CN111709000A - Encryption and decryption method based on multi-biological-feature fusion and application - Google Patents

Encryption and decryption method based on multi-biological-feature fusion and application Download PDF

Info

Publication number
CN111709000A
CN111709000A CN202010496559.3A CN202010496559A CN111709000A CN 111709000 A CN111709000 A CN 111709000A CN 202010496559 A CN202010496559 A CN 202010496559A CN 111709000 A CN111709000 A CN 111709000A
Authority
CN
China
Prior art keywords
data
encryption
encrypted
key
biological characteristic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010496559.3A
Other languages
Chinese (zh)
Inventor
李亚平
赵军辉
徐成华
魏育成
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhongke Jiudu Beijing Spatial Information Technology Co ltd
Original Assignee
Zhongke Jiudu Beijing Spatial Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhongke Jiudu Beijing Spatial Information Technology Co ltd filed Critical Zhongke Jiudu Beijing Spatial Information Technology Co ltd
Priority to CN202010496559.3A priority Critical patent/CN111709000A/en
Publication of CN111709000A publication Critical patent/CN111709000A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/70Multimodal biometrics, e.g. combining information from different biometric modalities

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Human Computer Interaction (AREA)
  • Multimedia (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses an encryption and decryption method based on multi-biological-feature fusion, which is characterized in that various biological-feature data and a password are combined to generate an encryption key through a Hash Hash function; the encryption key in combination with the private data may encrypt the private data. An encryption and decryption method based on multi-biological feature fusion is applied to network transmission of streaming media electronic files such as photos, videos and the like. The invention adds the security authentication technology of fusing biological characteristics such as iris, fingerprint, finger vein and the like with the password on the basis of the original information encryption, greatly improves the difficulty of the encryption and decryption technology of the information, and ensures that the secret key has more uniqueness.

Description

Encryption and decryption method based on multi-biological-feature fusion and application
Technical Field
The invention relates to an encryption and decryption method and application, in particular to an encryption and decryption method and application based on multi-biometric feature fusion.
Background
With the progress of science and technology and the development of the information age, video information has a very important practical role today in networking and high-speed development of informatization, and along with the rapid popularization of computer networks, the rapid improvement of network performance, the surging of cloud computing and big data, network video monitoring is showing a vigorous development trend of hot fire towards the sky in smart cities, intelligent transportation, related enterprises, families and the like by virtue of good technical and cost advantages. Various household versions of intelligent camera products appear, monitoring on all aspects of a household is achieved at any time, convenience is brought to life of people, and meanwhile potential safety hazards of household information leakage are caused. Hidden dangers generated by the safety of the intelligent safety box directly relate to personal and property safety and personal privacy, and are widely concerned by society.
Generally, the intelligent camera products have the safety problems of system safety, account safety, storage safety and the like, at present, the existing similar intelligent cameras on the market mainly store data in a local storage mode and a cloud storage mode, wherein the largest potential safety hazard is the problem of leakage of stored information, at present, various key encryption methods such as encryption algorithm encryption, SD card storage encryption, server content encryption and the like are mainly adopted for the safety encryption problem of storage transmission, and through encryption, data such as images, voice, video and the like are transmitted in a key mode, or the data such as the images, the voice, the video and the like are uniformly stored on a cloud platform and are uniformly managed in a background, and the following two data transmission encryption and decryption methods which are used more in the market at present are listed:
the method comprises the following steps: when the background server receives a connection request sent by the camera; the server performs bidirectional authentication with the camera according to the request; after the bidirectional authentication is passed, the server transmits a special key to the camera, generates a temporary key and transmits the temporary key to the camera, so that the camera encrypts the acquired image data according to the temporary key and uploads the encrypted image data to the server; and the server decrypts the encrypted image data to acquire image data.
The method 2 comprises the following steps: the data encryption method comprises the steps of generating a symmetric key for data through a data encryption machine, storing the symmetric key in a security encryption camera and a background, generating a public key and a private key by the camera, leading out a public key and a unique ID, carrying out identity authentication with the background, shooting videos or photos of human body features and the like, encrypting the videos or photos, transmitting the encrypted videos or photos to the background, carrying out identity authentication on the background and the encryption camera, decrypting the encrypted ciphertext, matching a decryption result with the data stored in a database, identifying the data and the like.
The existing audio and video data transmission on the market has the following objective defects:
in the prior art and the scheme, most manufacturers adopt a back-end storage or cloud platform management mode, clients of streaming media products such as audio and video are installed on various client terminals such as computers and mobile phones and are distributed to a plurality of users for use, data are transmitted to the back-end storage or cloud platform through a key through a network, the data are stored in a centralized mode, the key is simple to set, information data such as images, voice and video can be easily cracked through a string of codes, the information data are exposed in a network environment, and the risk of being utilized by lawless persons exists.
Disclosure of Invention
In order to solve the defects of the technology, the invention provides an encryption and decryption method based on multi-biological-feature fusion and application thereof.
In order to solve the technical problems, the invention adopts the technical scheme that: an encryption and decryption method based on multi-biological characteristic fusion is characterized in that various biological characteristic data and passwords are combined to generate an encryption key through a Hash Hash function; the combination of the encryption key and the private data can encrypt the private data;
wherein the biometric data includes, but is not limited to, fingerprint, iris, and finger vein data; the biological characteristic data is collected by a collector, and digital characteristics are extracted and applied to a formula (I):
HASH (fingerprint) + HASH (iris) + HASH (vein) + password) formula (r)
The decryption method is that the new biological characteristic data extracted by the collector is combined with the password through a formula (i) to generate a decryption key, and when the encryption key is consistent with the decryption key, the encrypted private data can be decrypted.
An encryption and decryption method based on multi-biological feature fusion is applied to network transmission of streaming media electronic files such as photos, videos and the like, and the specific method comprises the following steps:
i, acquiring and storing personal biological characteristic data through an acquisition device to form prestored biological characteristic data;
II, encrypting and uploading the electronic file; setting a password, and generating an encryption key by combining biological characteristic data and the password through a formula (I); the streaming media data collected by a camera and a microphone of the terminal are encrypted through an encryption key to obtain encrypted data, and the encrypted data are uploaded to a server and/or a cloud platform; if the uploading is successful, the data encryption uploading process is finished, and if the uploading is unsuccessful, the re-encryption is returned;
III, downloading and checking the encrypted electronic file; when the user views the encrypted electronic file, the user can log in and download the encrypted electronic file at a plurality of terminals, and then decrypt the encrypted electronic file at the terminals.
Furthermore, the steps of encrypting and uploading the electronic file and downloading and checking the encrypted electronic file both need to be logged in through unlocking the terminal, and the method comprises the following steps: and inputting the biological characteristic data through the collector, matching the input biological characteristic data with the pre-stored biological characteristic data, and unlocking and logging in the terminal when the similarity is achieved.
Further, in the step II, the streaming media data collected by the camera and the microphone are processed by the encoder to form encoded data, and then the encoded data and the encryption key are combined to form encrypted data;
in the decryption process of the step III, the encrypted data is decrypted by the decryption key to obtain the encoded data after the key is removed, and then the encoded data is decoded by a decoder to obtain the same streaming media data generated by the original camera and the original microphone.
Furthermore, before the terminal downloads and views the encrypted electronic file, all data on the server and/or the cloud platform need to be extracted and distributed, and according to the biological feature data input on the terminal, biological feature data corresponding to the biological features are extracted and sent to the terminal.
The Hash function is selected in the present invention because the function has the following advantages: 1. the Hash function can further ensure the uniqueness, namely the safety, of the password; 2. the iris and fingerprint data of the user can not be reversely deduced through the Hash function, so that the privacy of the user is protected; 3. the output length of the Hash function is fixed, and the complexity of a decryption algorithm can be effectively reduced.
The invention has the following beneficial effects: the invention adds the security authentication technology of fusing biological characteristics (iris, fingerprint and finger vein) and password on the basis of the original information encryption, greatly improves the difficulty of the encryption and decryption technology of the information, and makes the key more unique.
Drawings
Fig. 1 is a schematic flow chart of a streaming media data encryption process.
Fig. 2 is a schematic flow chart of the decryption process of the encrypted streaming media data.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and specific embodiments.
Fig. 1 and 2 show an electronic file network transmission application based on a multi-biometric feature fusion encryption and decryption method, which includes the following specific steps:
and I, collecting and storing the biological characteristic data of the fingerprint, the iris, the finger vein and the like of the person through a collector to form pre-stored biological characteristic data.
II, encrypting and uploading the electronic file; unlocking the equipment terminal through biological characteristic data such as fingerprints, irises, finger veins and the like, and unlocking and logging in the terminal when the biological characteristic data acquired by the acquisition unit and the pre-stored biological characteristic data reach a matching degree; since the unlocking similarity of various biometric matches is different, the biometric matching is specifically set according to specific biometric features.
Setting a password, inputting the password, and combining the digital characteristics extracted from various biological characteristic data with the password through a Hash Hash function to generate an encryption key, as shown in a formula (r):
HASH (fingerprint) + HASH (iris) + HASH (vein) + password) formula (r)
The camera and the microphone of the equipment terminal can collect the streaming media data such as photos, videos and voices, the streaming media data are processed by the encoder to form encoded data, and then the encoded data and the encryption key are combined to form encrypted data.
Uploading the encrypted data to a server and/or a cloud platform; if the uploading is successful, the data encryption uploading process is finished, and if the uploading is unsuccessful, the re-encryption is returned.
The encryption process may be performed by a secure encryption module that applies an algorithm such as MD4, MD5, or SHA 1. The module internally comprises a key generation unit and a data encryption unit. The key generation unit is used for combining the password and the digital data extracted by the biological characteristics to form an encryption key. The data encryption unit is used for combining the encryption key and the coded data to form encrypted data.
III, downloading and checking the encrypted electronic file; when the user views the encrypted electronic file, the user can log in and download the encrypted electronic file at a plurality of terminals, and then decrypt the encrypted electronic file at the terminals. As shown in fig. 2, the specific process is as follows:
firstly, a collector of the equipment terminal is used for collecting biological characteristics such as fingerprints, irises and finger veins again, the biological characteristics are applied to unlock the equipment terminal, and then according to biological characteristic data input on the equipment terminal, biological characteristic encrypted data corresponding to the biological characteristics are extracted and sent to the terminal.
And extracting digital features in the acquired biological feature data, and generating a decryption key through a formula (I) by combining a password. The password for decryption and the password for encryption need to be the same, and when the encryption key is consistent with the decryption key, the encrypted data can be decrypted. If not, returning to the step of generating the decryption key, recalculating and decrypting again. The principle and algorithm of the decryption process are the same as those of the encryption process, so that the decryption key and the encryption key can be better corresponded.
In the decryption process, the encrypted data is decrypted through the decryption key to obtain the encoded data after the key is removed, and then the encoded data is decoded through a decoder to obtain the same streaming media data generated by the original camera and the original microphone. In addition, data conversion can be carried out according to the requirements of users, and image, voice or video data in a format meeting the requirements of the users can be generated through decoding. And then performing requirement processing such as viewing, local storage, forwarding, deleting and the like on the decoded streaming media data.
The invention is different from the prior art in that:
a. the invention aims to solve the safety problem of streaming media data transmission information, combines the uniqueness, accuracy and difficult imitability of the current popular biological identification characteristics, namely iris, fingerprint and finger vein identification and the easy operability of password identification, fuses a plurality of biological characteristics to generate a final key, adds a high-safety and high-reliability protection function for data transmission and storage, has the characteristics of easy operation, strong practicability and the like, effectively solves the safety problem of the privacy data information which is most concerned by the current society and the like, and lays a solid foundation for the rapid and healthy development of the intelligent home industry.
b. The invention is different from the streaming media data transmission function in the current market, increases the biological characteristics of fingerprints, irises, finger veins and the like in the key generation link, generates a key with higher level, and needs to input the biological characteristics when logging in equipment, and has the advantages of higher safety and operability, low cost and the like compared with the common key. Multiple authentications of the biological characteristics and the password ensure that the secret key is safer; aiming at the generation of the key, a Hash Hash function is adopted to generate an encryption and decryption key for data in a security encryption module, so that the operation is simple and easy; the biological characteristics of the iris, the fingerprint, the finger vein and the like are carried by the body of the user, and only acquisition equipment needs to be purchased, and the acquisition equipment on the market has various varieties and low price, so the key generation has the characteristic of low cost in economic consideration.
The above embodiments are not intended to limit the present invention, and the present invention is not limited to the above examples, and those skilled in the art may make variations, modifications, additions or substitutions within the technical scope of the present invention.

Claims (5)

1. An encryption and decryption method based on multi-biometric feature fusion is characterized in that: the encryption method is that various biological characteristic data and passwords are combined through a Hash Hash function to generate an encryption key; the combination of the encryption key and the private data can encrypt the private data;
wherein the biometric data includes, but is not limited to, fingerprint, iris, and finger vein data; the biological characteristic data is collected by a collector, and digital characteristics are extracted and applied to a formula (I):
HASH (fingerprint) + HASH (iris) + HASH (vein) + password) formula (r)
The decryption method is that the new biological characteristic data extracted by the collector is combined with the password through a formula (i) to generate a decryption key, and when the encryption key is consistent with the decryption key, the encrypted private data can be decrypted.
2. The application of the multi-biometric-feature-fusion-based encryption and decryption method according to claim 1, wherein the method comprises the following steps: the encryption and decryption method based on multi-biometric feature fusion is applied to network transmission of electronic files, and the specific method is as follows:
i, acquiring and storing personal biological characteristic data through an acquisition device to form prestored biological characteristic data;
II, encrypting and uploading the electronic file; setting a password, and generating an encryption key by combining biological characteristic data and the password through a formula (I); the streaming media data collected by a camera and a microphone of the terminal are encrypted through an encryption key to obtain encrypted data, and the encrypted data are uploaded to a server and/or a cloud platform; if the uploading is successful, the data encryption uploading process is finished, and if the uploading is unsuccessful, the re-encryption is returned;
III, downloading and checking the encrypted electronic file; when the user views the encrypted electronic file, the user can log in and download the encrypted electronic file at a plurality of terminals, and then decrypt the encrypted electronic file at the terminals.
3. The application of the multi-biometric-feature-fusion-based encryption and decryption method according to claim 2, wherein: the steps of encrypting and uploading the electronic file and downloading and checking the encrypted electronic file all need to be logged in through unlocking the terminal, and the method comprises the following steps: and inputting the biological characteristic data through the collector, matching the input biological characteristic data with the pre-stored biological characteristic data, and unlocking and logging in the terminal when the similarity is achieved.
4. The application of the multi-biometric-feature-fusion-based encryption and decryption method according to claim 2, wherein: in the step II, the streaming media data collected by the camera and the microphone are processed by the encoder to form encoded data, and then the encoded data and the encryption key are combined to form encrypted data;
in the decryption process of the step III, the encrypted data is decrypted by the decryption key to obtain the encoded data after the key is removed, and then the encoded data is decoded by a decoder to obtain the same streaming media data generated by the original camera and the original microphone.
5. The application of the multi-biometric-feature-fusion-based encryption and decryption method according to claim 2, wherein: before a terminal downloads and checks an encrypted electronic file, all data on a server and/or a cloud platform need to be extracted and distributed, and according to biological characteristic data input on the terminal, biological characteristic data corresponding to the biological characteristics are extracted and sent to the terminal.
CN202010496559.3A 2020-06-03 2020-06-03 Encryption and decryption method based on multi-biological-feature fusion and application Pending CN111709000A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010496559.3A CN111709000A (en) 2020-06-03 2020-06-03 Encryption and decryption method based on multi-biological-feature fusion and application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010496559.3A CN111709000A (en) 2020-06-03 2020-06-03 Encryption and decryption method based on multi-biological-feature fusion and application

Publications (1)

Publication Number Publication Date
CN111709000A true CN111709000A (en) 2020-09-25

Family

ID=72539144

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010496559.3A Pending CN111709000A (en) 2020-06-03 2020-06-03 Encryption and decryption method based on multi-biological-feature fusion and application

Country Status (1)

Country Link
CN (1) CN111709000A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113158213A (en) * 2021-04-30 2021-07-23 重庆市科学技术研究院 Data transmission method and system based on in-vivo verification
CN115378591A (en) * 2022-07-18 2022-11-22 咚咚数字科技有限公司 Anonymous biological characteristic key transmission method based on fusion

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101034987A (en) * 2007-01-18 2007-09-12 北京飞天诚信科技有限公司 Method and device for improving the security of the intelligent secret key
CN102185694A (en) * 2010-12-21 2011-09-14 常熟理工学院 Electronic file encrypting method and system based on fingerprint information
CN105429761A (en) * 2015-12-29 2016-03-23 宇龙计算机通信科技(深圳)有限公司 Key generation method and device
CN106789043A (en) * 2017-02-20 2017-05-31 珠海市魅族科技有限公司 A kind of method for generating cipher code, method of password authentication and relevant apparatus
CN107070666A (en) * 2017-05-15 2017-08-18 广东虹勤通讯技术有限公司 A kind of encryption and decryption method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101034987A (en) * 2007-01-18 2007-09-12 北京飞天诚信科技有限公司 Method and device for improving the security of the intelligent secret key
CN102185694A (en) * 2010-12-21 2011-09-14 常熟理工学院 Electronic file encrypting method and system based on fingerprint information
CN105429761A (en) * 2015-12-29 2016-03-23 宇龙计算机通信科技(深圳)有限公司 Key generation method and device
CN106789043A (en) * 2017-02-20 2017-05-31 珠海市魅族科技有限公司 A kind of method for generating cipher code, method of password authentication and relevant apparatus
CN107070666A (en) * 2017-05-15 2017-08-18 广东虹勤通讯技术有限公司 A kind of encryption and decryption method and device

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113158213A (en) * 2021-04-30 2021-07-23 重庆市科学技术研究院 Data transmission method and system based on in-vivo verification
CN113158213B (en) * 2021-04-30 2022-11-29 重庆市科学技术研究院 Data transmission method and system based on in-vivo verification
CN115378591A (en) * 2022-07-18 2022-11-22 咚咚数字科技有限公司 Anonymous biological characteristic key transmission method based on fusion
CN115378591B (en) * 2022-07-18 2023-04-07 咚咚数字科技有限公司 Anonymous biological characteristic key transmission method based on fusion

Similar Documents

Publication Publication Date Title
JP5088381B2 (en) Data communication method and system
US9189612B2 (en) Biometric verification with improved privacy and network performance in client-server networks
EP3132368B1 (en) Method and apparatus of verifying usability of biological characteristic image
CN107707504B (en) Streaming media playing method and system, server and client
US20040255168A1 (en) Biometric authentication system
CN105141615A (en) Method and system for opening account remotely, authentication method and system
CN103036674A (en) Computer permission control method based on mobile dynamic password
CN111709000A (en) Encryption and decryption method based on multi-biological-feature fusion and application
CN105208045A (en) Identity authentication method, equipment and system
CN104715537A (en) Encryption and decryption method based on digital tags
CN114357418A (en) Encryption authentication method, system, terminal device, server and storage medium
CN110619228B (en) File decryption method, file encryption method, file management system and storage medium
JP6151627B2 (en) Biometric authentication system, biometric authentication method, and computer program
CN116709325A (en) Mobile equipment security authentication method based on high-speed encryption algorithm
CN111275855A (en) Door lock control method, device and system, electronic equipment and storage medium
CN112307875A (en) Face verification method and face verification system
WO2002103535A1 (en) Qualification certifying method using variable certification information
CN116132037A (en) Safety hidden communication method
CN108566365B (en) Intelligent door lock opening method based on sound wave technology
CN111984995A (en) Data encryption method of network camera based on private cloud
JP4409813B2 (en) Client server system using mediation machine
KR20000059049A (en) Method and system for preserving data based on network
TWI736280B (en) Identity verification method based on biometrics
KR100864330B1 (en) Data communication method and system, and computer readable recording medium
CN105897422A (en) Method using eye pattern recognition to carry out account login and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200925

RJ01 Rejection of invention patent application after publication