CN112804065A - Digital certificate authentication method based on hand shape recognition - Google Patents
Digital certificate authentication method based on hand shape recognition Download PDFInfo
- Publication number
- CN112804065A CN112804065A CN202110278590.4A CN202110278590A CN112804065A CN 112804065 A CN112804065 A CN 112804065A CN 202110278590 A CN202110278590 A CN 202110278590A CN 112804065 A CN112804065 A CN 112804065A
- Authority
- CN
- China
- Prior art keywords
- hand shape
- server
- information
- finger
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
- G06F18/22—Matching criteria, e.g. proximity measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V10/00—Arrangements for image or video recognition or understanding
- G06V10/40—Extraction of image or video features
- G06V10/44—Local feature extraction by analysis of parts of the pattern, e.g. by detecting edges, contours, loops, corners, strokes or intersections; Connectivity analysis, e.g. of connected components
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/107—Static hand or arm
- G06V40/11—Hand-related biometrics; Hand pose recognition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Data Mining & Analysis (AREA)
- Life Sciences & Earth Sciences (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Multimedia (AREA)
- Evolutionary Biology (AREA)
- Bioinformatics & Cheminformatics (AREA)
- Evolutionary Computation (AREA)
- Human Computer Interaction (AREA)
- Health & Medical Sciences (AREA)
- Biodiversity & Conservation Biology (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Bioinformatics & Computational Biology (AREA)
- General Engineering & Computer Science (AREA)
- Artificial Intelligence (AREA)
- Algebra (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- Computing Systems (AREA)
- Collating Specific Patterns (AREA)
Abstract
The invention provides a digital certificate authentication method based on hand shape recognition, which comprises the following steps: the server receives the user hand shape image information from the sensor, performs feature extraction through methods of hand shape image preprocessing, finger contour overlapping degree calculation and the like, and then performs threshold comparison on the hand shape similarity by using a hand shape recognition algorithm to obtain a hand shape recognition result. And if the result is within the threshold value, the server uses the private key to carry out ECC encryption, then the receiving end uses the public key of the server to carry out signature verification, and the decrypted information is verified and a matching result is returned. The receiving end returns information to the server and encrypts the information by using the public key, then the server obtains the data and decrypts the data by using the private key, and the hand shape recognition is successful.
Description
Technical Field
The invention relates to the fields related to biological feature recognition, digital image processing and data security, in particular to a digital certificate authentication method based on hand shape recognition.
Background
Because the requirements of people on information security and data security are continuously improved, the traditional identity recognition method cannot meet the security requirements of people, and the hand shape recognition technology which is a biological recognition technology has high stability, high security and high recognition precision, and can carry out identity verification without contact gradually takes a leading position in the field of identity verification, so that the problems in the field of network security and information security are generally concerned by people.
Disclosure of Invention
According to the defects of the existing hand shape identification method, the invention provides the digital certificate authentication method based on hand shape identification, and the method has the advantages of high stability, high safety, high identification precision and the like; compared with the traditional MD5 and RSA algorithms, the ECC encryption algorithm has higher security and shorter key, means that the ECC occupies less resources and has higher performance, is easier to expand, solves the problems of low decoding speed and large occupied bandwidth in the traditional asymmetric encryption process to a certain extent, and is more suitable for the characteristics of mobile internet.
The server receives user hand shape image information from the sensor, performs operations such as hand shape image preprocessing and the like, and performs feature extraction by methods such as calculating the superposition degree of finger contours, wherein a binomial curve fitting algorithm is used for calculating the contours of fitted fingers in the process of positioning the central axes of the fingers; then, comparing the similarity of the hand shapes with a threshold value by using a hand shape recognition algorithm to obtain a hand shape recognition result; if the result is within the threshold value, the server uses a private key to carry out ECC encryption, then the receiving terminal uses a public key of the server to carry out signature verification after obtaining the data result, the decrypted information is verified, a matching result is returned if the signature verification is successful, the receiving terminal returns the information to the server and uses the public key to encrypt, then the server uses the private key to decrypt after obtaining the data, and the hand shape identification is successful; and returning a matching result when the signature verification fails, returning information to the server by the receiving end, encrypting the information by using the public key, decrypting the data by using the private key after the server obtains the data, and failing in hand shape identification.
The data mentioned in the method is derived from the user hand shape image information data of the sensor.
The image graying and binarization of the hand shape to be recognized are main methods for preprocessing the hand shape image, the contour features of the hand shape are extracted by using the method, then the finger tip point and the finger heel point are positioned, the finger central axis line and the hand shape are positioned, and the feature extraction is carried out by calculating the superposition degree of the finger contour and other methods, wherein the contour of a fitted finger is calculated by using a binomial curve fitting algorithm in the process of positioning the finger central axis line;
whereinIs an outline symbol of a single side of the finger,the contour of the finger on one side is long, and then the central axis of the finger is represented by a binomial curve fitting algorithm.
Then, the finger area is used for comparing the threshold value of the hand shape similarity by using the finger area for the finger similarity
WhereinSequentially representing the area of each finger in the registered hand shape,sequentially representing the area of each finger in the hand shape to be recognized.
Then, the specific formula for realizing hand shape recognition according to the hand shape similarity is as follows:
The encryption method of the present invention uses an ECC encryption algorithm by selecting an elliptic curve Ep (A), (B), (C), (D), (E), (a,b) And its base point G; selecting a private keyk(kSmaller than n, n being the order of G), the public key K =iscalculated using its base point GkG; generating a random integerr(rLess than n) to calculate the point R =rG; then comparing the hand shape with the consistent information and the coordinate value of the point Rx,yAsThe parameters are combined together in a series of operations to form a signature process. Then, the SHA (secure hash algorithm) value is calculated:
and the ECC encryption processing process through the private key expressed in the method should satisfy the signature formula:
Then, after the server receives the message information from the NAS, if the information about signature encryption is maliciously tampered in the transmission process, the signature verification process should satisfy the following formula:
If it is notAnd the Hash value is correct and is equal to the coordinate of a point R (x, y) in the signature process, if H = Hash, the signature verification is successful, which indicates that the message information is not tampered, and the signature encrypted information is transmitted normally.
Drawings
Fig. 1 is a flow chart of a method for authenticating a digital certificate based on hand shape recognition according to an example of the present invention.
Detailed Description
As shown in fig. 1, the present invention provides a digital certificate authentication method based on hand shape recognition.
And S101, the server receives the hand shape image information of the user from the sensor.
S102, preprocessing a hand-shaped image, wherein the gray level and the binarization of the image of the hand to be recognized are the main methods for preprocessing the hand-shaped image, extracting the contour characteristics of the hand-shaped image by using the method, then positioning the tip points and the heel points, positioning the central axis of the fingers, positioning the hand-shaped image by calculating the coincidence degree of the finger contours and the like, wherein the contour of the fitted finger is calculated by using a binomial curve fitting algorithm in the process of positioning the central axis of the finger,
s103, comparing the hand shape similarity by using the finger area for the finger similarity through a threshold value
WhereinSequentially representing the area of each finger in the registered hand shape,sequentially representing the area of each finger in the hand shape to be recognized.
Then, the specific formula for realizing hand shape recognition according to the hand shape similarity is as follows:
S104: if the result is within the threshold value, the server uses the private key to carry out ECC encryption, a secure Hash algorithm value Hash is applied, and the private keykRandom integer n, the order n of the base point G to combine to generate a signature:
s105: and then the receiving end uses the public key of the server to sign and check the signature after obtaining the data result, and verifies the decrypted information. And checking whether the information is tampered. Wherein, the signature verification process should satisfy the following formula:
If it is notAnd the Hash value is correct and is equal to the coordinate of a point R (x, y) in the signature process, if H = Hash, the signature verification is successful, which indicates that the message information is not tampered, and the signature encrypted information is transmitted normally.
S106: and returning a matching result if the signature verification is successful, and returning information to the server by the receiving terminal and encrypting the information by using the public key. And returning a matching result when the signature verification fails, and returning information to the server by the receiving end and encrypting the information by using the public key.
S107, the receiving end returns information to the server and encrypts the information by using the public key, and then the server decrypts the information by using the private key after obtaining the data, and the hand shape recognition is successful. Similarly, after the verification fails, the receiving end returns information to the server and encrypts the information by using the public key, the server decrypts the information by using the private key after obtaining the data, and the hand shape recognition fails.
Claims (6)
1. A digital certificate authentication method based on hand shape recognition is as follows:
the server receives user hand shape image information from the sensor, performs feature extraction by methods of finger shape image preprocessing, finger contour coincidence degree calculation and the like, wherein a binomial curve fitting algorithm is used for calculating the contour of a fitting finger in the process of positioning the central axis of the finger, and then a hand shape recognition result is obtained by performing threshold comparison on hand shape similarity by using a hand shape recognition algorithm; if the result is within the threshold value, the server uses a private key to carry out ECC encryption, then a receiving terminal uses a public key of the server to carry out signature verification after obtaining the data result, the decrypted information is verified, a matching result is returned if the signature verification is successful, the receiving terminal returns the information to the server and uses the public key to encrypt, then the server uses the private key to decrypt after obtaining the data, and the hand shape identification is successful; and returning a matching result when the signature verification fails, returning information to the server by the receiving end, encrypting the information by using the public key, decrypting the data by using the private key after the server obtains the data, and failing in hand shape identification.
2. The method of claim 1, wherein said data is derived from image information data of a hand shape of a user of said sensor.
3. The method as claimed in claim 1, wherein the image graying and binarization of the hand shape to be recognized are the main methods for preprocessing the hand shape image, and are used for extracting the contour features of the hand shape and calculating the contour of the fitted finger by using a binomial curve fitting algorithm in the process of positioning the central axis of the finger
6. the method of claim 1, wherein the receiving end performs signature verification with the public key of the server after obtaining the data result to obtain the decrypted original data and information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110278590.4A CN112804065A (en) | 2021-03-16 | 2021-03-16 | Digital certificate authentication method based on hand shape recognition |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110278590.4A CN112804065A (en) | 2021-03-16 | 2021-03-16 | Digital certificate authentication method based on hand shape recognition |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112804065A true CN112804065A (en) | 2021-05-14 |
Family
ID=75817073
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110278590.4A Pending CN112804065A (en) | 2021-03-16 | 2021-03-16 | Digital certificate authentication method based on hand shape recognition |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112804065A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103425979A (en) * | 2013-09-06 | 2013-12-04 | 天津工业大学 | Hand shape authentication method |
CN104580143A (en) * | 2014-11-09 | 2015-04-29 | 李若斌 | Security authentication method based on gesture recognition, terminal, server and system |
CN107733636A (en) * | 2016-08-11 | 2018-02-23 | 中国电信股份有限公司 | Authentication method and Verification System |
CN110414200A (en) * | 2019-04-08 | 2019-11-05 | 广州腾讯科技有限公司 | Auth method, device, storage medium and computer equipment |
-
2021
- 2021-03-16 CN CN202110278590.4A patent/CN112804065A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103425979A (en) * | 2013-09-06 | 2013-12-04 | 天津工业大学 | Hand shape authentication method |
CN104580143A (en) * | 2014-11-09 | 2015-04-29 | 李若斌 | Security authentication method based on gesture recognition, terminal, server and system |
CN107733636A (en) * | 2016-08-11 | 2018-02-23 | 中国电信股份有限公司 | Authentication method and Verification System |
CN110414200A (en) * | 2019-04-08 | 2019-11-05 | 广州腾讯科技有限公司 | Auth method, device, storage medium and computer equipment |
Non-Patent Citations (2)
Title |
---|
孟春岩等: "安全的数字签名中的算法分析", 《福建电脑》 * |
李洋等: "基于手指轮廓的手形识别算法", 《智能系统学报》 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3046286B1 (en) | Information processing method, program, and information processing apparatus | |
US9621342B2 (en) | System and method for hierarchical cryptographic key generation using biometric data | |
US9722782B2 (en) | Information processing method, recording medium, and information processing apparatus | |
CN110969431B (en) | Secure hosting method, device and system for private key of blockchain digital coin | |
US20160269178A1 (en) | Privacy-Enhanced Biometrics-Secret Binding Scheme | |
Barman et al. | Fingerprint-based crypto-biometric system for network security | |
US20040111625A1 (en) | Data processing apparatus and method | |
CN109525555B (en) | Online registration and authentication method and device | |
KR101897715B1 (en) | System for non-password secure biometric digital signagure | |
CN107360002B (en) | Application method of digital certificate | |
US10503915B2 (en) | Encrypted text verification system, method and recording medium | |
WO2018165811A1 (en) | Method for saving and verifying biometric template, and biometric recognition apparatus and terminal | |
CN111739200B (en) | Fingerprint electronic lock and encryption and decryption authentication method thereof | |
US10484182B2 (en) | Encrypted text verification system, method, and recording medium | |
JP2011253378A (en) | Authentication device and authentication method | |
CN114996727A (en) | Biological feature privacy encryption method and system based on palm print and palm vein recognition | |
CN107181598B (en) | Fingerprint key processing method and device | |
CN110061973B (en) | Authorization method and device | |
CN110768782B (en) | Anti-quantum computation RFID authentication method and system based on asymmetric key pool and IBS | |
Sood et al. | Methods of automatic alignment of fingerprint in fuzzy vault: a review | |
JP7235055B2 (en) | Authenticator, client and server | |
CN112804065A (en) | Digital certificate authentication method based on hand shape recognition | |
Itakura et al. | Proposal on a multifactor biometric authentication method based on cryptosystem keys containing biometric signatures | |
CN114245374B (en) | Security authentication method, system and related equipment | |
CN113761592B (en) | Fuzzy identity-based data integrity detection method in cloud storage |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20210514 |