CN111709000A - Encryption and decryption method based on multi-biological-feature fusion and application - Google Patents
Encryption and decryption method based on multi-biological-feature fusion and application Download PDFInfo
- Publication number
- CN111709000A CN111709000A CN202010496559.3A CN202010496559A CN111709000A CN 111709000 A CN111709000 A CN 111709000A CN 202010496559 A CN202010496559 A CN 202010496559A CN 111709000 A CN111709000 A CN 111709000A
- Authority
- CN
- China
- Prior art keywords
- data
- encryption
- encrypted
- key
- biological characteristic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 41
- 230000004927 fusion Effects 0.000 title claims abstract description 11
- 210000003462 vein Anatomy 0.000 claims abstract description 13
- 230000005540 biological transmission Effects 0.000 claims abstract description 10
- 230000008569 process Effects 0.000 claims description 12
- 210000000554 iris Anatomy 0.000 description 11
- 238000011161 development Methods 0.000 description 4
- 230000002457 bidirectional effect Effects 0.000 description 2
- 230000007547 defect Effects 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 238000007792 addition Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/70—Multimodal biometrics, e.g. combining information from different biometric modalities
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Human Computer Interaction (AREA)
- Multimedia (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses an encryption and decryption method based on multi-biological-feature fusion, which is characterized in that various biological-feature data and a password are combined to generate an encryption key through a Hash Hash function; the encryption key in combination with the private data may encrypt the private data. An encryption and decryption method based on multi-biological feature fusion is applied to network transmission of streaming media electronic files such as photos, videos and the like. The invention adds the security authentication technology of fusing biological characteristics such as iris, fingerprint, finger vein and the like with the password on the basis of the original information encryption, greatly improves the difficulty of the encryption and decryption technology of the information, and ensures that the secret key has more uniqueness.
Description
Technical Field
The invention relates to an encryption and decryption method and application, in particular to an encryption and decryption method and application based on multi-biometric feature fusion.
Background
With the progress of science and technology and the development of the information age, video information has a very important practical role today in networking and high-speed development of informatization, and along with the rapid popularization of computer networks, the rapid improvement of network performance, the surging of cloud computing and big data, network video monitoring is showing a vigorous development trend of hot fire towards the sky in smart cities, intelligent transportation, related enterprises, families and the like by virtue of good technical and cost advantages. Various household versions of intelligent camera products appear, monitoring on all aspects of a household is achieved at any time, convenience is brought to life of people, and meanwhile potential safety hazards of household information leakage are caused. Hidden dangers generated by the safety of the intelligent safety box directly relate to personal and property safety and personal privacy, and are widely concerned by society.
Generally, the intelligent camera products have the safety problems of system safety, account safety, storage safety and the like, at present, the existing similar intelligent cameras on the market mainly store data in a local storage mode and a cloud storage mode, wherein the largest potential safety hazard is the problem of leakage of stored information, at present, various key encryption methods such as encryption algorithm encryption, SD card storage encryption, server content encryption and the like are mainly adopted for the safety encryption problem of storage transmission, and through encryption, data such as images, voice, video and the like are transmitted in a key mode, or the data such as the images, the voice, the video and the like are uniformly stored on a cloud platform and are uniformly managed in a background, and the following two data transmission encryption and decryption methods which are used more in the market at present are listed:
the method comprises the following steps: when the background server receives a connection request sent by the camera; the server performs bidirectional authentication with the camera according to the request; after the bidirectional authentication is passed, the server transmits a special key to the camera, generates a temporary key and transmits the temporary key to the camera, so that the camera encrypts the acquired image data according to the temporary key and uploads the encrypted image data to the server; and the server decrypts the encrypted image data to acquire image data.
The method 2 comprises the following steps: the data encryption method comprises the steps of generating a symmetric key for data through a data encryption machine, storing the symmetric key in a security encryption camera and a background, generating a public key and a private key by the camera, leading out a public key and a unique ID, carrying out identity authentication with the background, shooting videos or photos of human body features and the like, encrypting the videos or photos, transmitting the encrypted videos or photos to the background, carrying out identity authentication on the background and the encryption camera, decrypting the encrypted ciphertext, matching a decryption result with the data stored in a database, identifying the data and the like.
The existing audio and video data transmission on the market has the following objective defects:
in the prior art and the scheme, most manufacturers adopt a back-end storage or cloud platform management mode, clients of streaming media products such as audio and video are installed on various client terminals such as computers and mobile phones and are distributed to a plurality of users for use, data are transmitted to the back-end storage or cloud platform through a key through a network, the data are stored in a centralized mode, the key is simple to set, information data such as images, voice and video can be easily cracked through a string of codes, the information data are exposed in a network environment, and the risk of being utilized by lawless persons exists.
Disclosure of Invention
In order to solve the defects of the technology, the invention provides an encryption and decryption method based on multi-biological-feature fusion and application thereof.
In order to solve the technical problems, the invention adopts the technical scheme that: an encryption and decryption method based on multi-biological characteristic fusion is characterized in that various biological characteristic data and passwords are combined to generate an encryption key through a Hash Hash function; the combination of the encryption key and the private data can encrypt the private data;
wherein the biometric data includes, but is not limited to, fingerprint, iris, and finger vein data; the biological characteristic data is collected by a collector, and digital characteristics are extracted and applied to a formula (I):
HASH (fingerprint) + HASH (iris) + HASH (vein) + password) formula (r)
The decryption method is that the new biological characteristic data extracted by the collector is combined with the password through a formula (i) to generate a decryption key, and when the encryption key is consistent with the decryption key, the encrypted private data can be decrypted.
An encryption and decryption method based on multi-biological feature fusion is applied to network transmission of streaming media electronic files such as photos, videos and the like, and the specific method comprises the following steps:
i, acquiring and storing personal biological characteristic data through an acquisition device to form prestored biological characteristic data;
II, encrypting and uploading the electronic file; setting a password, and generating an encryption key by combining biological characteristic data and the password through a formula (I); the streaming media data collected by a camera and a microphone of the terminal are encrypted through an encryption key to obtain encrypted data, and the encrypted data are uploaded to a server and/or a cloud platform; if the uploading is successful, the data encryption uploading process is finished, and if the uploading is unsuccessful, the re-encryption is returned;
III, downloading and checking the encrypted electronic file; when the user views the encrypted electronic file, the user can log in and download the encrypted electronic file at a plurality of terminals, and then decrypt the encrypted electronic file at the terminals.
Furthermore, the steps of encrypting and uploading the electronic file and downloading and checking the encrypted electronic file both need to be logged in through unlocking the terminal, and the method comprises the following steps: and inputting the biological characteristic data through the collector, matching the input biological characteristic data with the pre-stored biological characteristic data, and unlocking and logging in the terminal when the similarity is achieved.
Further, in the step II, the streaming media data collected by the camera and the microphone are processed by the encoder to form encoded data, and then the encoded data and the encryption key are combined to form encrypted data;
in the decryption process of the step III, the encrypted data is decrypted by the decryption key to obtain the encoded data after the key is removed, and then the encoded data is decoded by a decoder to obtain the same streaming media data generated by the original camera and the original microphone.
Furthermore, before the terminal downloads and views the encrypted electronic file, all data on the server and/or the cloud platform need to be extracted and distributed, and according to the biological feature data input on the terminal, biological feature data corresponding to the biological features are extracted and sent to the terminal.
The Hash function is selected in the present invention because the function has the following advantages: 1. the Hash function can further ensure the uniqueness, namely the safety, of the password; 2. the iris and fingerprint data of the user can not be reversely deduced through the Hash function, so that the privacy of the user is protected; 3. the output length of the Hash function is fixed, and the complexity of a decryption algorithm can be effectively reduced.
The invention has the following beneficial effects: the invention adds the security authentication technology of fusing biological characteristics (iris, fingerprint and finger vein) and password on the basis of the original information encryption, greatly improves the difficulty of the encryption and decryption technology of the information, and makes the key more unique.
Drawings
Fig. 1 is a schematic flow chart of a streaming media data encryption process.
Fig. 2 is a schematic flow chart of the decryption process of the encrypted streaming media data.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and specific embodiments.
Fig. 1 and 2 show an electronic file network transmission application based on a multi-biometric feature fusion encryption and decryption method, which includes the following specific steps:
and I, collecting and storing the biological characteristic data of the fingerprint, the iris, the finger vein and the like of the person through a collector to form pre-stored biological characteristic data.
II, encrypting and uploading the electronic file; unlocking the equipment terminal through biological characteristic data such as fingerprints, irises, finger veins and the like, and unlocking and logging in the terminal when the biological characteristic data acquired by the acquisition unit and the pre-stored biological characteristic data reach a matching degree; since the unlocking similarity of various biometric matches is different, the biometric matching is specifically set according to specific biometric features.
Setting a password, inputting the password, and combining the digital characteristics extracted from various biological characteristic data with the password through a Hash Hash function to generate an encryption key, as shown in a formula (r):
HASH (fingerprint) + HASH (iris) + HASH (vein) + password) formula (r)
The camera and the microphone of the equipment terminal can collect the streaming media data such as photos, videos and voices, the streaming media data are processed by the encoder to form encoded data, and then the encoded data and the encryption key are combined to form encrypted data.
Uploading the encrypted data to a server and/or a cloud platform; if the uploading is successful, the data encryption uploading process is finished, and if the uploading is unsuccessful, the re-encryption is returned.
The encryption process may be performed by a secure encryption module that applies an algorithm such as MD4, MD5, or SHA 1. The module internally comprises a key generation unit and a data encryption unit. The key generation unit is used for combining the password and the digital data extracted by the biological characteristics to form an encryption key. The data encryption unit is used for combining the encryption key and the coded data to form encrypted data.
III, downloading and checking the encrypted electronic file; when the user views the encrypted electronic file, the user can log in and download the encrypted electronic file at a plurality of terminals, and then decrypt the encrypted electronic file at the terminals. As shown in fig. 2, the specific process is as follows:
firstly, a collector of the equipment terminal is used for collecting biological characteristics such as fingerprints, irises and finger veins again, the biological characteristics are applied to unlock the equipment terminal, and then according to biological characteristic data input on the equipment terminal, biological characteristic encrypted data corresponding to the biological characteristics are extracted and sent to the terminal.
And extracting digital features in the acquired biological feature data, and generating a decryption key through a formula (I) by combining a password. The password for decryption and the password for encryption need to be the same, and when the encryption key is consistent with the decryption key, the encrypted data can be decrypted. If not, returning to the step of generating the decryption key, recalculating and decrypting again. The principle and algorithm of the decryption process are the same as those of the encryption process, so that the decryption key and the encryption key can be better corresponded.
In the decryption process, the encrypted data is decrypted through the decryption key to obtain the encoded data after the key is removed, and then the encoded data is decoded through a decoder to obtain the same streaming media data generated by the original camera and the original microphone. In addition, data conversion can be carried out according to the requirements of users, and image, voice or video data in a format meeting the requirements of the users can be generated through decoding. And then performing requirement processing such as viewing, local storage, forwarding, deleting and the like on the decoded streaming media data.
The invention is different from the prior art in that:
a. the invention aims to solve the safety problem of streaming media data transmission information, combines the uniqueness, accuracy and difficult imitability of the current popular biological identification characteristics, namely iris, fingerprint and finger vein identification and the easy operability of password identification, fuses a plurality of biological characteristics to generate a final key, adds a high-safety and high-reliability protection function for data transmission and storage, has the characteristics of easy operation, strong practicability and the like, effectively solves the safety problem of the privacy data information which is most concerned by the current society and the like, and lays a solid foundation for the rapid and healthy development of the intelligent home industry.
b. The invention is different from the streaming media data transmission function in the current market, increases the biological characteristics of fingerprints, irises, finger veins and the like in the key generation link, generates a key with higher level, and needs to input the biological characteristics when logging in equipment, and has the advantages of higher safety and operability, low cost and the like compared with the common key. Multiple authentications of the biological characteristics and the password ensure that the secret key is safer; aiming at the generation of the key, a Hash Hash function is adopted to generate an encryption and decryption key for data in a security encryption module, so that the operation is simple and easy; the biological characteristics of the iris, the fingerprint, the finger vein and the like are carried by the body of the user, and only acquisition equipment needs to be purchased, and the acquisition equipment on the market has various varieties and low price, so the key generation has the characteristic of low cost in economic consideration.
The above embodiments are not intended to limit the present invention, and the present invention is not limited to the above examples, and those skilled in the art may make variations, modifications, additions or substitutions within the technical scope of the present invention.
Claims (5)
1. An encryption and decryption method based on multi-biometric feature fusion is characterized in that: the encryption method is that various biological characteristic data and passwords are combined through a Hash Hash function to generate an encryption key; the combination of the encryption key and the private data can encrypt the private data;
wherein the biometric data includes, but is not limited to, fingerprint, iris, and finger vein data; the biological characteristic data is collected by a collector, and digital characteristics are extracted and applied to a formula (I):
HASH (fingerprint) + HASH (iris) + HASH (vein) + password) formula (r)
The decryption method is that the new biological characteristic data extracted by the collector is combined with the password through a formula (i) to generate a decryption key, and when the encryption key is consistent with the decryption key, the encrypted private data can be decrypted.
2. The application of the multi-biometric-feature-fusion-based encryption and decryption method according to claim 1, wherein the method comprises the following steps: the encryption and decryption method based on multi-biometric feature fusion is applied to network transmission of electronic files, and the specific method is as follows:
i, acquiring and storing personal biological characteristic data through an acquisition device to form prestored biological characteristic data;
II, encrypting and uploading the electronic file; setting a password, and generating an encryption key by combining biological characteristic data and the password through a formula (I); the streaming media data collected by a camera and a microphone of the terminal are encrypted through an encryption key to obtain encrypted data, and the encrypted data are uploaded to a server and/or a cloud platform; if the uploading is successful, the data encryption uploading process is finished, and if the uploading is unsuccessful, the re-encryption is returned;
III, downloading and checking the encrypted electronic file; when the user views the encrypted electronic file, the user can log in and download the encrypted electronic file at a plurality of terminals, and then decrypt the encrypted electronic file at the terminals.
3. The application of the multi-biometric-feature-fusion-based encryption and decryption method according to claim 2, wherein: the steps of encrypting and uploading the electronic file and downloading and checking the encrypted electronic file all need to be logged in through unlocking the terminal, and the method comprises the following steps: and inputting the biological characteristic data through the collector, matching the input biological characteristic data with the pre-stored biological characteristic data, and unlocking and logging in the terminal when the similarity is achieved.
4. The application of the multi-biometric-feature-fusion-based encryption and decryption method according to claim 2, wherein: in the step II, the streaming media data collected by the camera and the microphone are processed by the encoder to form encoded data, and then the encoded data and the encryption key are combined to form encrypted data;
in the decryption process of the step III, the encrypted data is decrypted by the decryption key to obtain the encoded data after the key is removed, and then the encoded data is decoded by a decoder to obtain the same streaming media data generated by the original camera and the original microphone.
5. The application of the multi-biometric-feature-fusion-based encryption and decryption method according to claim 2, wherein: before a terminal downloads and checks an encrypted electronic file, all data on a server and/or a cloud platform need to be extracted and distributed, and according to biological characteristic data input on the terminal, biological characteristic data corresponding to the biological characteristics are extracted and sent to the terminal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010496559.3A CN111709000A (en) | 2020-06-03 | 2020-06-03 | Encryption and decryption method based on multi-biological-feature fusion and application |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010496559.3A CN111709000A (en) | 2020-06-03 | 2020-06-03 | Encryption and decryption method based on multi-biological-feature fusion and application |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111709000A true CN111709000A (en) | 2020-09-25 |
Family
ID=72539144
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010496559.3A Pending CN111709000A (en) | 2020-06-03 | 2020-06-03 | Encryption and decryption method based on multi-biological-feature fusion and application |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111709000A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113158213A (en) * | 2021-04-30 | 2021-07-23 | 重庆市科学技术研究院 | Data transmission method and system based on in-vivo verification |
CN115378591A (en) * | 2022-07-18 | 2022-11-22 | 咚咚数字科技有限公司 | Anonymous biological characteristic key transmission method based on fusion |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101034987A (en) * | 2007-01-18 | 2007-09-12 | 北京飞天诚信科技有限公司 | Method and device for improving the security of the intelligent secret key |
CN102185694A (en) * | 2010-12-21 | 2011-09-14 | 常熟理工学院 | Electronic file encrypting method and system based on fingerprint information |
CN105429761A (en) * | 2015-12-29 | 2016-03-23 | 宇龙计算机通信科技(深圳)有限公司 | Key generation method and device |
CN106789043A (en) * | 2017-02-20 | 2017-05-31 | 珠海市魅族科技有限公司 | A kind of method for generating cipher code, method of password authentication and relevant apparatus |
CN107070666A (en) * | 2017-05-15 | 2017-08-18 | 广东虹勤通讯技术有限公司 | A kind of encryption and decryption method and device |
-
2020
- 2020-06-03 CN CN202010496559.3A patent/CN111709000A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101034987A (en) * | 2007-01-18 | 2007-09-12 | 北京飞天诚信科技有限公司 | Method and device for improving the security of the intelligent secret key |
CN102185694A (en) * | 2010-12-21 | 2011-09-14 | 常熟理工学院 | Electronic file encrypting method and system based on fingerprint information |
CN105429761A (en) * | 2015-12-29 | 2016-03-23 | 宇龙计算机通信科技(深圳)有限公司 | Key generation method and device |
CN106789043A (en) * | 2017-02-20 | 2017-05-31 | 珠海市魅族科技有限公司 | A kind of method for generating cipher code, method of password authentication and relevant apparatus |
CN107070666A (en) * | 2017-05-15 | 2017-08-18 | 广东虹勤通讯技术有限公司 | A kind of encryption and decryption method and device |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113158213A (en) * | 2021-04-30 | 2021-07-23 | 重庆市科学技术研究院 | Data transmission method and system based on in-vivo verification |
CN113158213B (en) * | 2021-04-30 | 2022-11-29 | 重庆市科学技术研究院 | Data transmission method and system based on in-vivo verification |
CN115378591A (en) * | 2022-07-18 | 2022-11-22 | 咚咚数字科技有限公司 | Anonymous biological characteristic key transmission method based on fusion |
CN115378591B (en) * | 2022-07-18 | 2023-04-07 | 咚咚数字科技有限公司 | Anonymous biological characteristic key transmission method based on fusion |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5088381B2 (en) | Data communication method and system | |
US9189612B2 (en) | Biometric verification with improved privacy and network performance in client-server networks | |
EP3132368B1 (en) | Method and apparatus of verifying usability of biological characteristic image | |
CN107707504B (en) | Streaming media playing method and system, server and client | |
US20040255168A1 (en) | Biometric authentication system | |
CN105141615A (en) | Method and system for opening account remotely, authentication method and system | |
CN103036674A (en) | Computer permission control method based on mobile dynamic password | |
CN111709000A (en) | Encryption and decryption method based on multi-biological-feature fusion and application | |
CN105208045A (en) | Identity authentication method, equipment and system | |
CN104715537A (en) | Encryption and decryption method based on digital tags | |
CN114357418A (en) | Encryption authentication method, system, terminal device, server and storage medium | |
CN110619228B (en) | File decryption method, file encryption method, file management system and storage medium | |
JP6151627B2 (en) | Biometric authentication system, biometric authentication method, and computer program | |
CN116709325A (en) | Mobile equipment security authentication method based on high-speed encryption algorithm | |
CN111275855A (en) | Door lock control method, device and system, electronic equipment and storage medium | |
CN112307875A (en) | Face verification method and face verification system | |
WO2002103535A1 (en) | Qualification certifying method using variable certification information | |
CN116132037A (en) | Safety hidden communication method | |
CN108566365B (en) | Intelligent door lock opening method based on sound wave technology | |
CN111984995A (en) | Data encryption method of network camera based on private cloud | |
JP4409813B2 (en) | Client server system using mediation machine | |
KR20000059049A (en) | Method and system for preserving data based on network | |
TWI736280B (en) | Identity verification method based on biometrics | |
KR100864330B1 (en) | Data communication method and system, and computer readable recording medium | |
CN105897422A (en) | Method using eye pattern recognition to carry out account login and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200925 |
|
RJ01 | Rejection of invention patent application after publication |