CN102722696A - Identity authentication method of identity card and holder based on multi-biological characteristics - Google Patents

Identity authentication method of identity card and holder based on multi-biological characteristics Download PDF

Info

Publication number
CN102722696A
CN102722696A CN2012101513000A CN201210151300A CN102722696A CN 102722696 A CN102722696 A CN 102722696A CN 2012101513000 A CN2012101513000 A CN 2012101513000A CN 201210151300 A CN201210151300 A CN 201210151300A CN 102722696 A CN102722696 A CN 102722696A
Authority
CN
China
Prior art keywords
matrix
image
masterplate
characteristic
iris
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012101513000A
Other languages
Chinese (zh)
Other versions
CN102722696B (en
Inventor
庞辽军
田杰
曹凯
练春锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xidian University
Original Assignee
Xidian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xidian University filed Critical Xidian University
Priority to CN201210151300.0A priority Critical patent/CN102722696B/en
Publication of CN102722696A publication Critical patent/CN102722696A/en
Application granted granted Critical
Publication of CN102722696B publication Critical patent/CN102722696B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Collating Specific Patterns (AREA)

Abstract

The invention provides an identity authentication method of an identity card and a holder based on multi-biological characteristics. The invention mainly assists in solving potential safety hazard problems existing in a cross-application process in the prior art. An embodiment comprises the steps that: when identity card registration transaction is carried out, characteristics of fingerprints, iris information and face image of a citizen are acquired; a uniform matrix image AI, a domain element matrix image UI and an offset matrix image SI are acquired and saved respectively in a population information database and an identity card chip; when authentication is carried out, an authentication terminal acquires characteristics of the fingerprints, the iris information and the face image of an identity card holder; the uniform matrix image AI and the domain element matrix image UI are searched for in the population information database based on personal basic information PI; and identity authentication of the identity card and the holder is carried out by using three biological characteristics of the fingerprints, the iris information and the face image, the uniform matrix image AI, the domain element matrix image UI and the offset matrix image SI. According to the invention, an authentication accuracy rate and overall authentication system safety are improved and potential safety hazard existing in the cross-application process is effectively reduced.

Description

Based on the I.D. of multi-biological characteristic and possessor's homogeneity authentication method
Technical field
The invention belongs to field of information security technology, relate to the physical identity authentication method of multi-biological characteristic I.D., can be used for carrying out quickly and accurately the establishing identity of I.D. possessor and I.D., effectively protect the personal secrets of biological characteristic.
Background technology
For can be through the machine-readable establishing identity that carries out I.D. possessor and I.D. quickly and accurately; Maintain state security and social stability; Effectively take precautions against the generation of criminal offences such as falsely using other people resident identification card and forgery, change resident identification card, the 23 meeting of the Standing Committee of the National People's Congress considered and adopted " People's Republic of China's residential identity demonstration amendment (draft) ".The further requirement of draft, neck is got, is changed in citizen's application, the resident identification card of applying for another, and should register finger print information.The finger print information of in resident identification card, registering; This is digitized fingerprint feature point, can not be reduced into fingerprint image, though can effectively protect citizen's finger print information safety to a certain extent; But widespread use along with fingerprint characteristic; Illegal intention person needn't reduce fingerprint image and only just can in other fingerprint characteristic encryption systems, successfully pretend to be validated user through the digitizing fingerprint characteristic dot information that steals, and obtains unlawful interests, causes great information security events.For example: in the Fuzzy Vault encrypting fingerprint system, just can from Vault, recover the polynomial expression of initial structure, obtain user's key information then according to digitized fingerprint characteristic dot information.
Document " based on the ID authentication device of second generation I.D. and multi-modal biological characteristic, Chinese invention patent, CN201838011 " discloses a kind of ID authentication device based on second generation I.D. and multi-modal biological characteristic.Though this patent has designed the authenticating device based on fingerprint, iris, people's face and China second-generation identity card; But the registration and the identifying procedure of these equipment are used in only preliminary explanation; There is not concrete authentication method; And the biological characteristic of its when registration typing does not read from I.D., promptly effectively I.D. possessor and I.D. is not combined, can not be accurate and effective I.D. possessor and I.D. are carried out establishing identity.
Document " based on the Certification of Second Generation authentication system research of fingerprint and recognition of face, digital technology and application, o. 11th in 2011 " discloses a kind of Certification of Second Generation authentication system based on fingerprint and recognition of face.According to the characteristics of self-contained lawful bearer's fingerprint of second generation resident identification card and image information, the document proposes: combine fingerprint and face recognition technology to realize having the multifactor authentication system of greater security.This system can compare through the user's that will collect in real time fingerprint, people's face information and fingerprint, the image information that is stored in the Certification of Second Generation, thereby whether when realizing identity verification card basic document, accomplishing the user is holder in due course's checking.Though this system effectively combines I.D. possessor and I.D., and I.D. possessor and I.D. carried out establishing identity, and more single biological characteristic authentication has discrimination preferably, there is following defective in this method:
At first, do not spell out the biological characteristic type of being stored, promptly storage is digitized biological characteristic dot information or original biometric image.The biological characteristic type of storage is different, and the leakage of information degree that causes is different.
Secondly, do not consider biological characteristic secret protection problem.In case biological characteristic is stolen; Just can recover original biological information or obtain the rights and interests of corresponding validated user in other biological characteristic application system through correlation attack; Cause the leakage of user privacy information and relevant heavy economic losses, serious harm national security and social stability.
At last; Because employed fingerprint and people's face information are deposited in the I.D. respectively; Therefore need respectively fingerprint and people's face information to be carried out safeguard protection to guarantee the personal secrets of these biological informations; This has increased the expense of biological characteristic secret protection, simultaneously the security of whole Verification System is had higher requirement, because the leakage of any information in fingerprint and the people's face information all can cause the reduction of total system security.
Summary of the invention
The objective of the invention is to deficiency to above-mentioned prior art; A kind of testimony of a witness homogeneity authentication method based on the multi-biological characteristic I.D. is proposed; To guarantee when making full use of the contained information of I.D., further improve the homogeneity authentication discrimination of I.D. possessor and its I.D., reduce the biological characteristic number of objects that will protect simultaneously; Improve the protection of citizen's biological characteristic private ownership, be reduced in the potential safety hazard that exists in the cross-application process.
The technical thought that realizes the object of the invention is; Through data after fingerprint, iris, three kinds of biological characteristic computings of people's face and the data that are stored in the population information database are carried out matrix operation; Whether the checking matrix of consequence is that full null matrix judges whether I.D. possessor and its I.D. have homogeneity, thereby when improving the biological attribute data security, effectively reduces falsely using and forging of I.D..Its particular content comprises as follows:
(1) biological attribute data typing step:
When (1a) handling I.D., gather fingerprint, iris and three kinds of biological characteristics of people's face of citizen, obtain citizen's fingerprint image FP, iris image IR and facial image FA;
(1b) from fingerprint image FP, iris image IR and facial image FA, take the fingerprint respectively characteristic masterplate FC, iris feature masterplate IC and face characteristic masterplate AC, and with FC, IC and three kinds of characteristic masterplates of AC composite character masterplate MC that permeates;
(1c) utilize fuzzy method for distilling, from characteristic masterplate MC, extract binary code word BC, and code word BC is mapped as cryptographic hash function value matrix E through m cryptographic hash function;
(1d) set Gaussian distribution matrix F, homogeneous matrix A, and calculate Gaussian mode matrix number F ', field element matrix U and excursion matrix S:
F′=Fmodq,
U=AF′modq,
S=F′-E,
Wherein, q is a prime number, and mod representes modulo operation, and modq representes that modulus is the modulo operation of q;
(1e) convert homogeneous matrix A, field element matrix U to homogeneous matrix image A I, field element matrix image UI, and homogeneous matrix image A I, field element matrix image UI are stored in the population information database;
(1f) convert excursion matrix S to excursion matrix image SI, and excursion matrix image SI is stored in the I.D. chip;
(2) I.D. and possessor's homogeneity authenticating step:
(2a) during authentication, authentication end captured identity card possessor's fingerprint image FP ', iris image IR ' and facial image FA ';
(2b) individual essential information PI in the reading identity card chip and excursion matrix image SI;
(2c) to citizen's fingerprint image FP ', iris image IR ' and facial image FA ' take the fingerprint respectively characteristic masterplate FC ', iris feature masterplate IC ' and face characteristic masterplate AC ', and with FC ', IC ' and three kinds of characteristic masterplates of AC ' composite character masterplate MC ' that permeates;
(2d) utilize fuzzy method for distilling, extraction binary code word BC ' from characteristic masterplate MC ', and code word BC ' is mapped as cryptographic hash function value matrix E ' through m cryptographic hash function;
(2e) convert excursion matrix image SI into excursion matrix S, and according to Hash cipher function value matrix E ' calculating Gaussian mode matrix number F ":
F″=S+E′;
(2f) in population information database, retrieve corresponding homogeneous matrix image A I, field element matrix image UI, and convert homogeneous matrix image A I, field element matrix image UI into homogeneous matrix A, field element matrix U respectively according to individual essential information PI;
(2g) utilize Gaussian mode matrix number F ", result of calculation matrix F N:
FN=U-AF″modq,
Wherein, q is a prime number, and mod representes modulo operation, and modq representes that modulus is the modulo operation of q, and whether judged result matrix F N is full null matrix, if matrix of consequence FN is full null matrix, explains that then I.D. and its possessor have homogeneity; Otherwise I.D. and its possessor do not have homogeneity.
Compared with prior art, the present invention has following advantage:
1, the present invention selects for use three kinds of biological characteristics to discern authentication; Or two kind living things feature recognitions single with use are compared; Greatly reduce false acceptance rate and false rejection rate, further promoted the accuracy rate of authentication, thereby effectively prevented the forgery of resident identification card or counterfeit.
2, the present invention is merged three kinds of biological characteristics in the characteristic level; Compare with other method that these three kinds of biological characteristics of same selection are discerned; Reduced the biological information number that needs protection; Effectively raise the whole security of biological characteristic privacy and Verification System, reduced the expense of Verification System aspect safeguard protection, improved effective utilization rate of resource;
3, the present invention only stores homogeneous matrix image A I, field element matrix image UI and excursion matrix image SI; Also can't recover original biological information even if the assailant gets access to image A I, UI and SI, more can not steal other rights and interests of validated user through cross-application.Therefore, the present invention effectively is reduced in the potential safety hazard that exists in the cross-application process in the biological characteristic personal secrets protection of strengthening the citizen.
Description of drawings
Fig. 1 the present invention is based on the I.D. of multi-biological characteristic and possessor's homogeneity authentication synoptic diagram;
Fig. 2 is the concrete authentication sub-process of authentication end figure among the present invention.
Embodiment
Below in conjunction with accompanying drawing, describe the idiographic flow of complete I.D. and a possessor's based on multi-biological characteristic homogeneity authentication method in detail.
With reference to Fig. 1; The present invention includes: citizen's biological attribute data typing stage during certificates handling and I.D. and possessor's homogeneity authentication phase; Wherein, I.D. and possessor's homogeneity authentication phase comprises: to the homogeneity authentication of reading and carrying out according to canned data of the collection of I.D. possessor biological characteristic, ID card information.Concrete steps are following:
One. the biological attribute data typing stage
Step 1: when the citizen handles I.D.; The department that handles gathers fingerprint, iris and three kinds of biological characteristics of people's face of citizen respectively through fingerprint, iris and people's face Acquisition Instrument by I.D., obtains citizen's fingerprint image FP, iris image IR and facial image FA.
Step 2: from the fingerprint image FP, iris image IR and the facial image FA that collect; The characteristic that takes the fingerprint respectively masterplate FC, iris feature masterplate IC and face characteristic masterplate AC, and with permeate a composite character masterplate MC of FC, IC and three kinds of characteristic masterplates of AC:
2a) fingerprint image FP is carried out the pretreatment operation that the cutting apart of image, enhancing and the field of direction are extracted successively; Again pretreated fingerprint image is carried out the crestal line refinement; Extract the position and the directional information of minutiae point; And minutiae point position and the directional information of extracting quantized; Generate fingerprint characteristic masterplate FC, the detailed step of quantification is referring to document " Generating revocable fingerprint template using polar grid based 3-tuple quantization technique.2011IEEE 54 ThInternational Midwest Symposium on Circuits and Systems (MWSCAS), pp:1-4,2011 ";
2b) iris image IR is strengthened; Again to the iris image after strengthening carry out successively the burn into iris region of eyelid eyelashes border detection, cut apart and extract; The iris region that extracts is carried out the normalization operation; And use the iris image of Gabor wave filter after handling and extract iris feature information, generate iris feature masterplate IC according to the iris feature information of extracting;
2c) facial image FA is carried out successively the pretreatment operation of brightness rectification, geometric calibration and histogram equalization; Utilize the integral projection method from pretreated facial image, to confirm the facial characteristics point; Extract the local feature information of facial characteristics point, according to the local feature information generation face characteristic masterplate AC of facial characteristics point;
2d) be utilized in biological characteristic fusion method on the characteristic level; With permeate a composite character masterplate MC of fingerprint characteristic masterplate FC, iris feature masterplate IC and three kinds of masterplates of face characteristic masterplate AC; The detailed step of the biological characteristic fusion method on the characteristic level is referring to document " Multibiometric Cryptosystems Based on Feature-Level Fusion.IEEE Transactions on Information Forensics and Security; vol.7; pp:255-268,2012.
Step 3: from characteristic masterplate MC, extract binary code word BC, and code word BC is mapped as cryptographic hash function value matrix E through m cryptographic hash function:
3a) according to fuzzy method for distilling performance, setting the set of biological characteristic masterplate is that k, error correcting capability are t for M, binary keys length, selects with (M; K; T) be the fuzzy method for distilling of parameter, referring to document " Fuzzy Extractors:How to Generate Strong Keys from Biometrics and Other Noisy Data.Computer Science, vol.3027; pp:523-540,2004 ";
3b) utilize selected with (M; K t) is the parameter fuzzy method for distilling, from characteristic masterplate MC, extracts the long binary code word BC of k; The detailed step that extracts is referring to document " Fuzzy Extractors:How to Generate Strong Keys from Biometrics and Other Noisy Data.Computer Science; vol.3027, pp:523-540,2004 ";
3c) according to m cryptographic hash function H 1, H 2..., H mBinary code word BC with extracting calculates cryptographic hash HV respectively 1, HV 2..., HV m:
Figure BDA00001646426700061
Choosing of parameter m referring to document " Trapdoors for hard lattices and new cryptographic constructions.In Proc.40 ThACM SymP.on Theory of Computing (STOC), pp:197-206,2008 ";
3d) according to the cryptographic hash function value HV that obtains 1, HV 2..., HV m, calculate cryptographic hash function value matrix E:
Step 4: set Gaussian distribution matrix F, homogeneous matrix A, calculate Gaussian mode matrix number F ', field element matrix U and excursion matrix S:
4a) confirm security parameter n, in (0,255) interval, select a prime number q at random, judge whether prime number q is the polynomial expression of n, if, confirm q unit integer field then according to selected prime number q
Figure BDA00001646426700072
And at q unit integer field In generate n * m dimension homogeneous matrix A at random,
Figure BDA00001646426700074
Otherwise, picked at random prime number q again; Security parameter n and q unit integer field
Figure BDA00001646426700075
Confirm, referring to document " Trapdoors for hard lattices and new cryptographic constructions.In Proc.40 ThACM SymP.on Theory of Computing (STOC), pp:197-206,2008 ";
4b) at set of integers
Figure BDA00001646426700076
In, select a Gaussian distribution parameter r at random, and confirm the set of m dimension integer vectors according to the individual numerical value m of cryptographic hash function
Figure BDA00001646426700077
With discrete Gaussian distribution According to first cryptographic hash function value HV 1The binary representation length l, call l SampleD method from discrete Gaussian distribution
Figure BDA00001646426700079
In choose m * l dimension Gaussian distribution matrix F,
The detailed step of SampleD method is referring to document " Trapdoors for hard lattices and new cryptographic constructions.In Proc.40 ThACM SymP.on Theory of Computing (STOC), pp:197-206,2008 ";
4c) according to the Gaussian distribution matrix F, calculate Gaussian mode matrix number F ':
F′=Fmodq,
Wherein, mod representes modulo operation, and modq representes that modulus is the modulo operation of q;
4d) according to homogeneous matrix A and Gaussian mode matrix number F ', computational fields matrix of elements U,
U=AF′modq;
4e) according to Gaussian mode matrix number F ' and cryptographic hash function value matrix E, calculate excursion matrix S,
S=F′-E。
Step 5: homogeneous matrix A, field element matrix U are carried out image conversion respectively handle operation: each element among the homogeneous matrix A according to the gray level of image conversion imaging prime information successively, is obtained homogeneous matrix image A I; Each element in the field element matrix U according to the gray level of image conversion imaging prime information successively, is obtained field element matrix image UI; Again homogeneous matrix image A I, field element matrix image UI are stored in the population information database.
Step 6: excursion matrix S is carried out image conversion handle operation, be about to each element among the excursion matrix S, obtain excursion matrix image SI, again excursion matrix image SI is stored in the I.D. chip according to the gray level of image conversion imaging prime information successively.
Two. I.D. and possessor's homogeneity authentication phase
With reference to Fig. 2, the homogeneity authenticating step in this stage is following:
Step 7: during authentication, the authentication end uses fingerprint, iris and people's face Acquisition Instrument captured identity card possessor's fingerprint image FP ', iris image IR ' and facial image FA ' respectively.
Step 8: the authentication end utilizes identity card reader, individual essential information PI in the reading identity card chip and excursion matrix image SI.
Step 9: the authentication end is to citizen's fingerprint image FP ', iris image IR ' and facial image FA ' take the fingerprint respectively characteristic masterplate FC ', iris feature masterplate IC ' and face characteristic masterplate AC ', and with FC ', IC ' and three kinds of characteristic masterplates of AC ' composite character masterplate MC ' that permeates:
9a) fingerprint image FP ' is carried out the pretreatment operation that the cutting apart of image, enhancing and the field of direction are extracted successively; Again pretreated fingerprint image is carried out the crestal line refinement; Extract the position and the directional information of minutiae point; And minutiae point position and the directional information of extracting quantized; Generate fingerprint characteristic masterplate FC ', the detailed step of quantification is referring to document " Generating revocable fingerprint template using polar grid based 3-tuple quantization technique.2011IEEE 54 ThInternational Midwest Symposium on Circuits and Systems (MWSCAS), pp:1-4,2011 ";
9b) iris image IR ' is strengthened; Again to the iris image after strengthening carry out successively the burn into iris region of eyelid eyelashes border detection, cut apart and extract; The iris region that extracts is carried out the normalization operation; And use the iris image of Gabor wave filter after handling and extract iris feature information, generate iris feature masterplate IC ' according to the iris feature information of extracting;
9c) facial image FA ' is carried out successively the pretreatment operation of brightness rectification, geometric calibration and histogram equalization; Utilize the integral projection method from pretreated facial image, to confirm the facial characteristics point; Extract the local feature information of facial characteristics point, according to the local feature information generation face characteristic masterplate AC ' of facial characteristics point;
9d) be utilized in biological characteristic fusion method on the characteristic level, with fingerprint characteristic masterplate FC ', iris feature masterplate IC ' and three kinds of masterplates of face characteristic masterplate AC ' composite character masterplate MC ' that permeates.The detailed step of the biological characteristic fusion method on the characteristic level is referring to document " Multibiometric Cryptosystems Based on Feature-Level Fusion.IEEE Transactions on Information Forensics and Security; vol.7; pp:255-268,2012.
Step 10: utilize fuzzy method for distilling, extraction binary code word BC ' from characteristic masterplate MC ', and code word BC ' is mapped as cryptographic hash function value matrix E ' through m cryptographic hash function:
10a) utilize step 3 selected with (M; K t) is the fuzzy method for distilling of parameter, the long binary code word BC ' of extraction k from characteristic masterplate MC '; The detailed step that extracts is referring to document " Fuzzy Extractors:How to Generate Strong Keys from Biometrics and Other Noisy Data.Computer Science; vol.3027, pp:523-540,2004 ";
10b) according to m cryptographic hash function H 1, H 2..., H mBinary code word BC ' with extracting calculates cryptographic hash HV respectively 1', HV 2' ..., HV m':
Figure BDA00001646426700091
10c) according to the cryptographic hash function value HV that obtains 1', HV 2' ..., HV m', calculate cryptographic hash function value matrix E ':
Step 11: excursion matrix image SI is read according to the matrix-style of image, obtain excursion matrix S, and according to Hash cipher function value matrix E ' calculating Gaussian mode matrix number F ":
F″=S+E′。
Step 12: in population information database, retrieve corresponding homogeneous matrix image A I, field element matrix image UI according to individual essential information PI; And homogeneous matrix image A I, field element matrix image UI read according to the matrix-style of image respectively, read and homogeneous matrix image A I, homogeneous matrix A, field element matrix U that field element matrix image UI is corresponding.
Step 13: utilize Gaussian mode matrix number F ", result of calculation matrix F N:
FN=U-AF″modq,
Wherein, q is a prime number, and mod representes modulo operation, and modq representes that modulus is the modulo operation of q, and whether judged result matrix F N is full null matrix, if matrix of consequence FN is full null matrix, explains that then I.D. and its possessor have homogeneity; Otherwise I.D. and its possessor do not have homogeneity.
Through above 13 steps, realized based on the I.D. of multi-biological characteristic and possessor's homogeneity authentication method.
Of the present inventionly be not limited in the description in instructions and the embodiment based on the I.D. of multi-biological characteristic and possessor's homogeneity authentication method.All within spirit of the present invention and principle, any modification of being made, equal replacement, improvement etc. all are included within the claim scope of the present invention.Explanation of nouns:
FP: the fingerprint image that collects when the citizen handles I.D.
IR: the iris image that collects when the citizen handles I.D.
FA: the facial image that collects when the citizen handles I.D.
FC: the fingerprint characteristic masterplate that extracts the fingerprint image FP that when the citizen handles I.D., gathers
IC: the iris feature masterplate that extracts the iris image IR that when the citizen handles I.D., gathers
AC: the face characteristic masterplate that extracts the facial image FA that when the citizen handles I.D., gathers
MC: the fingerprint characteristic masterplate FC that extracts, iris feature masterplate IC and face characteristic masterplate AC are merged the mixed feature templates that the back generates on the characteristic level
M: one of parameter in the fuzzy method for distilling, the set of expression biometric templates comprises: fingerprint characteristic template, iris feature template and face characteristic template etc.
K: the length of the binary code word that one of parameter in the fuzzy method for distilling, expression extract from biometric templates, the k value is a positive integer
T: one of parameter in the fuzzy method for distilling, the error correcting capability of the fuzzy extractive technique of expression, the t value is a positive integer
BC: the length of from composite character template MC, extracting is the binary code word of k
M: the number of cryptographic hash function, m value are positive integer
N: security parameter requires to confirm that the n value is a positive integer according to security of system
Q: prime number, span are interval (0,255)
HV i: i cryptographic hash function value, i=1,2 ..., m
L: first cryptographic hash function value HV 1Binary representation length, the l value is a positive integer
H 1: cryptographic hash function, H 1: 0,1} k→ 0,1} l
H i: cryptographic hash function, H i: 0,1} l→ 0,1} l, i=2,3 ..., m
E:m * l dimension cryptographic hash function value matrix, E is made up of m cryptographic hash function value
Figure BDA00001646426700111
: set of integers
Figure BDA00001646426700112
: q unit integer field
Figure BDA00001646426700113
: m * l ties up set of matrices, and each element in the matrix is all in
Figure BDA00001646426700115
: n * m ties up set of matrices, and each element in the matrix is all in
Figure BDA00001646426700116
Figure BDA00001646426700117
: n * l ties up set of matrices, and each element in the matrix is all in
A:n * m ties up homogeneous matrix,
Figure BDA00001646426700119
R: Gaussian distribution parameter, r value are positive integer
Figure BDA000016464267001110
: the set of the vector of m integer formation
Figure BDA000016464267001111
: According to the parameter r and
Figure BDA000016464267001112
Gaussian distribution determined
F:m * l dimension Gaussian distribution matrix
F ': m * l dimension Gaussian mode matrix number
Mod: modulo operation
Mod q: modulus is the modulo operation of q
S:m * l ties up excursion matrix
U:n * l dimension field element matrix,
AI: the image format of homogeneous matrix A
UI: the image format of field element matrix U
SI: the image format of excursion matrix S
PI: be stored in the individual citizens essential information in the I.D. chip
FP ': during authentication, the fingerprint image that the authentication end is gathered
IR ': during authentication, the iris image that the authentication end is gathered
FA ': during authentication, the facial image that the authentication end is gathered
FC ': the fingerprint characteristic masterplate that from the fingerprint image FP ' that the authentication end is gathered, extracts
IC ': the iris feature masterplate that from the iris image IR ' that the authentication end is gathered, extracts
AC ': the face characteristic masterplate that from the facial image FA ' that the authentication end is gathered, extracts
MC ': the fingerprint characteristic masterplate FC ' that extracts, iris feature masterplate IC ' and face characteristic masterplate AC ' are merged the mixed feature templates that the back generates on the characteristic level
BC ': the length of extraction is the binary code word of k from composite character template MC '
HV i': the cryptographic hash function value that calculates through i cryptographic hash function during authentication, i=1,2 ..., m
E ': m * l dimension cryptographic hash function value matrix
F ": m * l dimension Gaussian mode matrix number
FN:n * l ties up matrix of consequence

Claims (7)

1. one kind based on the I.D. of multi-biological characteristic and possessor's homogeneity authentication method, comprising:
(1) biological attribute data typing step:
When (1a) handling I.D., gather fingerprint, iris and three kinds of biological characteristics of people's face of citizen, obtain citizen's fingerprint image FP, iris image IR and facial image FA;
(1b) from fingerprint image FP, iris image IR and facial image FA, take the fingerprint respectively characteristic masterplate FC, iris feature masterplate IC and face characteristic masterplate AC, and with FC, IC and three kinds of characteristic masterplates of AC composite character masterplate MC that permeates;
(1c) utilize fuzzy method for distilling, from characteristic masterplate MC, extract binary code word BC, and code word BC is mapped as cryptographic hash function value matrix E through m cryptographic hash function;
(1d) set Gaussian distribution matrix F, homogeneous matrix A, and calculate Gaussian mode matrix number F ', field element matrix U and excursion matrix S:
F′=Fmodq,
U=AF′modq,
S=F′-E,
Wherein, q is a prime number, and mod representes modulo operation, and modq representes that modulus is the modulo operation of q;
(1e) convert homogeneous matrix A, field element matrix U to homogeneous matrix image A I, field element matrix image UI, and homogeneous matrix image A I, field element matrix image UI are stored in the population information database;
(1f) convert excursion matrix S to excursion matrix image SI, and excursion matrix image SI is stored in the I.D. chip;
(2) I.D. and possessor's homogeneity authenticating step:
(2a) during authentication, authentication end captured identity card possessor's fingerprint image FP ', iris image IR ' and facial image FA ';
(2b) individual essential information PI in the reading identity card chip and excursion matrix image SI;
(2c) to citizen's fingerprint image FP ', iris image IR ' and facial image FA ' take the fingerprint respectively characteristic masterplate FC ', iris feature masterplate IC ' and face characteristic masterplate AC ', and with FC ', IC ' and three kinds of characteristic masterplates of AC ' composite character masterplate MC ' that permeates;
(2d) utilize fuzzy method for distilling, extraction binary code word BC ' from characteristic masterplate MC ', and code word BC ' is mapped as cryptographic hash function value matrix E ' through m cryptographic hash function;
(2e) convert excursion matrix image SI into excursion matrix S, and according to Hash cipher function value matrix E ' calculating Gaussian mode matrix number F ":
F″=S+E′;
(2f) in population information database, retrieve corresponding homogeneous matrix image A I, field element matrix image UI, and convert homogeneous matrix image A I, field element matrix image UI into homogeneous matrix A, field element matrix U respectively according to individual essential information PI;
(2g) utilize Gaussian mode matrix number F ", result of calculation matrix F N:
FN=U-AF″modq,
Wherein, q is a prime number, and mod representes modulo operation, and modq representes that modulus is the modulo operation of q, and whether judged result matrix F N is full null matrix, if matrix of consequence FN is full null matrix, explains that then I.D. and its possessor have homogeneity; Otherwise I.D. and its possessor do not have homogeneity.
2. according to claim 1 based on the I.D. of multi-biological characteristic and possessor's homogeneity authentication method, the characteristic masterplate FC that from fingerprint image FP, takes the fingerprint in the wherein said step (1b), carry out as follows:
(1b1) fingerprint image FP is carried out the pre-service that the cutting apart of fingerprint image, enhancing and the field of direction are extracted successively;
(1b2) pretreated fingerprint image is carried out the crestal line Refinement operation, extract the position and the directional information of minutiae point;
(1b3) position and the directional information according to minutiae point generates fingerprint characteristic masterplate FC;
3. according to claim 1 based on the I.D. of multi-biological characteristic and possessor's homogeneity authentication method, from iris image IR, extract iris feature masterplate IC in the wherein said step (1b), carry out as follows:
(1b4) iris image IR is strengthened;
(1b5) to the iris image after strengthening carry out successively the burn into iris region of eyelid eyelashes border detection, cut apart and extract;
(1b6) the iris region normalization to extracting uses the Gabor wave filter to extract iris feature, generates iris feature masterplate IC.
4. according to claim 1 based on the I.D. of multi-biological characteristic and possessor's homogeneity authentication method, from facial image FA, extract face characteristic masterplate AC in the wherein said step (1b), carry out as follows:
(1b7) facial image FA is carried out successively the pre-service of brightness rectification, geometric calibration and histogram equalization;
(1b8) to pretreated facial image, utilize the integral projection method to confirm the facial characteristics point, extract the local feature information of facial characteristics point;
(1b9) the local feature information according to facial characteristics point generates face characteristic masterplate AC.
5. according to claim 1 based on the I.D. of multi-biological characteristic and possessor's homogeneity authentication method; Utilize fuzzy method for distilling in the wherein said step (1c); From characteristic masterplate MC, extract binary code word BC; And code word BC is mapped as matrix E through m cryptographic hash function, carry out as follows:
(1c1) select so that (M, k t) are the fuzzy method for distilling of parameter, and from characteristic masterplate MC, extracting length is the binary code word BC of k, and wherein: M is the set of biological characteristic masterplate, and k is an output binary code word length, and t is the error correcting capability of fuzzy method for distilling;
Be that the binary code word BC of k calculates m cryptographic hash function value HV (1c2) by length 1, HV 2..., HV m:
Wherein, H 1, H 2..., H mBe m cryptographic hash function, m is a positive integer;
(1c3) according to m the cryptographic hash function value HV that obtains 1, HV 2..., HV m, calculate cryptographic hash function value matrix E:
Figure FDA00001646426600032
6. according to claim 1 based on the I.D. of multi-biological characteristic and possessor's homogeneity authentication method, set the Gaussian distribution matrix F in the wherein said step (1d), carry out as follows:
(1d1) in set of integers
Figure FDA00001646426600041
; Select a Gaussian distribution parameter r at random, and confirm the set of m dimension integer vectors and discrete Gaussian distribution according to the individual numerical value m of cryptographic hash function
(1d2) according to first cryptographic hash function value HV 1The binary representation length l, call l SampleD method from discrete Gaussian distribution
Figure FDA00001646426600044
In choose the Gaussian distribution matrix F.
7. according to claim 1 based on the I.D. of multi-biological characteristic and possessor's homogeneity authentication method, set homogeneous matrix A in the wherein said step (1d), carry out as follows:
(1d3) confirm security parameter n, in (0,255) interval, select a prime number q at random, judge whether prime number q is the polynomial expression of n, if carry out step (1d4); Otherwise, picked at random prime number q again;
(1d4) according to selected prime number q, confirm q unit's integer field
Figure FDA00001646426600045
and in q unit's integer field
Figure FDA00001646426600046
, generate homogeneous matrix A at random.
CN201210151300.0A 2012-05-16 2012-05-16 Identity authentication method of identity card and holder based on multi-biological characteristics Expired - Fee Related CN102722696B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210151300.0A CN102722696B (en) 2012-05-16 2012-05-16 Identity authentication method of identity card and holder based on multi-biological characteristics

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210151300.0A CN102722696B (en) 2012-05-16 2012-05-16 Identity authentication method of identity card and holder based on multi-biological characteristics

Publications (2)

Publication Number Publication Date
CN102722696A true CN102722696A (en) 2012-10-10
CN102722696B CN102722696B (en) 2014-04-16

Family

ID=46948446

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210151300.0A Expired - Fee Related CN102722696B (en) 2012-05-16 2012-05-16 Identity authentication method of identity card and holder based on multi-biological characteristics

Country Status (1)

Country Link
CN (1) CN102722696B (en)

Cited By (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103699879A (en) * 2013-12-10 2014-04-02 柳州译海网络科技有限公司 Identity authentication device based on biometric information
CN103886283A (en) * 2014-03-03 2014-06-25 天津科技大学 Method for fusing multi-biometric image information for mobile user and application thereof
CN104134065A (en) * 2014-07-11 2014-11-05 北京航天金盾科技有限公司 Office business system with face comparison and fingerprint identification functions for notary office
CN104639546A (en) * 2014-12-31 2015-05-20 北京天诚盛业科技有限公司 Multi-biometric feature comprehensive authentication method, device and system
WO2015184686A1 (en) * 2014-06-04 2015-12-10 中兴通讯股份有限公司 Method and device for confirming user identity in vtm system
CN105160315A (en) * 2015-08-31 2015-12-16 宇龙计算机通信科技(深圳)有限公司 Fingerprint verification method and device and terminal
CN105162606A (en) * 2015-09-28 2015-12-16 公安部第一研究所 Method for generating network mapping document based on entity document of electronic legal identity document
CN106059753A (en) * 2016-03-10 2016-10-26 西京学院 Novel fingerprint key generation method for digital signature
WO2017004860A1 (en) * 2015-07-08 2017-01-12 宇龙计算机通信科技(深圳)有限公司 Biological information verification method, biological information verification system, and terminal
CN106485118A (en) * 2016-09-19 2017-03-08 信利光电股份有限公司 Electronic equipment and its identifying system, decryption method
CN106485240A (en) * 2016-10-28 2017-03-08 南京信息职业技术学院 A kind of system of monitoring resident identification card state and its monitoring method
CN107426240A (en) * 2017-08-24 2017-12-01 中国银行股份有限公司 Auth method, device and server
CN107832710A (en) * 2017-11-13 2018-03-23 上海聚虹光电科技有限公司 Iris self-help registration method
CN108475307A (en) * 2015-11-13 2018-08-31 徽章公司 Public/private key pair biological characteristic authentication system
CN109145551A (en) * 2018-06-27 2019-01-04 珠海宏桥高科技有限公司 A kind of method and apparatus of quick verification residential identity
CN109308727A (en) * 2018-09-07 2019-02-05 腾讯科技(深圳)有限公司 Virtual image model generating method, device and storage medium
CN109522827A (en) * 2018-10-31 2019-03-26 维沃移动通信有限公司 A kind of method, apparatus and terminal device acquiring biological characteristic
CN110069965A (en) * 2018-01-24 2019-07-30 南京机器人研究院有限公司 A kind of robot personal identification method
CN110069964A (en) * 2018-01-24 2019-07-30 南京机器人研究院有限公司 A kind of method of robot identification user identity
CN111414785A (en) * 2019-01-07 2020-07-14 财团法人交大思源基金会 Identification system and identification method
CN112863593A (en) * 2021-02-05 2021-05-28 厦门大学 Identity identification feature extraction method and system based on skin metagenome data
CN113312950A (en) * 2020-09-24 2021-08-27 一令通(上海)科技有限公司 Identity authentication method based on face and iris characteristics
CN114780769A (en) * 2022-06-13 2022-07-22 杭州合众数据技术有限公司 Personnel checking method based on bloom filter
CN117240607A (en) * 2023-11-10 2023-12-15 北京云尚汇信息技术有限责任公司 Security authentication method based on security computer
CN117371048A (en) * 2023-12-08 2024-01-09 深圳市研盛芯控电子技术有限公司 Remote access data processing method, device, equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2437761A (en) * 2006-05-03 2007-11-07 Qusharat Hussain Virtual identity and authentication employing a mobile device
CN101345625A (en) * 2008-08-15 2009-01-14 西安电子科技大学 Remote authentication method based on biological characteristic
CN101567033A (en) * 2009-06-03 2009-10-28 西北工业大学 Biological authentication method for resisting privacy disclosure
CN201838011U (en) * 2010-05-26 2011-05-18 中国科学院自动化研究所 Identity authentication equipment based on second-generation ID cards and multimode biological features

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2437761A (en) * 2006-05-03 2007-11-07 Qusharat Hussain Virtual identity and authentication employing a mobile device
CN101345625A (en) * 2008-08-15 2009-01-14 西安电子科技大学 Remote authentication method based on biological characteristic
CN101567033A (en) * 2009-06-03 2009-10-28 西北工业大学 Biological authentication method for resisting privacy disclosure
CN201838011U (en) * 2010-05-26 2011-05-18 中国科学院自动化研究所 Identity authentication equipment based on second-generation ID cards and multimode biological features

Cited By (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103699879A (en) * 2013-12-10 2014-04-02 柳州译海网络科技有限公司 Identity authentication device based on biometric information
CN103886283A (en) * 2014-03-03 2014-06-25 天津科技大学 Method for fusing multi-biometric image information for mobile user and application thereof
WO2015184686A1 (en) * 2014-06-04 2015-12-10 中兴通讯股份有限公司 Method and device for confirming user identity in vtm system
CN105224842A (en) * 2014-06-04 2016-01-06 中兴通讯股份有限公司 The method of user identification confirmation and device in a kind of VTM system
CN105224842B (en) * 2014-06-04 2020-04-28 中兴通讯股份有限公司 Method and device for confirming user identity in VTM system
CN104134065A (en) * 2014-07-11 2014-11-05 北京航天金盾科技有限公司 Office business system with face comparison and fingerprint identification functions for notary office
CN104639546A (en) * 2014-12-31 2015-05-20 北京天诚盛业科技有限公司 Multi-biometric feature comprehensive authentication method, device and system
CN104639546B (en) * 2014-12-31 2019-01-25 北京眼神智能科技有限公司 The methods, devices and systems of multi-biological characteristic inclusive authentication
WO2017004860A1 (en) * 2015-07-08 2017-01-12 宇龙计算机通信科技(深圳)有限公司 Biological information verification method, biological information verification system, and terminal
CN105160315A (en) * 2015-08-31 2015-12-16 宇龙计算机通信科技(深圳)有限公司 Fingerprint verification method and device and terminal
CN105162606A (en) * 2015-09-28 2015-12-16 公安部第一研究所 Method for generating network mapping document based on entity document of electronic legal identity document
CN108475307A (en) * 2015-11-13 2018-08-31 徽章公司 Public/private key pair biological characteristic authentication system
CN106059753A (en) * 2016-03-10 2016-10-26 西京学院 Novel fingerprint key generation method for digital signature
CN106059753B (en) * 2016-03-10 2019-03-26 西京学院 A kind of fingerprint key generation new method for digital signature
CN106485118A (en) * 2016-09-19 2017-03-08 信利光电股份有限公司 Electronic equipment and its identifying system, decryption method
CN106485240A (en) * 2016-10-28 2017-03-08 南京信息职业技术学院 A kind of system of monitoring resident identification card state and its monitoring method
CN107426240A (en) * 2017-08-24 2017-12-01 中国银行股份有限公司 Auth method, device and server
CN107832710A (en) * 2017-11-13 2018-03-23 上海聚虹光电科技有限公司 Iris self-help registration method
CN110069964A (en) * 2018-01-24 2019-07-30 南京机器人研究院有限公司 A kind of method of robot identification user identity
CN110069965A (en) * 2018-01-24 2019-07-30 南京机器人研究院有限公司 A kind of robot personal identification method
CN109145551A (en) * 2018-06-27 2019-01-04 珠海宏桥高科技有限公司 A kind of method and apparatus of quick verification residential identity
CN109308727A (en) * 2018-09-07 2019-02-05 腾讯科技(深圳)有限公司 Virtual image model generating method, device and storage medium
CN109522827A (en) * 2018-10-31 2019-03-26 维沃移动通信有限公司 A kind of method, apparatus and terminal device acquiring biological characteristic
CN111414785A (en) * 2019-01-07 2020-07-14 财团法人交大思源基金会 Identification system and identification method
CN113312950A (en) * 2020-09-24 2021-08-27 一令通(上海)科技有限公司 Identity authentication method based on face and iris characteristics
CN112863593A (en) * 2021-02-05 2021-05-28 厦门大学 Identity identification feature extraction method and system based on skin metagenome data
CN112863593B (en) * 2021-02-05 2024-02-20 厦门大学 Identification feature extraction method and system based on skin metagenome data
CN114780769A (en) * 2022-06-13 2022-07-22 杭州合众数据技术有限公司 Personnel checking method based on bloom filter
CN117240607A (en) * 2023-11-10 2023-12-15 北京云尚汇信息技术有限责任公司 Security authentication method based on security computer
CN117240607B (en) * 2023-11-10 2024-02-13 北京云尚汇信息技术有限责任公司 Security authentication method based on security computer
CN117371048A (en) * 2023-12-08 2024-01-09 深圳市研盛芯控电子技术有限公司 Remote access data processing method, device, equipment and storage medium
CN117371048B (en) * 2023-12-08 2024-03-29 深圳市研盛芯控电子技术有限公司 Remote access data processing method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN102722696B (en) 2014-04-16

Similar Documents

Publication Publication Date Title
CN102722696B (en) Identity authentication method of identity card and holder based on multi-biological characteristics
Joseph et al. Retracted article: a multimodal biometric authentication scheme based on feature fusion for improving security in cloud environment
Nandakumar et al. Fingerprint-based fuzzy vault: Implementation and performance
Uludag et al. Securing fingerprint template: Fuzzy vault with helper data
Gaddam et al. Efficient Cancelable Biometric Key Generation Scheme for Cryptography.
CN1860724B (en) Method for identification
CN106936586A (en) A kind of biological secret key extracting method based on fingerprint bit string and Error Correction of Coding
Ali et al. Fingerprint shell construction with prominent minutiae points
Murugesh Advanced biometric ATM machine with AES 256 and steganography implementation
Saraswathi et al. Retinal biometrics based authentication and key exchange system
Brindha Biometric template security using fuzzy vault
Conti et al. Fingerprint traits and RSA algorithm fusion technique
Balakumar et al. Secure biometric key generation scheme for cryptography using combined biometric features of fingerprint and iris
CN104462926A (en) Intelligent card identity recognition method and system
Sharma et al. Encryption of text using fingerprints as input to various algorithms
Sowkarthika et al. Securing iris and fingerprint templates using fuzzy vault and symmetric algorithm
Islam et al. Technology review: image enhancement, feature extraction and template protection of a fingerprint authentication system
Selwal et al. Performance analysis of template data security and protection in biometric systems
Sinduja et al. Sheltered iris attestation by means of visual cryptography (sia-vc)
EP3093793A1 (en) Fingerprint identification method and device using same
Bayly et al. Fractional biometrics: safeguarding privacy in biometric applications
Praseetha et al. Novel Web Service Based Fingerprint Identification Using Steganography and Xml Mining
Ashish et al. Biometric: fingerprints protection
Meenakshi et al. Retina and Iris based multimodal biometric Fuzzy Vault
Cimato et al. Biometrics and privacy

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20140416

Termination date: 20190516

CF01 Termination of patent right due to non-payment of annual fee