CN112804065A - Digital certificate authentication method based on hand shape recognition - Google Patents

Digital certificate authentication method based on hand shape recognition Download PDF

Info

Publication number
CN112804065A
CN112804065A CN202110278590.4A CN202110278590A CN112804065A CN 112804065 A CN112804065 A CN 112804065A CN 202110278590 A CN202110278590 A CN 202110278590A CN 112804065 A CN112804065 A CN 112804065A
Authority
CN
China
Prior art keywords
hand shape
server
information
finger
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110278590.4A
Other languages
Chinese (zh)
Inventor
李晓坤
徐龙
刘清源
董潍赫
黄逸群
付文香
张心雨
陈伟良
赵瑞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xunao Shanghai Technology Co ltd
Original Assignee
Xunao Shanghai Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xunao Shanghai Technology Co ltd filed Critical Xunao Shanghai Technology Co ltd
Priority to CN202110278590.4A priority Critical patent/CN112804065A/en
Publication of CN112804065A publication Critical patent/CN112804065A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/22Matching criteria, e.g. proximity measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/40Extraction of image or video features
    • G06V10/44Local feature extraction by analysis of parts of the pattern, e.g. by detecting edges, contours, loops, corners, strokes or intersections; Connectivity analysis, e.g. of connected components
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/107Static hand or arm
    • G06V40/11Hand-related biometrics; Hand pose recognition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Multimedia (AREA)
  • Evolutionary Biology (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Evolutionary Computation (AREA)
  • Human Computer Interaction (AREA)
  • Health & Medical Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • General Engineering & Computer Science (AREA)
  • Artificial Intelligence (AREA)
  • Algebra (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Physics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Computing Systems (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention provides a digital certificate authentication method based on hand shape recognition, which comprises the following steps: the server receives the user hand shape image information from the sensor, performs feature extraction through methods of hand shape image preprocessing, finger contour overlapping degree calculation and the like, and then performs threshold comparison on the hand shape similarity by using a hand shape recognition algorithm to obtain a hand shape recognition result. And if the result is within the threshold value, the server uses the private key to carry out ECC encryption, then the receiving end uses the public key of the server to carry out signature verification, and the decrypted information is verified and a matching result is returned. The receiving end returns information to the server and encrypts the information by using the public key, then the server obtains the data and decrypts the data by using the private key, and the hand shape recognition is successful.

Description

Digital certificate authentication method based on hand shape recognition
Technical Field
The invention relates to the fields related to biological feature recognition, digital image processing and data security, in particular to a digital certificate authentication method based on hand shape recognition.
Background
Because the requirements of people on information security and data security are continuously improved, the traditional identity recognition method cannot meet the security requirements of people, and the hand shape recognition technology which is a biological recognition technology has high stability, high security and high recognition precision, and can carry out identity verification without contact gradually takes a leading position in the field of identity verification, so that the problems in the field of network security and information security are generally concerned by people.
Disclosure of Invention
According to the defects of the existing hand shape identification method, the invention provides the digital certificate authentication method based on hand shape identification, and the method has the advantages of high stability, high safety, high identification precision and the like; compared with the traditional MD5 and RSA algorithms, the ECC encryption algorithm has higher security and shorter key, means that the ECC occupies less resources and has higher performance, is easier to expand, solves the problems of low decoding speed and large occupied bandwidth in the traditional asymmetric encryption process to a certain extent, and is more suitable for the characteristics of mobile internet.
The server receives user hand shape image information from the sensor, performs operations such as hand shape image preprocessing and the like, and performs feature extraction by methods such as calculating the superposition degree of finger contours, wherein a binomial curve fitting algorithm is used for calculating the contours of fitted fingers in the process of positioning the central axes of the fingers; then, comparing the similarity of the hand shapes with a threshold value by using a hand shape recognition algorithm to obtain a hand shape recognition result; if the result is within the threshold value, the server uses a private key to carry out ECC encryption, then the receiving terminal uses a public key of the server to carry out signature verification after obtaining the data result, the decrypted information is verified, a matching result is returned if the signature verification is successful, the receiving terminal returns the information to the server and uses the public key to encrypt, then the server uses the private key to decrypt after obtaining the data, and the hand shape identification is successful; and returning a matching result when the signature verification fails, returning information to the server by the receiving end, encrypting the information by using the public key, decrypting the data by using the private key after the server obtains the data, and failing in hand shape identification.
The data mentioned in the method is derived from the user hand shape image information data of the sensor.
The image graying and binarization of the hand shape to be recognized are main methods for preprocessing the hand shape image, the contour features of the hand shape are extracted by using the method, then the finger tip point and the finger heel point are positioned, the finger central axis line and the hand shape are positioned, and the feature extraction is carried out by calculating the superposition degree of the finger contour and other methods, wherein the contour of a fitted finger is calculated by using a binomial curve fitting algorithm in the process of positioning the finger central axis line;
Figure 302799DEST_PATH_IMAGE001
Figure 209444DEST_PATH_IMAGE002
Figure 267005DEST_PATH_IMAGE003
wherein
Figure 88462DEST_PATH_IMAGE004
Is an outline symbol of a single side of the finger,
Figure 827354DEST_PATH_IMAGE005
the contour of the finger on one side is long, and then the central axis of the finger is represented by a binomial curve fitting algorithm.
Then, the finger area is used for comparing the threshold value of the hand shape similarity by using the finger area for the finger similarity
Figure 480184DEST_PATH_IMAGE006
Wherein
Figure 669767DEST_PATH_IMAGE007
Sequentially representing the area of each finger in the registered hand shape,
Figure 40836DEST_PATH_IMAGE008
sequentially representing the area of each finger in the hand shape to be recognized.
Then, the specific formula for realizing hand shape recognition according to the hand shape similarity is as follows:
Figure 442474DEST_PATH_IMAGE009
Figure 949810DEST_PATH_IMAGE010
wherein
Figure 614753DEST_PATH_IMAGE011
And if J =1, indicating that the hand shape identification is consistent.
The encryption method of the present invention uses an ECC encryption algorithm by selecting an elliptic curve Ep (A), (B), (C), (D), (E), (a,b) And its base point G; selecting a private keykkSmaller than n, n being the order of G), the public key K =iscalculated using its base point GkG; generating a random integerrrLess than n) to calculate the point R =rG; then comparing the hand shape with the consistent information and the coordinate value of the point Rx,yAsThe parameters are combined together in a series of operations to form a signature process. Then, the SHA (secure hash algorithm) value is calculated:
Figure 145223DEST_PATH_IMAGE012
and the ECC encryption processing process through the private key expressed in the method should satisfy the signature formula
Figure 288235DEST_PATH_IMAGE013
Figure 37361DEST_PATH_IMAGE014
Then, after the server receives the message information from the NAS, if the information about signature encryption is maliciously tampered in the transmission process, the signature verification process should satisfy the following formula:
Figure 672872DEST_PATH_IMAGE015
then extracting out
Figure 815272DEST_PATH_IMAGE013
And a Hash value; calculating points
Figure 824292DEST_PATH_IMAGE016
If it is not
Figure 306220DEST_PATH_IMAGE013
And the Hash value is correct and is equal to the coordinate of a point R (x, y) in the signature process, if H = Hash, the signature verification is successful, which indicates that the message information is not tampered, and the signature encrypted information is transmitted normally.
Drawings
Fig. 1 is a flow chart of a method for authenticating a digital certificate based on hand shape recognition according to an example of the present invention.
Detailed Description
As shown in fig. 1, the present invention provides a digital certificate authentication method based on hand shape recognition.
And S101, the server receives the hand shape image information of the user from the sensor.
S102, preprocessing a hand-shaped image, wherein the gray level and the binarization of the image of the hand to be recognized are the main methods for preprocessing the hand-shaped image, extracting the contour characteristics of the hand-shaped image by using the method, then positioning the tip points and the heel points, positioning the central axis of the fingers, positioning the hand-shaped image by calculating the coincidence degree of the finger contours and the like, wherein the contour of the fitted finger is calculated by using a binomial curve fitting algorithm in the process of positioning the central axis of the finger,
Figure 47386DEST_PATH_IMAGE001
Figure 552448DEST_PATH_IMAGE017
Figure 873200DEST_PATH_IMAGE018
s103, comparing the hand shape similarity by using the finger area for the finger similarity through a threshold value
Figure 147318DEST_PATH_IMAGE019
Wherein
Figure 200331DEST_PATH_IMAGE020
Sequentially representing the area of each finger in the registered hand shape,
Figure 189759DEST_PATH_IMAGE020
sequentially representing the area of each finger in the hand shape to be recognized.
Then, the specific formula for realizing hand shape recognition according to the hand shape similarity is as follows:
Figure 275002DEST_PATH_IMAGE021
Figure 731523DEST_PATH_IMAGE022
wherein
Figure 876809DEST_PATH_IMAGE023
And if J =1, indicating that the hand shape identification is consistent.
S104: if the result is within the threshold value, the server uses the private key to carry out ECC encryption, a secure Hash algorithm value Hash is applied, and the private keykRandom integer n, the order n of the base point G to combine to generate a signature:
Figure 356463DEST_PATH_IMAGE024
s105: and then the receiving end uses the public key of the server to sign and check the signature after obtaining the data result, and verifies the decrypted information. And checking whether the information is tampered. Wherein, the signature verification process should satisfy the following formula:
Figure 248327DEST_PATH_IMAGE015
then extracting out
Figure 494107DEST_PATH_IMAGE025
And a Hash value; calculating points
Figure 16486DEST_PATH_IMAGE016
If it is not
Figure 777244DEST_PATH_IMAGE025
And the Hash value is correct and is equal to the coordinate of a point R (x, y) in the signature process, if H = Hash, the signature verification is successful, which indicates that the message information is not tampered, and the signature encrypted information is transmitted normally.
S106: and returning a matching result if the signature verification is successful, and returning information to the server by the receiving terminal and encrypting the information by using the public key. And returning a matching result when the signature verification fails, and returning information to the server by the receiving end and encrypting the information by using the public key.
S107, the receiving end returns information to the server and encrypts the information by using the public key, and then the server decrypts the information by using the private key after obtaining the data, and the hand shape recognition is successful. Similarly, after the verification fails, the receiving end returns information to the server and encrypts the information by using the public key, the server decrypts the information by using the private key after obtaining the data, and the hand shape recognition fails.

Claims (6)

1. A digital certificate authentication method based on hand shape recognition is as follows:
the server receives user hand shape image information from the sensor, performs feature extraction by methods of finger shape image preprocessing, finger contour coincidence degree calculation and the like, wherein a binomial curve fitting algorithm is used for calculating the contour of a fitting finger in the process of positioning the central axis of the finger, and then a hand shape recognition result is obtained by performing threshold comparison on hand shape similarity by using a hand shape recognition algorithm; if the result is within the threshold value, the server uses a private key to carry out ECC encryption, then a receiving terminal uses a public key of the server to carry out signature verification after obtaining the data result, the decrypted information is verified, a matching result is returned if the signature verification is successful, the receiving terminal returns the information to the server and uses the public key to encrypt, then the server uses the private key to decrypt after obtaining the data, and the hand shape identification is successful; and returning a matching result when the signature verification fails, returning information to the server by the receiving end, encrypting the information by using the public key, decrypting the data by using the private key after the server obtains the data, and failing in hand shape identification.
2. The method of claim 1, wherein said data is derived from image information data of a hand shape of a user of said sensor.
3. The method as claimed in claim 1, wherein the image graying and binarization of the hand shape to be recognized are the main methods for preprocessing the hand shape image, and are used for extracting the contour features of the hand shape and calculating the contour of the fitted finger by using a binomial curve fitting algorithm in the process of positioning the central axis of the finger
Figure DEST_PATH_IMAGE001
Figure 417867DEST_PATH_IMAGE002
Figure DEST_PATH_IMAGE003
Wherein
Figure 393520DEST_PATH_IMAGE004
Is an outline symbol of a single side of the finger,
Figure DEST_PATH_IMAGE005
the contour of the finger on one side is long, and then the central axis of the finger is represented by a binomial curve fitting algorithm.
4. The method of claim 1, wherein the ECC encryption process performed by the private key satisfies the following formula:
Figure 917428DEST_PATH_IMAGE006
5. the method of claim 1, wherein the information about signature encryption is maliciously tampered during transmission, and the signature verification process satisfies the following formula:
Figure DEST_PATH_IMAGE007
6. the method of claim 1, wherein the receiving end performs signature verification with the public key of the server after obtaining the data result to obtain the decrypted original data and information.
CN202110278590.4A 2021-03-16 2021-03-16 Digital certificate authentication method based on hand shape recognition Pending CN112804065A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110278590.4A CN112804065A (en) 2021-03-16 2021-03-16 Digital certificate authentication method based on hand shape recognition

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110278590.4A CN112804065A (en) 2021-03-16 2021-03-16 Digital certificate authentication method based on hand shape recognition

Publications (1)

Publication Number Publication Date
CN112804065A true CN112804065A (en) 2021-05-14

Family

ID=75817073

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110278590.4A Pending CN112804065A (en) 2021-03-16 2021-03-16 Digital certificate authentication method based on hand shape recognition

Country Status (1)

Country Link
CN (1) CN112804065A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103425979A (en) * 2013-09-06 2013-12-04 天津工业大学 Hand shape authentication method
CN104580143A (en) * 2014-11-09 2015-04-29 李若斌 Security authentication method based on gesture recognition, terminal, server and system
CN107733636A (en) * 2016-08-11 2018-02-23 中国电信股份有限公司 Authentication method and Verification System
CN110414200A (en) * 2019-04-08 2019-11-05 广州腾讯科技有限公司 Auth method, device, storage medium and computer equipment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103425979A (en) * 2013-09-06 2013-12-04 天津工业大学 Hand shape authentication method
CN104580143A (en) * 2014-11-09 2015-04-29 李若斌 Security authentication method based on gesture recognition, terminal, server and system
CN107733636A (en) * 2016-08-11 2018-02-23 中国电信股份有限公司 Authentication method and Verification System
CN110414200A (en) * 2019-04-08 2019-11-05 广州腾讯科技有限公司 Auth method, device, storage medium and computer equipment

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
孟春岩等: "安全的数字签名中的算法分析", 《福建电脑》 *
李洋等: "基于手指轮廓的手形识别算法", 《智能系统学报》 *

Similar Documents

Publication Publication Date Title
EP3046286B1 (en) Information processing method, program, and information processing apparatus
US9621342B2 (en) System and method for hierarchical cryptographic key generation using biometric data
US9722782B2 (en) Information processing method, recording medium, and information processing apparatus
CN110969431B (en) Secure hosting method, device and system for private key of blockchain digital coin
US20160269178A1 (en) Privacy-Enhanced Biometrics-Secret Binding Scheme
Barman et al. Fingerprint-based crypto-biometric system for network security
US20040111625A1 (en) Data processing apparatus and method
CN109525555B (en) Online registration and authentication method and device
KR101897715B1 (en) System for non-password secure biometric digital signagure
CN107360002B (en) Application method of digital certificate
US10503915B2 (en) Encrypted text verification system, method and recording medium
WO2018165811A1 (en) Method for saving and verifying biometric template, and biometric recognition apparatus and terminal
CN111739200B (en) Fingerprint electronic lock and encryption and decryption authentication method thereof
US10484182B2 (en) Encrypted text verification system, method, and recording medium
JP2011253378A (en) Authentication device and authentication method
CN114996727A (en) Biological feature privacy encryption method and system based on palm print and palm vein recognition
CN107181598B (en) Fingerprint key processing method and device
CN110061973B (en) Authorization method and device
CN110768782B (en) Anti-quantum computation RFID authentication method and system based on asymmetric key pool and IBS
Sood et al. Methods of automatic alignment of fingerprint in fuzzy vault: a review
JP7235055B2 (en) Authenticator, client and server
CN112804065A (en) Digital certificate authentication method based on hand shape recognition
Itakura et al. Proposal on a multifactor biometric authentication method based on cryptosystem keys containing biometric signatures
CN114245374B (en) Security authentication method, system and related equipment
CN113761592B (en) Fuzzy identity-based data integrity detection method in cloud storage

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20210514