compares the fingerprint with the fingerprint data recorded in the database or the equipment to generate a verification result. And directly associating the fingerprint information of the user with the corresponding private key after the user passes the verification. However, the correlation between the private key and the fingerprint feature information of the user is weak, and once the private key is lost or the user forgets to carry the storage terminal, the private key cannot be reproduced, and only the private key can be regenerated. In addition, when the user steals the mobile phone, the tablet computer and other devices storing the private key, the private key of the user is at risk of being stolen.
Therefore, no matter the client side stores or the operator stores, the private key cannot effectively avoid the risk of being stolen, and the threat on transaction safety cannot be avoided.
Disclosure of Invention
In order to overcome the problems in the related art at least to a certain extent, the application provides a private key generation method and system of a block chain electronic wallet based on fingerprint information.
According to a first aspect of embodiments of the present application, there is provided a method for generating a private key of a blockchain electronic wallet based on fingerprint information, including the following steps:
carrying out image acquisition on the user fingerprint;
carrying out binarization processing on the fingerprint image to obtain a binarized fingerprint image;
extracting fingerprint feature points from the binary fingerprint image, and constructing a feature point set according to all the extracted fingerprint feature points;
obtaining a normalized matrix according to the feature point set;
and generating a private key corresponding to the user fingerprint by using the normalized matrix.
In the private key generation method, the specific process of extracting the fingerprint feature points from the binary fingerprint image and constructing the feature point set according to all the extracted fingerprint feature points includes:
scanning each pixel point in the binary fingerprint image, and selecting a certain pixel point q;
calculating a classification parameter by using pixel values of eight pixel points in an eight-neighborhood pixel map of a certain pixel point q, wherein the classification parameter N is calculated by adopting the following formula:
Figure BDA0001955843380000021
in the formula, piExpressing the pixel value of the ith pixel point in the eight-neighborhood pixel image of q;
determining whether the pixel point is an end point or a bifurcation point according to the classification parameter N;
denoising the binary fingerprint image to obtain denoised end points and bifurcation points;
and constructing a feature point set by using the denoised end points and bifurcation points.
Further, the step of determining whether the pixel point is an endpoint or a bifurcation point according to the classification parameter N comprises the following steps:
when N is equal to 1, the pixel point q is an end point;
and when N is equal to 3, the pixel point q is a bifurcation point.
Further, the steps of denoising the binary fingerprint image to obtain denoised end points and bifurcation points comprise the following specific processes:
taking a certain end point as a starting point, moving Z pixels along a ridge line where the end point is located, if a bifurcation point is met in the Z pixels, judging the bifurcation point to be a noise point, and rejecting the noise point;
traversing all end points and ridge lines in the binary fingerprint image, and eliminating all noise points;
and Z is an adjustable parameter and is adjusted according to the size and the resolution of the fingerprint image.
In the private key generation method, the specific process of obtaining the normalized matrix according to the feature point set in the step is as follows:
assuming that k elements exist in the feature point set Q, respectively searching two elements closest to the elements for each element in the k elements, and calculating Euclidean distance between any two elements in the three elements;
sorting three Euclidean distances corresponding to a certain element according to a preset sequence, wherein the three Euclidean distances obtained by sorting form a distance vector d;
forming a two-dimensional distance vector D0 by using the distance vectors corresponding to the elements in the k elements;
for each element in the two-dimensional distance vector D0, calculating a sum of three Euclidean distances contained in the element, sorting the sum according to a preset sequence, wherein the Euclidean distances contained in the elements corresponding to the sorted sum form a matrix D with k rows and 3 columns;
normalizing each row of elements in the matrix D with the k rows and 3 columns to obtain a normalized matrix
Figure BDA0001955843380000031
Further, the step of normalizing each column element in the matrix D with k rows and 3 columns includes:
Figure BDA0001955843380000032
wherein m is 1,2,3, …, k, i is 2 or 3;
Figure BDA0001955843380000033
denotes the normalized element, dm,iRepresenting the element of the m-th row and i-th column of the matrix D, Dm,1Representing the element in row m and column 1 of matrix D.
In the private key generating method, the specific process of generating the private key corresponding to the user fingerprint by using the normalized matrix in the step is as follows:
for each element in the normalized matrix
Figure BDA0001955843380000034
Calculating their corresponding rounded integers
Figure BDA0001955843380000041
Figure BDA0001955843380000042
In the formula, round represents rounding according to a rounding rule; λ represents an adjustable parameter, which is a non-negative integer;
and arranging and generating private keys corresponding to the user fingerprints according to a preset sequence.
According to a second aspect of embodiments of the present application, there is provided a private key generation system including:
the image acquisition module is used for acquiring fingerprint information of a user;
the binarization processing module is used for carrying out binarization processing on the fingerprint image to obtain a binarization fingerprint image;
the set construction module is used for extracting fingerprint feature points from the binary fingerprint image and constructing a feature point set according to all the extracted fingerprint feature points;
the normalization matrix generation module is used for generating a normalization matrix by using each element in the feature point set;
and the generating module is used for generating a private key corresponding to the user fingerprint by using the normalized matrix.
According to a third aspect of embodiments of the present application, there is provided a private key generation apparatus for a blockchain electronic wallet based on fingerprint information, including:
a processor for processing the received data, wherein the processor is used for processing the received data,
the processor is capable of invoking intelligent contracts from a blockchain,
the intelligent contract comprises a computer program that,
the computer program, when running on the processor, performs the steps of:
carrying out image acquisition on the user fingerprint;
carrying out binarization processing on the fingerprint image to obtain a binarized fingerprint image;
extracting fingerprint feature points from the binary fingerprint image, and constructing a feature point set according to all the extracted fingerprint feature points;
obtaining a normalized matrix according to the feature point set;
and generating a private key corresponding to the user fingerprint by using the normalized matrix.
According to a fourth aspect of embodiments of the present application, there is provided a blockchain-based personal electronic wallet comprising a private key generated by any one of the private key generation methods described above, the private key generation method being stored as a smart contract on the blockchain.
According to the above embodiments of the present application, at least the following advantages are obtained: the private key generation method generates the private key based on the strong authentication biological characteristic information, the private key is strong in correlation with the fingerprint characteristic information of the user, the safety of the private key can be improved, and the private key cannot be easily deduced to be a specific value. By adopting the block chain-based personal electronic wallet creating method, the private key does not need to be stored, and the risks of being stolen and illegally used can be avoided. The present application can enhance the decentralized nature of blockchain personal electronic wallets. The storage medium is not needed, and the private key can be reproduced according to the fingerprint characteristic information of the user when the private key is lost or the storage device is forgotten to be carried.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the scope of the invention, as claimed.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of the specification of the application, illustrate embodiments of the application and together with the description, serve to explain the principles of the application.
Fig. 1 is a flowchart of a private key generation method for a blockchain electronic wallet based on fingerprint information according to an embodiment of the present disclosure.
Fig. 2 is a schematic structural diagram of a private key generation system of a blockchain electronic wallet based on fingerprint information according to an embodiment of the present disclosure.
Fig. 3 is a schematic diagram illustrating an application state of a personal electronic wallet based on a blockchain according to an embodiment of the present invention.
Detailed Description
For the purpose of promoting a clear understanding of the objects, aspects and advantages of the embodiments of the present application, reference will now be made to the accompanying drawings and detailed description, wherein like reference numerals refer to like elements throughout.
The illustrative embodiments and descriptions of the present application are provided to explain the present application and not to limit the present application. Additionally, the same or similar numbered elements/components used in the drawings and the embodiments are used to represent the same or similar parts.
As used herein, "first," "second," …, etc., are not specifically intended to mean in a sequential or chronological order, nor are they intended to limit the application, but merely to distinguish between elements or operations described in the same technical language.
With respect to directional terminology used herein, for example: up, down, left, right, front or rear, etc., are simply directions with reference to the drawings. Accordingly, the directional terminology used is intended to be illustrative and is not intended to be limiting of the present teachings.
As used herein, the terms "comprising," "including," "having," "containing," and the like are open-ended terms that mean including, but not limited to.
As used herein, "and/or" includes any and all combinations of the described items.
References to "plurality" herein include "two" and "more than two"; reference to "multiple sets" herein includes "two sets" and "more than two sets".
As used herein, the terms "substantially", "about" and the like are used to modify any slight variation in quantity or error that does not alter the nature of the variation. In general, the range of slight variations or errors that such terms modify may be 20% in some embodiments, 10% in some embodiments, 5% in some embodiments, or other values. It should be understood by those skilled in the art that the aforementioned values can be adjusted according to actual needs, and are not limited thereto.
Certain words used to describe the present application are discussed below or elsewhere in this specification to provide additional guidance to those skilled in the art in describing the present application.
Example one
Fig. 1 is a flowchart of a private key generation method for a blockchain wallet based on fingerprint information according to an embodiment of the present application. As shown in fig. 1, the private key generation method of the blockchain electronic wallet based on fingerprint information includes the following steps:
and S1, acquiring the image of the user fingerprint.
And S2, performing binarization processing on the fingerprint image to obtain a binarized fingerprint image.
S3, extracting fingerprint feature points from the binary fingerprint image, and constructing a feature point set according to all the extracted fingerprint feature points, wherein the specific process is as follows:
note that the fingerprint feature points include end points and branch points of fingerprint ridges. Wherein, the end points refer to the ends of the ridge lines, and the bifurcation points refer to the intersection points of the three ridge lines.
And S31, scanning each pixel point in the binary fingerprint image and selecting a certain pixel point q.
S32, calculating a classification parameter N by using the pixel values of eight pixel points in the eight neighborhood pixel image of a certain pixel point q. The classification parameter N is calculated by adopting the following formula:
Figure BDA0001955843380000071
in the formula, piAnd expressing the pixel value of the ith pixel point in the eight-neighborhood pixel map of q.
S33, determining whether the pixel is an endpoint or a bifurcation point according to the classification parameter N, specifically, when N is equal to 1, the pixel q is an endpoint; and when N is equal to 3, the pixel point q is a bifurcation point.
S34, denoising the binary fingerprint image to obtain denoised end points and bifurcation points, wherein the specific process comprises the following steps:
and moving Z pixels along the ridge line where a certain end point is located by taking the end point as a starting point, if a bifurcation point is met in the Z pixels, judging the bifurcation point to be a noise point, and rejecting the noise point.
And traversing all end points and ridge lines in the binary fingerprint image, and eliminating all noise points.
Z is an adjustable parameter and can be adjusted according to the size and the resolution of the fingerprint image.
And S35, constructing a feature point set Q by using the denoised end points and bifurcation points.
S4, obtaining a normalized matrix according to the feature point set Q, wherein the specific process is as follows:
s41, assuming that there are k elements in the feature point set Q, for each of the k elements, respectively searching for two elements closest to the element, and calculating an euclidean distance between any two elements of the three elements.
Assuming that any element in the k elements is Q0, two elements Q1 and Q2 which are closest to the element Q0 are searched in the set Q, and the euclidean distance d1 between the elements Q0 and Q1, the euclidean distance d2 between Q1 and Q2, and the euclidean distance d2 between Q2 and Q0 are respectively calculated.
S42, sorting the three Euclidean distances corresponding to the element q0 according to a preset sequence, and forming a distance vector d by the three Euclidean distances obtained through sorting.
Specifically, d1, d2 and d3 may be arranged in order from small to large. Assume that the Euclidean distances d1, d2 and d3 are ordered from small to large to obtain distance vectors: d ═ d (d1, d2, d3)
S43, a two-dimensional distance vector D0 is formed using the distance vectors corresponding to the respective k elements.
S44, for each element in the two-dimensional distance vector D0, calculating a sum of three Euclidean distances contained in the element, sorting the sum according to a preset sequence, and forming a matrix D with k rows and 3 columns by the Euclidean distances contained in the elements corresponding to the sorted sum.
Therein, for example, the matrix D of k rows and 3 columns may be in the form of:
Figure BDA0001955843380000081
s45, carrying out normalization processing on each row element in the matrix D with k rows and 3 columns to obtain a normalized matrix
Figure BDA0001955843380000089
The process of normalizing each column element in the matrix D with k rows and 3 columns is as follows:
Figure BDA0001955843380000082
wherein m is 1,2,3, …, k, i is 2 or 3;
Figure BDA0001955843380000083
denotes the normalized element, dm,iRepresenting the element of the m-th row and i-th column of the matrix D, Dm,1Representing the element in row m and column 1 of matrix D.
For example, the normalized matrix of the matrix D of k rows and 3 columns in step S44
Figure BDA0001955843380000084
Can be as follows:
Figure BDA0001955843380000085
s5, generating a private key corresponding to the user fingerprint by using the normalized matrix, wherein the specific process is as follows:
s51, normalizing each element in the matrix
Figure BDA0001955843380000086
Calculating their corresponding rounded integers
Figure BDA0001955843380000087
Specifically, the following formula can be used to obtain:
Figure BDA0001955843380000088
in the formula, round represents rounding according to a rounding rule; λ represents an adjustable parameter, which is a non-negative integer and can take the value of 1,2, … ….
And S52, arranging and generating private keys corresponding to the user fingerprints according to a preset sequence.
For example, using the normalized matrix obtained in step S45
Figure BDA0001955843380000091
A private key of the following form may be generated when λ ═ 1:
1252611316……11416。
the private key generation method generates the private key based on the strong authentication biological characteristic information, the private key is strong in correlation with the fingerprint characteristic information of the user, the safety of the private key can be improved, and the private key cannot be easily deduced to be a specific value.
Example two
As shown in fig. 2, on the basis of the private key generation method for the blockchain electronic wallet based on the fingerprint information, the application also provides a private key generation system for the blockchain electronic wallet based on the fingerprint information, which includes an image acquisition module 1, a binarization processing module 2, a set construction module 3, a normalization matrix module 4 and a generation module 5.
The image acquisition module 1 is used for acquiring fingerprint information of a user.
The binarization processing module 2 is used for carrying out binarization processing on the fingerprint image to obtain a binarization fingerprint image.
The set construction module 3 is used for extracting fingerprint feature points from the binary fingerprint image and constructing a feature point set according to all the extracted fingerprint feature points.
The normalization matrix module 4 generates a normalization matrix using each element in the feature point set.
The generating module 5 generates a private key corresponding to the user fingerprint by using the normalized matrix
Specifically, the set building module 3 includes a pixel point scanning module, a classification parameter calculation module, a feature point determination module, a denoising module, and a set building module.
The pixel scanning module is used for scanning each pixel in the binary fingerprint image and determining a certain pixel.
The classification parameter calculation module calculates classification parameters by using pixel values of eight pixel points in an eight-neighborhood pixel map of a certain pixel point
And the characteristic point determining module is used for determining whether the pixel point is an endpoint or a bifurcation point according to the classification parameters.
And the denoising module is used for denoising the binary fingerprint image to obtain denoised end points and bifurcation points.
And the set establishing module establishes a feature point set by using the denoised end points and bifurcation points.
Specifically, the normalization matrix module 4 includes a euclidean distance calculation module, a sorting module, a two-dimensional distance vector establishing module, a matrix establishing module, and a normalization module.
The Euclidean distance calculation module is used for calculating the Euclidean distance between each element in the feature point set and two elements which are closest to the element in the feature point set.
The sorting module is used for sorting the three Euclidean distances corresponding to each element in the feature point set respectively and forming a distance vector by using the three Euclidean distances obtained after sorting.
The two-dimensional distance vector establishing module utilizes the distance vectors corresponding to the elements to form the two-dimensional distance vector.
The matrix establishing module is used for calculating sum values of three Euclidean distances contained in each element in the two-dimensional distance vector, sorting is carried out according to the sum values, and the Euclidean distances contained in the elements corresponding to the sorted sum values form a matrix with a plurality of rows and three columns.
The normalization module is used for performing normalization processing on each row of elements in the matrix with the rows and the columns to obtain a normalized matrix.
Specifically, the generation module 5 includes a rounding module and a ranking generation module.
And the rounding module is used for calculating a rounded integer of each element in the normalized matrix.
The sorting generation module is used for arranging and generating private keys corresponding to the user fingerprints according to a preset sequence.
It should be noted that: the private key generation system provided in the foregoing embodiment is only illustrated by dividing each program module, and in practical applications, the processing distribution may be completed by different program modules according to needs, that is, the internal structure of the private key generation system is divided into different program modules, so as to complete all or part of the processing described above. In addition, the private key generation system and the private key generation method provided by the above embodiments belong to the same concept, and specific implementation processes thereof are detailed in the method embodiments and are not described herein again.
The private key generation system generates the private key based on the strong authentication biological characteristic information, the private key is strong in correlation with the fingerprint characteristic information of the user, the safety of the private key can be improved, and the private key cannot be easily deduced to be a specific value.
Based on the hardware implementation of each module in the private key generation system, in order to implement the private key generation method for the fingerprint information-based blockchain electronic wallet provided in the embodiment of the present application, an embodiment of the present application further provides a private key generation apparatus for a blockchain electronic wallet based on fingerprint information, including: a processor and a memory for storing a computer program capable of running on the processor. Wherein the processor, when executing the computer program, performs the steps of:
and carrying out image acquisition on the user fingerprint.
And carrying out binarization processing on the fingerprint image to obtain a binarization fingerprint image.
And extracting fingerprint feature points from the binary fingerprint image, and constructing a feature point set according to all the extracted fingerprint feature points.
And obtaining a normalized matrix according to the feature point set.
And generating a private key corresponding to the user fingerprint by using the normalized matrix.
In an exemplary embodiment, the present application further provides a computer storage medium, which is a computer readable storage medium, for example, a memory including a computer program, which is executable by a processor in a private key generation system to perform the steps in the private key generation method. The computer-readable storage medium may be a magnetic random access Memory (FRAM), a Read Only Memory (ROM), a Programmable Read-Only Memory (PROM), an Erasable Programmable Read-Only Memory (EPROM), an Electrically Erasable Programmable Read-Only Memory (EEPROM), a Flash Memory (Flash Memory), a magnetic surface Memory, an optical disk, or a Compact Disc Read-Only Memory (CD-ROM), among other memories.
EXAMPLE III
As shown in fig. 3, the present application also provides a block chain-based personal electronic wallet, which includes a private key generated by any one of the above private key generation methods, and the private key generation method is stored on the block chain as an intelligent contract. When a user needs to obtain the private key, the private key corresponding to the user fingerprint can be regenerated by only calling the intelligent contract from the block chain and using the private key generation method.
By adopting the private key generation method of the block chain electronic wallet based on the fingerprint information, the private key does not need to be recorded any more, and the risks of being stolen and being illegally used can be avoided. The method can enhance the decentralized nature of blockchain personal electronic wallets. The storage medium is not needed, and the private key can be reproduced according to the fingerprint characteristic information of the user when the private key is lost or the storage device is forgotten to be carried. In addition, the private key generation method based on the strong authentication biological characteristics can effectively improve the safety of the private key, so that the private key cannot be easily deduced to be a specific value.
The foregoing is merely an illustrative embodiment of the present application, and any equivalent changes and modifications made by those skilled in the art without departing from the spirit and principles of the present application shall fall within the protection scope of the present application.

Claims (9)

1. A private key generation method of a block chain electronic wallet based on fingerprint information is characterized by comprising the following steps:
carrying out image acquisition on the user fingerprint;
carrying out binarization processing on the fingerprint image to obtain a binarized fingerprint image;
extracting fingerprint feature points from the binary fingerprint image, and constructing a feature point set according to all the extracted fingerprint feature points;
obtaining a normalized matrix according to the feature point set, wherein the specific process is as follows:
assuming that k elements exist in the feature point set Q, respectively searching two elements which are closest to the element for each element in the k elements, and calculating Euclidean distance between the element and any two elements in the two elements which are closest to the element;
sorting three Euclidean distances corresponding to a certain element according to a preset sequence, wherein the three Euclidean distances obtained by sorting form a distance vector d;
forming a two-dimensional distance vector D0 by using the distance vectors corresponding to the elements in the k elements;
for each element in the two-dimensional distance vector D0, calculating a sum of three Euclidean distances contained in the element, sorting the sum according to a preset sequence, wherein the Euclidean distances contained in the elements corresponding to the sorted sum form a matrix D with k rows and 3 columns;
normalizing each row of elements in the matrix D with the k rows and 3 columns to obtain a normalized matrix
Figure FDA0002856515100000012
And generating a private key corresponding to the user fingerprint by using the normalized matrix.
2. The private key generation method according to claim 1, wherein the steps of extracting the fingerprint feature points from the binarized fingerprint image and constructing the feature point set according to all the extracted fingerprint feature points comprise:
scanning each pixel point in the binary fingerprint image, and selecting a certain pixel point q;
calculating a classification parameter by using pixel values of eight pixel points in an eight-neighborhood pixel map of a certain pixel point q, wherein the classification parameter N is calculated by adopting the following formula:
Figure FDA0002856515100000011
in the formula, piExpressing the pixel value of the ith pixel point in the eight-neighborhood pixel image of q;
determining whether the pixel point is an end point or a bifurcation point according to the classification parameter N;
denoising the binary fingerprint image to obtain denoised end points and bifurcation points;
and constructing a feature point set by using the denoised end points and bifurcation points.
3. The method of claim 2, wherein the step of determining whether the pixel point is an endpoint or a bifurcation point according to the classification parameter N comprises:
when N is equal to 1, the pixel point q is an end point;
and when N is equal to 3, the pixel point q is a bifurcation point.
4. The private key generation method according to claim 2, wherein the denoising processing is performed on the binarized fingerprint image in the step to obtain denoised end points and bifurcation points by:
taking a certain end point as a starting point, moving Z pixels along a ridge line where the end point is located, if a bifurcation point is met in the Z pixels, judging the bifurcation point to be a noise point, and rejecting the noise point;
traversing all end points and ridge lines in the binary fingerprint image, and eliminating all noise points;
and Z is an adjustable parameter and is adjusted according to the size and the resolution of the fingerprint image.
5. The method for generating a private key according to claim 1, wherein the step of normalizing each column element in the k row by 3 column matrix D comprises:
Figure FDA0002856515100000021
wherein m is 1,2,3, …, k, i is 2 or 3;
Figure FDA0002856515100000022
denotes the normalized element, dm,iRepresenting the element of the m-th row and i-th column of the matrix D, Dm,1Representing the element in row m and column 1 of matrix D.
6. The method for generating a private key according to claim 1, wherein the specific process of generating the private key corresponding to the user fingerprint by using the normalized matrix in the step is as follows:
for each element in the normalized matrix
Figure FDA0002856515100000023
Calculating their corresponding rounded integers
Figure FDA0002856515100000024
Figure FDA0002856515100000025
In the formula, round represents rounding according to a rounding rule; λ represents an adjustable parameter, which is a non-negative integer;
and arranging and generating private keys corresponding to the user fingerprints according to a preset sequence.
7. A private key generation system for a blockchain electronic wallet based on fingerprint information, comprising:
the image acquisition module is used for acquiring fingerprint information of a user;
the binarization processing module is used for carrying out binarization processing on the fingerprint image to obtain a binarization fingerprint image;
the set construction module is used for extracting fingerprint feature points from the binary fingerprint image and constructing a feature point set according to all the extracted fingerprint feature points;
and the normalization matrix generation module is used for generating a normalization matrix by using each element in the feature point set, wherein the generation process of the normalization matrix is as follows: assuming that k elements exist in the feature point set Q, respectively searching two elements which are closest to the element for each element in the k elements, and calculating Euclidean distance between the element and any two elements in the two elements which are closest to the element;
sorting three Euclidean distances corresponding to a certain element according to a preset sequence, wherein the three Euclidean distances obtained by sorting form a distance vector d;
forming a two-dimensional distance vector D0 by using the distance vectors corresponding to the elements in the k elements;
for each element in the two-dimensional distance vector D0, calculating a sum of three Euclidean distances contained in the element, sorting the sum according to a preset sequence, wherein the Euclidean distances contained in the elements corresponding to the sorted sum form a matrix D with k rows and 3 columns;
normalizing each row of elements in the matrix D with the k rows and 3 columns to obtain a normalized matrix
Figure FDA0002856515100000031
And the generating module is used for generating a private key corresponding to the user fingerprint by using the normalized matrix.
8. A private key generation apparatus for a blockchain electronic wallet based on fingerprint information, comprising:
a processor for processing the received data, wherein the processor is used for processing the received data,
the processor is capable of invoking intelligent contracts from a blockchain,
the intelligent contract comprises a computer program that,
the computer program, when running on the processor, performs the steps of:
carrying out image acquisition on the user fingerprint;
carrying out binarization processing on the fingerprint image to obtain a binarized fingerprint image;
extracting fingerprint feature points from the binary fingerprint image, and constructing a feature point set according to all the extracted fingerprint feature points;
obtaining a normalized matrix according to the feature point set, wherein the generation process of the normalized matrix is as follows: assuming that k elements exist in the feature point set Q, respectively searching two elements which are closest to the element for each element in the k elements, and calculating Euclidean distance between the element and any two elements in the two elements which are closest to the element;
sorting three Euclidean distances corresponding to a certain element according to a preset sequence, wherein the three Euclidean distances obtained by sorting form a distance vector d;
forming a two-dimensional distance vector D0 by using the distance vectors corresponding to the elements in the k elements;
for each element in the two-dimensional distance vector D0, calculating a sum of three Euclidean distances contained in the element, sorting the sum according to a preset sequence, wherein the Euclidean distances contained in the elements corresponding to the sorted sum form a matrix D with k rows and 3 columns;
normalizing each row of elements in the matrix D with the k rows and 3 columns to obtain a normalized matrix
Figure FDA0002856515100000041
And generating a private key corresponding to the user fingerprint by using the normalized matrix.
9. A blockchain-based personal electronic wallet comprising a private key generated by the private key generation method of any one of claims 1 to 6, the private key generation method being stored as a smart contract on a blockchain.
CN201910066429.3A 2019-01-24 2019-01-24 Private key generation method and system of block chain electronic wallet based on fingerprint information Active CN109840487B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910066429.3A CN109840487B (en) 2019-01-24 2019-01-24 Private key generation method and system of block chain electronic wallet based on fingerprint information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910066429.3A CN109840487B (en) 2019-01-24 2019-01-24 Private key generation method and system of block chain electronic wallet based on fingerprint information

Publications (2)

Publication Number Publication Date
CN109840487A CN109840487A (en) 2019-06-04
CN109840487B true CN109840487B (en) 2021-03-23

Family

ID=66884061

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910066429.3A Active CN109840487B (en) 2019-01-24 2019-01-24 Private key generation method and system of block chain electronic wallet based on fingerprint information

Country Status (1)

Country Link
CN (1) CN109840487B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101452526A (en) * 2008-10-31 2009-06-10 电子科技大学 Two-dimension bar-code type identity authentication method based on finger print
CN102946310A (en) * 2012-09-03 2013-02-27 杭州电子科技大学 Fingerprint fuzzy vault method based on (k, w) threshold secret sharing scheme
CN103873253A (en) * 2014-03-03 2014-06-18 杭州电子科技大学 Method for generating human fingerprint biometric key
CN105701462A (en) * 2016-01-11 2016-06-22 成都布林特信息技术有限公司 Identity identification method
CN105975838A (en) * 2016-06-12 2016-09-28 北京集创北方科技股份有限公司 Secure chip, biological feature identification method and biological feature template registration method
CN106529407A (en) * 2016-10-09 2017-03-22 北京电子科技职业学院 Vehicle-mounted fingerprint recognition method

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006245949A (en) * 2005-03-02 2006-09-14 Fuji Xerox Co Ltd Image forming device
US20180114226A1 (en) * 2016-10-24 2018-04-26 Paypal, Inc. Unified login biometric authentication support

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101452526A (en) * 2008-10-31 2009-06-10 电子科技大学 Two-dimension bar-code type identity authentication method based on finger print
CN102946310A (en) * 2012-09-03 2013-02-27 杭州电子科技大学 Fingerprint fuzzy vault method based on (k, w) threshold secret sharing scheme
CN103873253A (en) * 2014-03-03 2014-06-18 杭州电子科技大学 Method for generating human fingerprint biometric key
CN105701462A (en) * 2016-01-11 2016-06-22 成都布林特信息技术有限公司 Identity identification method
CN105975838A (en) * 2016-06-12 2016-09-28 北京集创北方科技股份有限公司 Secure chip, biological feature identification method and biological feature template registration method
CN106529407A (en) * 2016-10-09 2017-03-22 北京电子科技职业学院 Vehicle-mounted fingerprint recognition method

Also Published As

Publication number Publication date
CN109840487A (en) 2019-06-04

Similar Documents

Publication Publication Date Title
US9813909B2 (en) Cloud server for authenticating the identity of a handset user
US9147127B2 (en) Verification of user photo IDs
Galbally et al. Iris image reconstruction from binary templates: An efficient probabilistic approach based on genetic algorithms
US20110038545A1 (en) Scale robust feature-based identifiers for image identification
EP3580713A1 (en) Systems and methods for biometric transaction management
US20100315201A1 (en) Biometrics authentication method and client terminal and authentication server used for biometrics authentication
CN110046577B (en) Pedestrian attribute prediction method, device, computer equipment and storage medium
US10089349B2 (en) Method and electronic device for updating the registered fingerprint datasets of fingerprint recognition
CN111783085B (en) Defense method and device for resisting sample attack and electronic equipment
US20200019970A1 (en) System and method for authenticating transactions from a mobile device
Pawade et al. Implementation of fingerprint-based authentication system using blockchain
Kim et al. Reconstruction of fingerprints from minutiae using conditional adversarial networks
US20220198711A1 (en) Learned forensic source system for identification of image capture device models and forensic similarity of digital images
JP6526494B2 (en) INFORMATION PROCESSING PROGRAM AND INFORMATION PROCESSING DEVICE
Evangelin et al. Securing recognized multimodal biometric images using cryptographic model
CN109840487B (en) Private key generation method and system of block chain electronic wallet based on fingerprint information
CN111079587B (en) Face recognition method and device, computer equipment and readable storage medium
CN116824676A (en) Digital identity information generation method, application method, device, system and equipment
Sheng et al. Reliable and secure encryption key generation from fingerprints
CN109801072B (en) Private key generation method and system of block chain electronic wallet based on facial features
CN100483449C (en) Curve identifying system
Szczepanik et al. Security lock system for mobile devices based on fingerprint recognition algorithm
Abusham et al. An Integration of New Digital Image Scrambling Technique on PCA‐Based Face Recognition System
CN116246317A (en) Face recognition processing method, device, computer equipment and storage medium
Ghani et al. Toward robust and privacy-enhanced facial recognition: A decentralized blockchain-based approach with GANs and deep learning

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant