CN118013494A - Identity verification method and system based on vectorization signature - Google Patents

Identity verification method and system based on vectorization signature Download PDF

Info

Publication number
CN118013494A
CN118013494A CN202410412002.5A CN202410412002A CN118013494A CN 118013494 A CN118013494 A CN 118013494A CN 202410412002 A CN202410412002 A CN 202410412002A CN 118013494 A CN118013494 A CN 118013494A
Authority
CN
China
Prior art keywords
signature
image
vectorization
iris
fingerprint
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202410412002.5A
Other languages
Chinese (zh)
Inventor
梁懿
林振天
池少宁
白海滨
林生雄
李辉义
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Information and Telecommunication Co Ltd
Fujian Yirong Information Technology Co Ltd
Original Assignee
State Grid Information and Telecommunication Co Ltd
Fujian Yirong Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Information and Telecommunication Co Ltd, Fujian Yirong Information Technology Co Ltd filed Critical State Grid Information and Telecommunication Co Ltd
Priority to CN202410412002.5A priority Critical patent/CN118013494A/en
Publication of CN118013494A publication Critical patent/CN118013494A/en
Pending legal-status Critical Current

Links

Landscapes

  • Collating Specific Patterns (AREA)

Abstract

The invention relates to an identity verification method and system based on vectorization signature, comprising the following steps: step S1, acquiring an image of a signature, and identifying the edge and the characteristic of the signature image by utilizing an image processing and identifying algorithm, and step S2, converting the signature image into a vectorization path according to the identified signature characteristic to obtain a vectorization signature; step S3, respectively extracting fingerprint characteristic points and iris characteristic points of an authorizer; s4, encrypting the vectorization signature based on the fingerprint and the iris characteristic points; step S5, storing the encrypted vectorization signature in a data field on a blockchain; and S6, the authorized user realizes biological feature verification in the intelligent contract, acquires the encrypted vectorization signature, extracts fingerprint feature points and iris feature points of the authorizer, and performs decryption operation to obtain the vectorization signature. The invention realizes accurate verification of the user identity, protects the privacy information of the user and improves the security of signature use.

Description

Identity verification method and system based on vectorization signature
Technical Field
The invention relates to the technical field of electronic signature management, in particular to an identity verification method and system based on vectorization signature.
Background
The electronic signature is a representation form of the electronic signature, the electronic signature operation is converted into the same visual effect as the paper file stamping operation by utilizing an image processing technology, and meanwhile, the authenticity and the integrity of the electronic information and the non-repudiation of a signer are ensured by utilizing the electronic signature technology. Along with the development of the power grid, the project is numerous, signature is needed, and currently, when the electronic signature is used and managed, encryption protection is generally carried out on the electronic signature by setting a secret key, so that the security is low.
Disclosure of Invention
In order to solve the problems, the invention aims to provide an identity verification method and system based on vectorization signature, which realize accurate verification of user identity, protect privacy information of users and improve security of signature use.
In order to achieve the above purpose, the present invention adopts the following technical scheme:
an identity verification method based on vectorization signature comprises the following steps:
S1, acquiring a signature image, and identifying edges and features of the signature image by utilizing an image processing and identifying algorithm;
S2, converting the signature image into a vectorization path according to the identified signature characteristics to obtain vectorization signatures;
Step S3, respectively extracting fingerprint characteristic points and iris characteristic points of an authorizer by using a fingerprint image processing algorithm and an iris image processing algorithm;
Step S4, encrypting the vectorization signature by adopting an encryption algorithm based on the fingerprint and the iris characteristic points to obtain the encrypted vectorization signature;
s5, storing the encrypted vectorization signature in a data field on a blockchain, and realizing access control on encrypted data through an intelligent contract, wherein only authorized users can decrypt and access the data;
and S6, the authorized user realizes biological feature verification in the intelligent contract, acquires the encrypted vectorization signature, extracts fingerprint feature points and iris feature points of the authorizer, and performs decryption operation to obtain the vectorization signature.
Further, the step S1 specifically includes:
step S11, edge detection is carried out on the signature image by using an edge detection algorithm to obtain an edge image Edges;
Step S12, thresholding is carried out on the edge image Edges and the edge image Edges, the image is converted into a binary image, the contour detection is carried out on the binary image by utilizing a contour detection function findContours function in an image processing library, the contour information Contours of the signature image is obtained, and the parameter information HoughParams of the special shape is further identified on the basis of a Hough transformation algorithm;
And S13, comprehensively considering the edge image Edges, the contour information Contours and the parameter information HoughParams, extracting information representing signature characteristics, and obtaining signature characteristic representations Features.
Further, the step S11 specifically includes:
(1) Converting the signature image into a gray scale image;
(2) Applying a Sobel operator to the gray level image to perform edge detection in the horizontal and vertical directions;
;
;
;
;
Wherein, Is Sobel operator in horizontal direction,/>For a Sobel operator in the vertical direction, i and j represent the row and column indices in the Sobel operator template,/>For the edge detection result in the horizontal direction,/>For the edge detection result in the vertical direction, I (x, y) represents the pixel value in the gray image, and x and y represent the coordinates of the pixel;
(3) Combining the edge detection results in the horizontal and vertical directions to obtain a final edge image Edges
Further, step S13 specifically includes:
Based on the acquired edge image Edges, contour information Contours, and parameter information HoughParams, the perimeter P and area A of the contour are calculated:
Where n is the number of contour midpoints, X-coordinate representing the a-th contour point,/>Representing the y-coordinate of the a-th contour point;)Representing the position of the a-th point in the contour, distance () represents the distance between two points;
and the number N lines of the straight lines and the radius R of the circle are counted according to the parameter information HoughParams to form the feature representation features= { P, A, N lines, R }.
Further, the step S2 specifically includes:
The contour information is fitted by using Bezier curves, and is converted into a smooth curve path:
;
Wherein, Is a point on the curve,/>Is/>Control point of subBezier curve,/>The order is that t is a parameter, and t is more than 0 and less than 1;
And then generating a straight line path according to the parameter information of the straight line, generating an arc path according to the parameter information of the circle, and converting the signature image into a vectorization path to obtain the vectorization signature.
Further, the step S3 specifically includes:
Acquiring a fingerprint image and an iris image of an authorizer;
feature points extracted by the fingerprint recognition algorithm are stored in FingerprintPoints, expressed as:
FingerprintPoints=ExtractFingerprintPoints(FingerprintImage);
ExtractFingerprintPoints is a fingerprint feature point extraction function in the OpenCV library, accepts the fingerprint image FINGERPRINTIMAGE as input, returns the extracted fingerprint feature points FingerprintPoints,
Feature points extracted by the iris recognition algorithm are stored in IrisPoints, expressed as: irisPoints = ExtractIrisPoints (IrisImage);
ExtractIrisPoints is an iris feature point extraction function in the OpenCV library, receives an iris image IRISIMAGE as input, and returns extracted iris feature points IrisPoints.
Further, the fingerprint identification algorithm specifically comprises the following steps:
(1) Preprocessing the fingerprint image of the authorizer, including denoising, enhancing and refining operations;
(2) Extracting feature points from the preprocessed fingerprint image by using a fingerprint extraction algorithm, wherein the feature points comprise minutiae points and bifurcation points:
Calculating gradient field information of each pixel point for the preprocessed fingerprint image, and primarily extracting minutiae and bifurcation points according to the calculated gradient field information;
According to the preliminarily extracted minutiae, defining a corrosion kernel K F around the minutiae, performing corrosion operation on pixels around the minutiae, and repeating the corrosion operation for a plurality of times until the pixels around the minutiae cannot be corroded any more, thereby obtaining enhanced minutiae characteristics:
Let the preliminary extracted minutiae point locations be (x 0,y0), the corrosion operation be expressed as:
;
Wherein, Representing the image at coordinates/>Gray value at/>Is the relative position of K F in the corrosion core;
Defining an expansion kernel K P around the bifurcation point according to the bifurcation point which is preliminarily extracted, performing expansion operation on pixels around the bifurcation point, and repeating the expansion operation for a plurality of times until the pixels around the bifurcation point can not be expanded any more, so as to obtain the characteristics of the bifurcation point after enhancement;
let the position of the branch point of the preliminary extraction be The expansion operation is expressed as:
;
Wherein, Is the relative position of K P in the expansion core;
(3) The extracted and bifurcation point features are expressed in the form of a coordinate table, and all feature points are expressed by a matrix:
Further, the feature points extracted by the iris recognition algorithm are specifically as follows:
Firstly, edge detection and positioning are carried out on iris images of authorizers, and boundaries of irises are determined;
Normalizing the iris boundary to a fixed-size membrane region;
within the normalized iris region, texture features are extracted by Gabor filter method, the Gabor filter response being expressed as:
Wherein, Is the image coordinates/>At the rotation angle/>Lower coordinates,/>Is wavelength,/>For the direction/>For phase shift,/>Is standard deviation/>Is ellipticity;
And encoding the extracted texture features to obtain iris feature points.
Further, the vectorization signature is encrypted by adopting an encryption algorithm, which specifically comprises the following steps:
converting the vectorized signature into a digital form as data to be encrypted;
Based on the fingerprint and iris characteristic points of the authorizer, constructing a biological characteristic point set:
BiometricPoints=MergeBiometricPoints(FingerprintPoints,IrisPoints)
here MergeBiometricPoints is a biometric point fusion function, accepting fingerprint feature points FingerprintPoints, iris feature points IrisPoints as input, returning to the comprehensive biometric point set
BiometricPoints;
Using the biometric point set BiometricPoints as a key, and performing encryption operation on the vectorized signature based on the AES symmetric encryption algorithm to obtain an encrypted vectorized signature:
C=AES(PL,BiometricPoints);
where PL represents the vectorized signature to be encrypted, C represents the vectorized signature after encryption, AES represents the AES encryption algorithm.
An identity verification system based on vectorized signature comprises a processor, a memory and a computer program stored on the memory, wherein the processor specifically executes the steps in an identity verification method based on vectorized signature when executing the computer program.
The invention has the following beneficial effects:
1. the invention can realize accurate verification of the user identity, protect the privacy information of the user and improve the security of signature use;
2. The accuracy of minutiae and bifurcation points can be further improved by combining neighborhood information and morphological operation of the pixel points, so that the accuracy and robustness of fingerprint image feature point extraction are improved, and the vectorization signature is encrypted and protected by utilizing a biological feature point set extracted from biological features such as fingerprints and irises as an encryption key, so that the security and privacy of signature data are ensured, and the accuracy and reliability of verification are improved;
3. The encrypted vectorization signature is stored on the blockchain, access control is realized through the intelligent contract, the safety and the non-falsification of the data are ensured, the authorized user performs biological feature verification through the intelligent contract, the authorized user can decrypt and access the data only, and the reliability of identity verification is enhanced.
Drawings
FIG. 1 is a flow chart of the method of the present invention.
Detailed Description
The invention is described in further detail below with reference to the attached drawings and specific examples:
referring to fig. 1, in this embodiment, there is provided an identity verification method based on vectorized signature, including the steps of:
S1, acquiring a signature image, and identifying edges and features of the signature image by utilizing an image processing and identifying algorithm;
S2, converting the signature image into a vectorization path according to the identified signature characteristics to obtain vectorization signatures;
Step S3, respectively extracting fingerprint characteristic points and iris characteristic points of an authorizer by using a fingerprint image processing algorithm and an iris image processing algorithm;
Step S4, encrypting the vectorization signature by adopting an encryption algorithm based on the fingerprint and the iris characteristic points to obtain the encrypted vectorization signature;
s5, storing the encrypted vectorization signature in a data field on a blockchain, and realizing access control on encrypted data through an intelligent contract, wherein only authorized users can decrypt and access the data;
and S6, the authorized user realizes biological feature verification in the intelligent contract, acquires the encrypted vectorization signature, extracts fingerprint feature points and iris feature points of the authorizer, and performs decryption operation to obtain the vectorization signature.
In this embodiment, step S1 specifically includes:
step S11, edge detection is carried out on the signature image by using an edge detection algorithm to obtain an edge image Edges;
Step S12, thresholding is carried out on the edge image Edges and the edge image Edges, the image is converted into a binary image, the contour detection is carried out on the binary image by utilizing a contour detection function findContours function in an image processing library, the contour information Contours of the signature image is obtained, and the parameter information HoughParams of the special shape is further identified on the basis of a Hough transformation algorithm;
And S13, comprehensively considering the edge image Edges, the contour information Contours and the parameter information HoughParams, extracting information representing signature characteristics, and obtaining signature characteristic representations Features.
In this embodiment, step S11 is specifically:
(1) Converting the signature image into a gray scale image;
(2) Applying a Sobel operator to the gray level image to perform edge detection in the horizontal and vertical directions;
;
;
;
;
Wherein, Is Sobel operator in horizontal direction,/>For a Sobel operator in the vertical direction, i and j represent the row and column indices in the Sobel operator template,/>For the edge detection result in the horizontal direction,/>For the edge detection result in the vertical direction, I (x, y) represents the pixel value in the gray image, and x and y represent the coordinates of the pixel;
(3) Combining the edge detection results in the horizontal and vertical directions to obtain a final edge image Edges
In this embodiment, step S13 specifically includes:
Based on the acquired edge image Edges, contour information Contours, and parameter information HoughParams, the perimeter P and area A of the contour are calculated:
Where n is the number of contour midpoints, X-coordinate representing the a-th contour point,/>Representing the y-coordinate of the a-th contour point;)Representing the position of the a-th point in the contour, distance () represents the distance between two points;
and the number N lines of the straight lines and the radius R of the circle are counted according to the parameter information HoughParams to form the feature representation features= { P, A, N lines, R }.
In this embodiment, step S2 specifically includes:
The contour information is fitted by using Bezier curves, and is converted into a smooth curve path:
;
Wherein, Is a point on the curve,/>Is/>Control point of subBezier curve,/>The order is that t is a parameter, and t is more than 0 and less than 1;
And then generating a straight line path according to the parameter information of the straight line, generating an arc path according to the parameter information of the circle, and converting the signature image into a vectorization path to obtain the vectorization signature.
In this embodiment, step S3 specifically includes:
Acquiring a fingerprint image and an iris image of an authorizer;
feature points extracted by the fingerprint recognition algorithm are stored in FingerprintPoints, expressed as:
FingerprintPoints=ExtractFingerprintPoints(FingerprintImage);
ExtractFingerprintPoints is a fingerprint feature point extraction function in the OpenCV library, accepts the fingerprint image FINGERPRINTIMAGE as input, returns the extracted fingerprint feature points FingerprintPoints,
Feature points extracted by the iris recognition algorithm are stored in IrisPoints, expressed as: irisPoints = ExtractIrisPoints (IrisImage);
ExtractIrisPoints is an iris feature point extraction function in the OpenCV library, receives an iris image IRISIMAGE as input, and returns extracted iris feature points IrisPoints.
In this embodiment, the fingerprint identification algorithm specifically includes:
(1) Preprocessing the fingerprint image of the authorizer, including denoising, enhancing and refining operations;
(2) Extracting feature points from the preprocessed fingerprint image by using a fingerprint extraction algorithm, wherein the feature points comprise minutiae points and bifurcation points:
Calculating gradient field information of each pixel point for the preprocessed fingerprint image, and primarily extracting minutiae and bifurcation points according to the calculated gradient field information;
According to the preliminarily extracted minutiae, defining a corrosion kernel K F around the minutiae, performing corrosion operation on pixels around the minutiae, and repeating the corrosion operation for a plurality of times until the pixels around the minutiae cannot be corroded any more, thereby obtaining enhanced minutiae characteristics:
Let the preliminary extracted minutiae point locations be (x 0,y0), the corrosion operation be expressed as:
;
Wherein, Representing the image at coordinates/>Gray value at/>Is the relative position of K F in the corrosion core;
Defining an expansion kernel K P around the bifurcation point according to the bifurcation point which is preliminarily extracted, performing expansion operation on pixels around the bifurcation point, and repeating the expansion operation for a plurality of times until the pixels around the bifurcation point can not be expanded any more, so as to obtain the characteristics of the bifurcation point after enhancement;
let the position of the branch point of the preliminary extraction be The expansion operation is expressed as:
;
Wherein, Is the relative position of K P in the expansion core;
(3) The extracted and bifurcation point features are expressed in the form of a coordinate table, and all feature points are expressed by a matrix:
in this embodiment, the feature points extracted by the iris recognition algorithm are specifically as follows:
Firstly, edge detection and positioning are carried out on iris images of authorizers, and boundaries of irises are determined;
Normalizing the iris boundary to a fixed-size membrane region;
within the normalized iris region, texture features are extracted by Gabor filter method, the Gabor filter response being expressed as:
Wherein, Is the image coordinates/>At the rotation angle/>Lower coordinates,/>Is wavelength,/>For the direction/>For phase shift,/>Is standard deviation/>Is ellipticity;
And encoding the extracted texture features to obtain iris feature points.
In this embodiment, an encryption algorithm is used to encrypt the vectorized signature, specifically:
converting the vectorized signature into a digital form as data to be encrypted;
Based on the fingerprint and iris characteristic points of the authorizer, constructing a biological characteristic point set:
BiometricPoints=MergeBiometricPoints(FingerprintPoints,IrisPoints)
here MergeBiometricPoints is a biometric point fusion function, accepting fingerprint feature points FingerprintPoints, iris feature points IrisPoints as input, returning to the comprehensive biometric point set
BiometricPoints;
In this embodiment, the biometric point fusion function may be adjusted according to the actual requirement, and in this embodiment, it is preferable to first create an empty biometric point set BiometricPoints. Then, all the feature points in the fingerprint feature point set FingerprintPoints are added one by one to BiometricPoints, then all the feature points in the iris feature point set IrisPoints are added one by one to BiometricPoints, and finally the combined biometric feature point set BiometricPoints is returned.
Using the biometric point set BiometricPoints as a key, and performing encryption operation on the vectorized signature based on the AES symmetric encryption algorithm to obtain an encrypted vectorized signature:
C=AES(PL,BiometricPoints);
where PL represents the vectorized signature to be encrypted, C represents the vectorized signature after encryption, AES represents the AES encryption algorithm.
It will be appreciated by those skilled in the art that embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the invention in any way, and any person skilled in the art may make modifications or alterations to the disclosed technical content to the equivalent embodiments. However, any simple modification, equivalent variation and variation of the above embodiments according to the technical substance of the present invention still fall within the protection scope of the technical solution of the present invention.

Claims (10)

1. An identity verification method based on vectorization signature is characterized by comprising the following steps:
S1, acquiring a signature image, and identifying edges and features of the signature image by utilizing an image processing and identifying algorithm;
S2, converting the signature image into a vectorization path according to the identified signature characteristics to obtain vectorization signatures;
Step S3, respectively extracting fingerprint characteristic points and iris characteristic points of an authorizer by using a fingerprint image processing algorithm and an iris image processing algorithm;
Step S4, encrypting the vectorization signature by adopting an encryption algorithm based on the fingerprint and the iris characteristic points to obtain the encrypted vectorization signature;
s5, storing the encrypted vectorization signature in a data field on a blockchain, and realizing access control on encrypted data through an intelligent contract, wherein only authorized users can decrypt and access the data;
and S6, the authorized user realizes biological feature verification in the intelligent contract, acquires the encrypted vectorization signature, extracts fingerprint feature points and iris feature points of the authorizer, and performs decryption operation to obtain the vectorization signature.
2. The method for verifying identity based on vectorized signature as in claim 1, wherein the step S1 is specifically:
step S11, edge detection is carried out on the signature image by using an edge detection algorithm to obtain an edge image Edges;
Step S12, thresholding is carried out on the edge image Edges and the edge image Edges, the image is converted into a binary image, the contour detection is carried out on the binary image by utilizing a contour detection function findContours function in an image processing library, the contour information Contours of the signature image is obtained, and the parameter information HoughParams of the special shape is further identified on the basis of a Hough transformation algorithm;
And S13, comprehensively considering the edge image Edges, the contour information Contours and the parameter information HoughParams, extracting information representing signature characteristics, and obtaining signature characteristic representations Features.
3. The method for verifying identity based on vectorized signature as in claim 2, wherein the step S11 is specifically:
(1) Converting the signature image into a gray scale image;
(2) Applying a Sobel operator to the gray level image to perform edge detection in the horizontal and vertical directions;
;
;
;
;
Wherein, Is Sobel operator in horizontal direction,/>For a Sobel operator in the vertical direction, i and j represent the row and column indices in the Sobel operator template,/>For the edge detection result in the horizontal direction,/>For the edge detection result in the vertical direction, I (x, y) represents the pixel value in the gray image, and x and y represent the coordinates of the pixel;
(3) Combining the edge detection results in the horizontal and vertical directions to obtain a final edge image Edges;
4. The method for verifying identity based on vectorized signature as in claim 2, wherein the step S13 is specifically:
Based on the acquired edge image Edges, contour information Contours, and parameter information HoughParams, the perimeter P and area A of the contour are calculated:
Where n is the number of contour midpoints, X-coordinate representing the a-th contour point,/>Representing the y-coordinate of the a-th contour point;)Representing the position of the a-th point in the contour, distance () represents the distance between two points;
and the number N lines of the straight lines and the radius R of the circle are counted according to the parameter information HoughParams to form the feature representation features= { P, A, N lines, R }.
5. The method for authenticating an identity based on vectorized signature as set forth in claim 4, wherein said step S2 is specifically:
The contour information is fitted by using Bezier curves, and is converted into a smooth curve path:
;
Wherein, Is a point on the curve,/>Is/>Control point of subBezier curve,/>The order is that t is a parameter, and t is more than 0 and less than 1;
And then generating a straight line path according to the parameter information of the straight line, generating an arc path according to the parameter information of the circle, and converting the signature image into a vectorization path to obtain the vectorization signature.
6. The method for authenticating an identity based on vectorized signature as set forth in claim 1, wherein said step S3 is specifically:
Acquiring a fingerprint image and an iris image of an authorizer;
feature points extracted by the fingerprint recognition algorithm are stored in FingerprintPoints, expressed as:
FingerprintPoints=ExtractFingerprintPoints(FingerprintImage);
ExtractFingerprintPoints is a fingerprint feature point extraction function in the OpenCV library, accepts the fingerprint image FINGERPRINTIMAGE as input, returns the extracted fingerprint feature points FingerprintPoints,
Feature points extracted by the iris recognition algorithm are stored in IrisPoints, expressed as: irisPoints = ExtractIrisPoints (IrisImage);
ExtractIrisPoints is an iris feature point extraction function in the OpenCV library, receives an iris image IRISIMAGE as input, and returns extracted iris feature points IrisPoints.
7. The method for authenticating an identity based on vectorized signature as set forth in claim 6, wherein said fingerprint recognition algorithm is specifically:
(1) Preprocessing the fingerprint image of the authorizer, including denoising, enhancing and refining operations;
(2) Extracting feature points from the preprocessed fingerprint image by using a fingerprint extraction algorithm, wherein the feature points comprise minutiae points and bifurcation points:
Calculating gradient field information of each pixel point for the preprocessed fingerprint image, and primarily extracting minutiae and bifurcation points according to the calculated gradient field information;
According to the preliminarily extracted minutiae, defining a corrosion kernel K F around the minutiae, performing corrosion operation on pixels around the minutiae, and repeating the corrosion operation for a plurality of times until the pixels around the minutiae cannot be corroded any more, thereby obtaining enhanced minutiae characteristics:
Let the preliminary extracted minutiae point locations be (x 0,y0), the corrosion operation be expressed as:
;
Wherein, Representing the image at coordinates/>Gray value at/>Is the relative position of K F in the corrosion core;
Defining an expansion kernel K P around the bifurcation point according to the bifurcation point which is preliminarily extracted, performing expansion operation on pixels around the bifurcation point, and repeating the expansion operation for a plurality of times until the pixels around the bifurcation point can not be expanded any more, so as to obtain the characteristics of the bifurcation point after enhancement;
let the position of the branch point of the preliminary extraction be The expansion operation is expressed as:
;
Wherein, Is the relative position of K P in the expansion core;
(3) The extracted and bifurcation point features are expressed in the form of a coordinate table, and all feature points are expressed by a matrix:
8. the identity verification method based on vectorization signature as claimed in claim 6, wherein the feature points extracted by the iris recognition algorithm are as follows:
Firstly, edge detection and positioning are carried out on iris images of authorizers, and boundaries of irises are determined;
Normalizing the iris boundary to a fixed-size membrane region;
within the normalized iris region, texture features are extracted by Gabor filter method, the Gabor filter response being expressed as:
Wherein, Is the image coordinates/>At the rotation angle/>Lower coordinates,/>Is wavelength,/>For the direction/>For phase shift,/>Is standard deviation/>Is ellipticity;
And encoding the extracted texture features to obtain iris feature points.
9. The identity verification method based on vectorization signature as claimed in claim 1, wherein said encrypting the vectorization signature by encryption algorithm comprises:
converting the vectorized signature into a digital form as data to be encrypted;
Based on the fingerprint and iris characteristic points of the authorizer, constructing a biological characteristic point set:
BiometricPoints=MergeBiometricPoints(FingerprintPoints,IrisPoints)
here MergeBiometricPoints is a biometric point fusion function, accepting fingerprint feature points FingerprintPoints, iris feature points IrisPoints as input, returning to the comprehensive biometric point set
BiometricPoints;
Using the biometric point set BiometricPoints as a key, and performing encryption operation on the vectorized signature based on the AES symmetric encryption algorithm to obtain an encrypted vectorized signature:
C=AES(PL,BiometricPoints);
where PL represents the vectorized signature to be encrypted, C represents the vectorized signature after encryption, AES represents the AES encryption algorithm.
10. An authentication system based on vectorized signatures, comprising a processor, a memory and a computer program stored on said memory, said processor, when executing said computer program, performing in particular the steps of an authentication method based on vectorized signatures as claimed in any one of claims 1-9.
CN202410412002.5A 2024-04-08 2024-04-08 Identity verification method and system based on vectorization signature Pending CN118013494A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410412002.5A CN118013494A (en) 2024-04-08 2024-04-08 Identity verification method and system based on vectorization signature

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410412002.5A CN118013494A (en) 2024-04-08 2024-04-08 Identity verification method and system based on vectorization signature

Publications (1)

Publication Number Publication Date
CN118013494A true CN118013494A (en) 2024-05-10

Family

ID=90954935

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410412002.5A Pending CN118013494A (en) 2024-04-08 2024-04-08 Identity verification method and system based on vectorization signature

Country Status (1)

Country Link
CN (1) CN118013494A (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6850252B1 (en) * 1999-10-05 2005-02-01 Steven M. Hoffberg Intelligent electronic appliance system and method
KR20110121874A (en) * 2010-05-03 2011-11-09 남궁종 Method and apparatus for iris recognition and wireless communications devic security system using it
US20200314094A1 (en) * 2017-10-11 2020-10-01 Samsung Electronics Co., Ltd. Server, method for controlling server, and terminal device
CN112434319A (en) * 2020-11-27 2021-03-02 无锡卡尔曼导航技术有限公司 Data encryption method and device for electronic file
CN114978772A (en) * 2022-07-27 2022-08-30 北京惠朗时代科技有限公司 Separated storage electronic signature encryption protection system based on Internet
CN116192399A (en) * 2023-01-09 2023-05-30 福建亿榕信息技术有限公司 Electronic signature method and system based on fingerprint and digital certificate dual authentication
CN116368355A (en) * 2021-09-05 2023-06-30 汉熵通信有限公司 Internet of things system
CN117688533A (en) * 2023-12-12 2024-03-12 确信信息股份有限公司 Electronic signature method, electronic signature verification method and system based on artificial intelligence

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6850252B1 (en) * 1999-10-05 2005-02-01 Steven M. Hoffberg Intelligent electronic appliance system and method
KR20110121874A (en) * 2010-05-03 2011-11-09 남궁종 Method and apparatus for iris recognition and wireless communications devic security system using it
US20200314094A1 (en) * 2017-10-11 2020-10-01 Samsung Electronics Co., Ltd. Server, method for controlling server, and terminal device
CN112434319A (en) * 2020-11-27 2021-03-02 无锡卡尔曼导航技术有限公司 Data encryption method and device for electronic file
CN116368355A (en) * 2021-09-05 2023-06-30 汉熵通信有限公司 Internet of things system
CN114978772A (en) * 2022-07-27 2022-08-30 北京惠朗时代科技有限公司 Separated storage electronic signature encryption protection system based on Internet
CN116192399A (en) * 2023-01-09 2023-05-30 福建亿榕信息技术有限公司 Electronic signature method and system based on fingerprint and digital certificate dual authentication
CN117688533A (en) * 2023-12-12 2024-03-12 确信信息股份有限公司 Electronic signature method, electronic signature verification method and system based on artificial intelligence

Similar Documents

Publication Publication Date Title
TWI678638B (en) Method, device and system for identity verification using card characteristics
Galbally et al. Iris image reconstruction from binary templates: An efficient probabilistic approach based on genetic algorithms
US9152869B2 (en) Biometric authentication systems and methods
KR102434562B1 (en) Method and apparatus for detecting fake fingerprint, method and apparatus for recognizing fingerprint
US20160085958A1 (en) Methods and apparatus for multi-factor user authentication with two dimensional cameras
CN109598247B (en) Two-dimensional code identity authentication method based on vein image detail point and grain characteristics
JP2014219967A (en) Method and system for authenticating biometric data obtained from fingerprint of user, and biometric authentication system
KR101853270B1 (en) Authentication method for portable secure authentication apparatus using fingerprint
CN109635756A (en) It merges fingerprint and refers to the two dimensional code identity identifying method of vein
Chavez-Galaviz et al. Embedded biometric cryptosystem based on finger vein patterns
KR20160133991A (en) Fingerprint enrollment method and fingerprint verification method
CN116778562B (en) Face verification method, device, electronic equipment and readable storage medium
Balakumar et al. Secure biometric key generation scheme for cryptography using combined biometric features of fingerprint and iris
Sujitha et al. Highly secure palmprint based biometric template using fuzzy vault
Tyagi et al. Security enhancement through iris and biometric recognition in atm
CN118013494A (en) Identity verification method and system based on vectorization signature
KR101270348B1 (en) Apparatus and method for fingerprint verification
JP6927611B1 (en) Feature extraction device, feature extraction method, and program
Tantubay et al. A Survey of Biometric Key-Binding Biocrypto-System Using Different Techniques
KR20040028210A (en) Apparatus for Identifying a Person through Recognizing a Face and Method thereof
KR20160101248A (en) Portable secure authentication apparatus using fingerprint
Szczepanik et al. Security lock system for mobile devices based on fingerprint recognition algorithm
JP4623053B2 (en) Portable electronic device and personal authentication method using biometric information
CN117150465A (en) Composite encryption method, device, equipment and storage medium
CN118138329A (en) Device password transmission method, device and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination