CN103279697A - Fingerprint detail information hiding and restoring method based on orthogonal matrix and modular arithmetic - Google Patents

Fingerprint detail information hiding and restoring method based on orthogonal matrix and modular arithmetic Download PDF

Info

Publication number
CN103279697A
CN103279697A CN201310179416XA CN201310179416A CN103279697A CN 103279697 A CN103279697 A CN 103279697A CN 201310179416X A CN201310179416X A CN 201310179416XA CN 201310179416 A CN201310179416 A CN 201310179416A CN 103279697 A CN103279697 A CN 103279697A
Authority
CN
China
Prior art keywords
fingerprint
information
key
sub
minutiae
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201310179416XA
Other languages
Chinese (zh)
Other versions
CN103279697B (en
Inventor
付波
林劼
郝玉洁
蔡媛媛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Electronic Science and Technology of China
Original Assignee
University of Electronic Science and Technology of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Electronic Science and Technology of China filed Critical University of Electronic Science and Technology of China
Priority to CN201310179416.XA priority Critical patent/CN103279697B/en
Publication of CN103279697A publication Critical patent/CN103279697A/en
Application granted granted Critical
Publication of CN103279697B publication Critical patent/CN103279697B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Collating Specific Patterns (AREA)

Abstract

The invention discloses a fingerprint detail information hiding and restoring method based on orthogonal matrix and modular arithmetic. According to the method, fingerprint detail characteristic information is divided into fingerprint detail point position coordinate information and fingerprint detail point direction information, and through the utilization of a random transformed orthogonal matrix of a sub-secret-key of a password secret key, matrix transformation arithmetic of the password secret key and position information is achieved to protect the fingerprint detail point position coordinate information. Through the utilization of the other sub-secret-key of the password secret key, modular arithmetic of the password secret key and direction information is achieved to protect the fingerprint detail point direction information. The fingerprint detail information hiding and restoring method based on the orthogonal matrix and modular arithmetic overcomes the defects that a fingerprint template easily receives attacks inside a system or attacks outside the system, and the fact that fingerprint characteristics become invalid is caused. By the further utilization of the combination of the dual authentication of the password secret key and the fingerprint characteristics, safety of a protected system and privacy of fingerprint characteristic data are improved.

Description

Details in fingerprint Information hiding and restoration methods based on orthogonal matrix and modular arithmetic
Technical field
The present invention relates to computer technology, network security technology, digital image processing techniques and technical field of data storage, particularly a kind of details in fingerprint Information hiding and restoration methods based on orthogonal matrix and modular arithmetic.
Background technology
Off-line or on-line system need accurately be known the identity of system user for guaranteeing data security.Current more safe and reliable identity authorization system is mainly based on token (such as ID (identity number) card) or knowledge (such as password or PIN code).The critical defect of token is to lose easily, forge and carry inconvenience; The attack of social engineering is then forgotten, obscures and very easily be subjected to knowledge (such as password) easily.These problems cause can't distinguishing real validated user owner and counterfeiter based on the identity authorization system of token or knowledge.In case the counterfeiter is known password or ID (identity number) card, just have the equal access rights of validated user.Thus, the identity recognizing technology based on biological characteristic has obtained studying widely and using.
Biological characteristic has the memory carried, need not, advantage such as easy to use, the more important thing is to have the resisting denying characteristic.This makes biological characteristic become a kind of strong individual authentication form, has overcome the unfavorable factor based on token and knowledge authentication to a certain extent.But biometric technology seems very fragile to some attacks commonly used, such as, Replay Attack, man-in-the-middle attack, wooden horse attack, spoofing attack (Spoof attacks) and template attack etc.
On the other hand, the protection problem of the privacy of biological characteristic is also very important.Steal probably, sell or the privacy information (such as personal income and medical information) of sharing users such as, lawless person.For improving security of system; security system always wishes as far as possible at length to obtain user's personal information; yet the user does not wish that but the personal information of oneself is exposed to the assailant because of the safety defect of system, therefore just exists a contradiction on security and privacy protecting.In general, Ge Ren privacy mainly is subjected to the threat of following two aspects:
(1) biological characteristic is user's physical trait, belongs to individual privacy, if individual's biological characteristic is disclosed, it is unfavorable then to bring to personal lifestyle.Such as, others can judge your whereabouts according to your fingerprint, even can utilize your biological characteristic (such as fingerprint) to go crime.
(2) in living creature characteristic recognition system, often need registration personal information associated with it, such as age of individual, wedding not, identification card number, SSN (social security number) etc., there is the risk of being utilized by the lawless person in these;
Therefore, for solving security and the privacy problem of biological characteristic, focus on protecting the template safety of biological characteristic.The most typical solution is that key and template are organically blent, make neither under attack easily, thereby reach the purpose of protecting the living creature characteristic recognition system security.
The biometric templates resist technology totally can be divided into following several:
(1) biological characteristic hash method (biohashing), the double factor identity identifying method of use fingerprint and random number combination.Yet the fixed length feature of the height that algorithm the requires property distinguished realizes very difficult in fingerprint.
(2) template deformation method carries out the geometric transformation of doubling such as the determined straight line of singular point that the details in fingerprint point template is determined along fingerprint image of propositions such as Ang, thereby realizes the deformation template.For another example Ratha etc. propose with the fingerprint minutiae set from luv space, transform to other space through one-way function, thereby carry out the minutiae point comparison at transformation space.The recognition performance of above method all descends to some extent.
(3) based on the method for key bindings or generation; The method also makes biological characteristic encrypt (Biometric Encryption).Its fundamental purpose is to utilize biological characteristic to encrypt and the protection secret data, improves the security of system and the privacy of user profile.Yet its main difficulty is the changeability of biometric image, and this instability makes that the enciphering/deciphering process is (Fuzzy) that blurs just.Can change along with the dust on pressure, temperature, humidity, sweat mark, grease, wound and surface etc. such as, fingerprint image.It is very difficult that this changeability makes that the biological characteristic encryption system deals with, and must allow that same individual's biological characteristic changes the secret value of decoding, but can not allow another one people's any secret information of biological characteristic decoding leakage.
The biometric templates resist technology has very big potentiality and advantage, can satisfy commercial undertaking, enterprise or NGO etc. to the advanced requirement of individual identity checking.But, want to accomplish that checking is more accurate, the biological characteristic system is more credible, also has a lot of work to do.Such as, need further improve the existing scheme that biometric templates is protected.Therefore, how to improve the security of biometric templates, scientific research both at home and abroad and company researcher need the problem of emphasis thinking.
Summary of the invention
The objective of the invention is to overcome the prior art fingerprint template and very easily be subjected to internal system or outside attack, thereby the deficiency that causes fingerprint characteristic to lose efficacy provides a kind of and utilizes the combination of password key and fingerprint characteristic double authentication to solve the privacy of fingerprint template and details in fingerprint Information hiding and the restoration methods based on orthogonal matrix and modular arithmetic of safety issue.
The objective of the invention is to be achieved through the following technical solutions: based on details in fingerprint Information hiding and the restoration methods of orthogonal matrix and modular arithmetic, detail characteristics of fingerprints information is divided into the directional information of fingerprint minutiae location coordinate information and fingerprint minutiae; The fingerprint minutiae location coordinate information is protected by the conversion of orthogonal matrix at random that sub-key of password key generates, and the directional information of fingerprint minutiae adds computing protection by the mould of another sub-key of password key.
The protection of fingerprint minutiae location coordinate information comprises that position information registration is hidden and the positional information checking recovers two steps, and described position information registration is hidden and comprised following substep:
S101: the user imports the secret password key k, with being cut into two sub-keys after the one-way function MD5 computing
Figure 201310179416X100002DEST_PATH_IMAGE001
S102: sub-key
Figure 19578DEST_PATH_IMAGE002
Generate independently random vector of linearity , use the Gram-Schmidt algorithm with random vector
Figure 209251DEST_PATH_IMAGE003
Conversion generates
Figure 524388DEST_PATH_IMAGE004
Orthogonal matrix
Figure 201310179416X100002DEST_PATH_IMAGE005
, wherein,
Figure 90498DEST_PATH_IMAGE006
It is the predefined fingerprint minutiae maximum number of system; With the two-dimensional position coordinate
Figure 201310179416X100002DEST_PATH_IMAGE007
Be converted to one-dimensional linear coding, and with the 1st privacy key
Figure 923325DEST_PATH_IMAGE002
The maximization conversion
Figure 283899DEST_PATH_IMAGE008
Fill and be encoded to vector
Figure 201310179416X100002DEST_PATH_IMAGE009
Thereby with orthogonal matrix
Figure 77543DEST_PATH_IMAGE005
Do conversion, obtain the secret location coded message
Figure 447345DEST_PATH_IMAGE010
:
Figure 201310179416X100002DEST_PATH_IMAGE011
S103: storage secret location coded message in database
Figure 869099DEST_PATH_IMAGE010
Described positional information checking recovers to comprise following substep:
S104: S102 is identical with step, and the user imports privacy key k, with being cut into two sub-keys after the one-way function MD5 computing
Figure 666153DEST_PATH_IMAGE001
S105: S103 is identical with step, sub-key
Figure 681514DEST_PATH_IMAGE002
Generate independently random vector of linearity
Figure 855006DEST_PATH_IMAGE003
, use the Gram-Schmidt algorithm with random vector Conversion generates Orthogonal matrix
Figure 460934DEST_PATH_IMAGE005
, and calculate its inverse matrix
Figure 172538DEST_PATH_IMAGE012
S106: from database, extract the secret location coded message
Figure 444251DEST_PATH_IMAGE010
, and with following formula calculation template:
S107: by positional information and the checking fingerprint matching of the above fingerprint template that extracts, thereby realize that checking recovers.
The protection of described fingerprint minutiae directional information comprises that the directional information registration is hidden and the directional information checking recovers two steps, and described directional information registration is hidden and comprised following substep:
S201: the user imports the secret password key k, with being cut into two sub-keys after the one-way function MD5 computing
Figure 583108DEST_PATH_IMAGE001
S202: sub-key
Figure 697694DEST_PATH_IMAGE014
Generate independently random vector of linearity
Figure 201310179416X100002DEST_PATH_IMAGE015
, minutiae point directional information rule is turned between 0~359 degree, quantity is maximum fingerprint minutiae parameter, and uses sub-key
Figure 947410DEST_PATH_IMAGE014
Fill, obtain the minutiae point direction vector and be
Figure 932684DEST_PATH_IMAGE016
, all
Figure 648967DEST_PATH_IMAGE006
In the individual minutiae point direction, comprise
Figure 201310179416X100002DEST_PATH_IMAGE017
Individual true directions and
Figure 250850DEST_PATH_IMAGE018
Individual filling direction is with sub-key
Figure 304256DEST_PATH_IMAGE014
Random vector after the conversion
Figure 144036DEST_PATH_IMAGE015
Corresponding element do the computing that adds of mould 360, thereby obtain secret directional information
Figure 201310179416X100002DEST_PATH_IMAGE019
:
Figure 31221DEST_PATH_IMAGE020
S203: the secret directional information of storage in database
Figure 323662DEST_PATH_IMAGE019
Described directional information checking recovers to comprise following substep:
S204: S201 is identical with step, and the user imports privacy key k, with being cut into two sub-keys after the one-way function MD5 computing
Figure 180759DEST_PATH_IMAGE001
S205: sub-key
Figure 406204DEST_PATH_IMAGE014
Generate independently random vector of linearity
S206: from database, extract secret directional information
Figure 103082DEST_PATH_IMAGE019
, and with following formula calculation template:
Figure 201310179416X100002DEST_PATH_IMAGE021
S207: by directional information and the checking fingerprint matching of the above fingerprint template that extracts, thereby realize that checking recovers.
Import the secret password key the user
Figure 904816DEST_PATH_IMAGE022
Also comprise a fingerprint collecting analytical procedure: the fingerprint image that collects according to fingerprint capturer with the fingerprint characteristic extraction algorithm minutiae point information that takes the fingerprint, is expressed as before
Figure 201310179416X100002DEST_PATH_IMAGE023
, wherein,
Figure 984767DEST_PATH_IMAGE024
,
Figure 201310179416X100002DEST_PATH_IMAGE025
Be horizontal ordinate,
Figure 72809DEST_PATH_IMAGE026
Be ordinate, Be the direction value, thereby obtain the positional information of fingerprint minutiae
Figure 746367DEST_PATH_IMAGE007
And directional information
In fingerprint minutiae location coordinate information and the directional information protection process; after registration is hidden or checking recovers to finish; system can remove password, fingerprint image and the details in fingerprint dot information in the internal memory; that preserves only has minutiae point location coordinate information and a directional information behind the enciphering transformation, has improved the privacy of user fingerprints information and the security of protected system.
The invention has the beneficial effects as follows:
1, uses the stochastic transformation orthogonal matrix of the sub-key of password key, realize the transform operation of the positional information of password key and fingerprint minutiae; And another sub-key of utilization password key realizes that the mould of password key and fingerprint minutiae directional information adds computing, provides double authentication to shielded system, has improved the security of protected system;
2, if do not know the password key, it is very difficult that the template after the conversion brings acquisition primary template data by inversion, has improved the privacy of fingerprint characteristic data;
3, if the template after the conversion is lost or is subjected to security threat, reconfigurable new password key obtains new conversion template, and need not to abandon the primeval life feature;
4, the authentication performance of the fingerprint template after the conversion does not have any decline, therefore, can be widely used in the protection of fingerprint characteristic.
Description of drawings
Fig. 1 is basic thought process flow diagram of the present invention;
Fig. 2 is that process flow diagram is hidden in details in fingerprint information registration of the present invention;
Fig. 3 is that details in fingerprint Information Authentication of the present invention recovers process flow diagram;
Fig. 4 is processed offline synoptic diagram of the present invention.
Embodiment
Further specify technical scheme of the present invention below in conjunction with accompanying drawing, but the content that the present invention protects is not limited to the following stated.
As shown in Figure 1; details in fingerprint Information hiding and restoration methods based on orthogonal matrix and modular arithmetic; the directional information that detail characteristics of fingerprints information is divided into fingerprint minutiae location coordinate information and fingerprint minutiae; the fingerprint minutiae location coordinate information is protected by the conversion of orthogonal matrix at random of a sub-key generation of password key, and the directional information of fingerprint minutiae adds computing protection by the mould of another sub-key of password key.
As shown in Figures 2 and 3, the protection of fingerprint minutiae location coordinate information comprises that position information registration is hidden and the positional information checking recovers two steps, and described registration is hidden and comprised following substep:
S101: the user imports the secret password key k, with being cut into two sub-keys after the one-way function MD5 computing
Figure 879725DEST_PATH_IMAGE001
S102: sub-key
Figure 138668DEST_PATH_IMAGE002
Generate independently random vector of linearity
Figure 892998DEST_PATH_IMAGE003
, use the Gram-Schmidt algorithm with random vector
Figure 33604DEST_PATH_IMAGE003
Conversion generates
Figure 556990DEST_PATH_IMAGE004
Orthogonal matrix
Figure 986834DEST_PATH_IMAGE005
, wherein,
Figure 494039DEST_PATH_IMAGE006
It is the predefined fingerprint minutiae maximum number of system; With the two-dimensional position coordinate Be converted to one-dimensional linear coding, and with the 1st privacy key The maximization conversion
Figure 419903DEST_PATH_IMAGE008
Fill and be encoded to vector
Figure 148825DEST_PATH_IMAGE009
Thereby with orthogonal matrix Do conversion, obtain the secret location coded message
Figure 256775DEST_PATH_IMAGE010
:
Figure 762843DEST_PATH_IMAGE011
S103: storage secret location coded message in database
Figure 979061DEST_PATH_IMAGE010
Described positional information checking recovers to comprise following substep:
S104: S102 is identical with step, and the user imports the secret password key k, with being cut into two sub-keys after the one-way function MD5 computing
Figure 861566DEST_PATH_IMAGE001
S105: S103 is identical with step, sub-key
Figure 620575DEST_PATH_IMAGE002
Generate independently random vector of linearity
Figure 563123DEST_PATH_IMAGE003
, use the Gram-Schmidt algorithm with random vector
Figure 1057DEST_PATH_IMAGE003
Conversion generates Orthogonal matrix
Figure 425403DEST_PATH_IMAGE005
, and calculate its inverse matrix
Figure 273273DEST_PATH_IMAGE012
S106: from database, extract the secret location coded message
Figure 605028DEST_PATH_IMAGE010
, and with following formula calculation template:
Figure 829336DEST_PATH_IMAGE013
S107: by positional information and the checking fingerprint matching of the above fingerprint template that extracts, thereby realize that checking recovers.
As shown in Figures 2 and 3, the protection of fingerprint minutiae directional information comprises that the directional information registration is hidden and the directional information checking recovers two steps, and described directional information registration is hidden and comprised following substep:
S201: the user imports the secret password key k, with being cut into two sub-keys after the one-way function MD5 computing
Figure 156412DEST_PATH_IMAGE001
S202: sub-key
Figure 971922DEST_PATH_IMAGE014
Generate independently random vector of linearity
Figure 384448DEST_PATH_IMAGE015
, the minutiae point directional information is planned between 0~359 degree, quantity is maximum fingerprint minutiae parameter, and uses sub-key Fill, obtain the minutiae point direction vector and be
Figure 734975DEST_PATH_IMAGE016
, all
Figure 190227DEST_PATH_IMAGE006
In the individual minutiae point direction, comprise
Figure 90050DEST_PATH_IMAGE017
Individual true directions and
Figure 187319DEST_PATH_IMAGE018
Individual filling direction is with sub-key
Figure 223408DEST_PATH_IMAGE014
Random vector after the conversion Corresponding element do the computing that adds of mould 360, thereby obtain secret directional information
Figure 643205DEST_PATH_IMAGE019
:
Figure 747428DEST_PATH_IMAGE020
S203: the secret directional information of storage in database
Figure 903603DEST_PATH_IMAGE019
Described directional information checking recovers to comprise following substep:
S204: S201 is identical with step, and the user imports privacy key k, with being cut into two sub-keys after the one-way function MD5 computing
Figure 700657DEST_PATH_IMAGE001
S205: sub-key
Figure 840652DEST_PATH_IMAGE014
Generate independently random vector of linearity
Figure 14144DEST_PATH_IMAGE015
S206: from database, extract secret directional information
Figure 431350DEST_PATH_IMAGE019
, and with following formula calculation template:
Figure 399306DEST_PATH_IMAGE021
S207: by directional information and the checking fingerprint matching of the above fingerprint template that extracts, thereby realize that checking recovers.
Import the secret password key the user
Figure 495438DEST_PATH_IMAGE022
Also comprise a fingerprint collecting analytical procedure: the fingerprint image that collects according to fingerprint capturer with the fingerprint characteristic extraction algorithm minutiae point information that takes the fingerprint, is expressed as before
Figure 941463DEST_PATH_IMAGE023
, wherein,
Figure 603388DEST_PATH_IMAGE024
,
Figure 742246DEST_PATH_IMAGE025
Be horizontal ordinate,
Figure 325674DEST_PATH_IMAGE026
Be ordinate, Be the direction value, thereby obtain the positional information of fingerprint minutiae
Figure 967188DEST_PATH_IMAGE007
And directional information
Figure 276946DEST_PATH_IMAGE027
In fingerprint minutiae location coordinate information and the directional information protection process; after registration is hidden or checking recovers to finish; system can remove password, fingerprint image and the details in fingerprint dot information in the internal memory; that preserves only has minutiae point location coordinate information and a directional information behind the enciphering transformation, has improved the privacy of user fingerprints information and the security of protected system.
As shown in Figure 4, off-line process, input PIN password, and with fingerprint instrument scanning collection information in fingerprint is with the fingerprint characteristic extraction algorithm minutiae point information that takes the fingerprint; The sub-key that generates according to password generates orthogonal matrix and encryption to measure feature again, and minutiae point is carried out conversion protection back generate security template, thus can permanent storage.The online verification stage need point out according to application system, after input validation PIN password, the security template that will extract from database carry out the inverse transformation decoding, compares with the checking fingerprint of input, thereby can export the checking result.

Claims (5)

1. based on details in fingerprint Information hiding and the restoration methods of orthogonal matrix and modular arithmetic, it is characterized in that: the directional information that detail characteristics of fingerprints information is divided into fingerprint minutiae location coordinate information and fingerprint minutiae; The fingerprint minutiae location coordinate information is protected by the conversion of orthogonal matrix at random that sub-key of password key generates, and the directional information of fingerprint minutiae adds computing protection by the mould of another sub-key of password key.
2. details in fingerprint Information hiding and restoration methods based on orthogonal matrix and modular arithmetic according to claim 1; it is characterized in that: the protection of fingerprint minutiae location coordinate information comprises that position information registration is hidden and the positional information checking recovers two steps, and described position information registration is hidden and comprised following substep:
S101: the user imports the secret password key k, with being cut into two sub-keys after the one-way function MD5 computing
Figure DEST_PATH_IMAGE001
S102: sub-key
Figure 154415DEST_PATH_IMAGE002
Generate independently random vector of linearity , use the Gram-Schmidt algorithm with random vector
Figure 602714DEST_PATH_IMAGE003
Conversion generates
Figure 382451DEST_PATH_IMAGE004
Orthogonal matrix , wherein,
Figure 184185DEST_PATH_IMAGE006
It is the predefined fingerprint minutiae maximum number of system; With the two-dimensional position coordinate
Figure DEST_PATH_IMAGE007
Be converted to one-dimensional linear coding, and with the 1st privacy key
Figure 529716DEST_PATH_IMAGE002
The maximization conversion Fill and be encoded to vector
Figure DEST_PATH_IMAGE009
Thereby with orthogonal matrix
Figure 25736DEST_PATH_IMAGE005
Do conversion, obtain the secret location coded message
Figure 224637DEST_PATH_IMAGE010
:
Figure DEST_PATH_IMAGE011
S103: storage secret location coded message in database
Figure 424674DEST_PATH_IMAGE010
Described positional information checking recovers to comprise following substep:
S104: S102 is identical with step, and the user imports privacy key k, with being cut into two sub-keys after the one-way function MD5 computing
Figure 418038DEST_PATH_IMAGE001
S105: S103 is identical with step, sub-key
Figure 172367DEST_PATH_IMAGE002
Generate independently random vector of linearity
Figure 315903DEST_PATH_IMAGE003
, use the Gram-Schmidt algorithm with random vector
Figure 839289DEST_PATH_IMAGE003
Conversion generates
Figure 269133DEST_PATH_IMAGE004
Orthogonal matrix
Figure 41917DEST_PATH_IMAGE005
, and calculate its inverse matrix
S106: from database, extract the secret location coded message
Figure 960511DEST_PATH_IMAGE010
, and with following formula calculation template:
S107: by positional information and the checking fingerprint matching of the above fingerprint template that extracts, thereby realize that checking recovers.
3. details in fingerprint Information hiding and restoration methods based on orthogonal matrix and modular arithmetic according to claim 1; it is characterized in that: the protection of described fingerprint minutiae directional information comprises that the directional information registration is hidden and the directional information checking recovers two steps, and described directional information registration is hidden and comprised following substep:
S201: the user imports the secret password key k, with being cut into two sub-keys after the one-way function MD5 computing
Figure 702202DEST_PATH_IMAGE001
S202: sub-key
Figure 431124DEST_PATH_IMAGE014
Generate independently random vector of linearity
Figure DEST_PATH_IMAGE015
, minutiae point directional information rule is turned between 0~359 degree, quantity is maximum fingerprint minutiae parameter, and uses sub-key
Figure 41097DEST_PATH_IMAGE014
Fill, obtain the minutiae point direction vector and be , all
Figure 310721DEST_PATH_IMAGE006
In the individual minutiae point direction, comprise
Figure DEST_PATH_IMAGE017
Individual true directions and
Figure 667884DEST_PATH_IMAGE018
Individual filling direction is with sub-key
Figure 550390DEST_PATH_IMAGE014
Random vector after the conversion
Figure 902874DEST_PATH_IMAGE015
Corresponding element do the computing that adds of mould 360, thereby obtain secret directional information
Figure DEST_PATH_IMAGE019
:
S203: the secret directional information of storage in database
Figure 814515DEST_PATH_IMAGE019
Described directional information checking recovers to comprise following substep:
S204: S201 is identical with step, and the user imports privacy key k, with being cut into two sub-keys after the one-way function MD5 computing
Figure 641657DEST_PATH_IMAGE001
S205: sub-key
Figure 114226DEST_PATH_IMAGE014
Generate independently random vector of linearity
Figure 227676DEST_PATH_IMAGE015
S206: from database, extract secret directional information , and with following formula calculation template:
Figure DEST_PATH_IMAGE021
S207: by directional information and the checking fingerprint matching of the above fingerprint template that extracts, thereby realize that checking recovers.
4. according to claim 2 or 3 described details in fingerprint Information hiding and restoration methods based on orthogonal matrix, it is characterized in that: import the secret password key the user Also comprise a fingerprint collecting analytical procedure: the fingerprint image that collects according to fingerprint capturer with the fingerprint characteristic extraction algorithm minutiae point information that takes the fingerprint, is expressed as before
Figure DEST_PATH_IMAGE023
, wherein, ,
Figure DEST_PATH_IMAGE025
Be horizontal ordinate, Be ordinate,
Figure DEST_PATH_IMAGE027
Be the direction value, thereby obtain the positional information of fingerprint minutiae
Figure 604430DEST_PATH_IMAGE007
And directional information
Figure 36024DEST_PATH_IMAGE027
5. according to claim 2 or 3 described details in fingerprint Information hiding and restoration methods based on orthogonal matrix; it is characterized in that: in fingerprint minutiae location coordinate information and the directional information protection process; after registration is hidden or checking recovers to finish; system can remove password, fingerprint image and the details in fingerprint dot information in the internal memory, preservation minutiae point location coordinate information and directional information behind the enciphering transformation only arranged.
CN201310179416.XA 2013-05-15 2013-05-15 Based on details in fingerprint Information hiding and the restoration methods of orthogonal matrix and modular arithmetic Expired - Fee Related CN103279697B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310179416.XA CN103279697B (en) 2013-05-15 2013-05-15 Based on details in fingerprint Information hiding and the restoration methods of orthogonal matrix and modular arithmetic

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310179416.XA CN103279697B (en) 2013-05-15 2013-05-15 Based on details in fingerprint Information hiding and the restoration methods of orthogonal matrix and modular arithmetic

Publications (2)

Publication Number Publication Date
CN103279697A true CN103279697A (en) 2013-09-04
CN103279697B CN103279697B (en) 2015-09-30

Family

ID=49062212

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310179416.XA Expired - Fee Related CN103279697B (en) 2013-05-15 2013-05-15 Based on details in fingerprint Information hiding and the restoration methods of orthogonal matrix and modular arithmetic

Country Status (1)

Country Link
CN (1) CN103279697B (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104009973A (en) * 2014-05-08 2014-08-27 电子科技大学 Fingerprint detail information hiding and recovering method based on set polynomial conversion and harmonics
CN106295365A (en) * 2016-08-12 2017-01-04 武汉大学 A kind of encrypting fingerprint template protection method and system based on orthogonal transformation
CN106788986A (en) * 2016-11-28 2017-05-31 上海交通大学 The encryption and decryption method and system of fingerprint template is expanded based on reference point
CN108475307A (en) * 2015-11-13 2018-08-31 徽章公司 Public/private key pair biological characteristic authentication system
CN109117646A (en) * 2018-07-13 2019-01-01 上海大学 A method of protection fingerprint minutiae template database privacy
CN109857780A (en) * 2019-01-17 2019-06-07 西北大学 A kind of linear-orthogonal data dissemination method for statistical query attack
CN110084224A (en) * 2019-05-08 2019-08-02 电子科技大学 Finger print safety Verification System and method on a kind of cloud
CN110365626A (en) * 2018-04-09 2019-10-22 厦门雅迅网络股份有限公司 The user in anticollision library logs in safety certifying method, terminal device and storage medium
CN110391899A (en) * 2018-04-20 2019-10-29 武汉真元生物数据有限公司 A kind of password generated method and system based on biological identification
CN110489989A (en) * 2019-08-27 2019-11-22 深圳市道通智能航空技术有限公司 Data encrypting/de-encrypling method, its encryption/deciphering chip and its unmanned plane
CN113591636A (en) * 2021-07-20 2021-11-02 中国电子科技集团公司第三十研究所 Fingerprint feature based revocable template protection technology design method

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101674299A (en) * 2009-10-16 2010-03-17 西安电子科技大学 Method for generating key based on amalgamation of multiple features in encryption area

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101674299A (en) * 2009-10-16 2010-03-17 西安电子科技大学 Method for generating key based on amalgamation of multiple features in encryption area

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
唐燕 等: "基于规范类正交矩阵的信息隐藏算法", 《东南大学学报》, vol. 43, no. 1, 31 January 2013 (2013-01-31), pages 45 - 49 *
李鹏 等: "生物特征模版保护", 《软件学报》, vol. 20, no. 6, 30 June 2009 (2009-06-30), pages 1553 - 1577 *

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104009973B (en) * 2014-05-08 2017-04-05 电子科技大学 It is a kind of based on set polynomial transformation with reconcile details in fingerprint Information hiding and restoration methods
CN104009973A (en) * 2014-05-08 2014-08-27 电子科技大学 Fingerprint detail information hiding and recovering method based on set polynomial conversion and harmonics
CN108475307A (en) * 2015-11-13 2018-08-31 徽章公司 Public/private key pair biological characteristic authentication system
CN106295365B (en) * 2016-08-12 2019-03-15 武汉大学 A kind of encrypting fingerprint template protection method and system based on orthogonal transformation
CN106295365A (en) * 2016-08-12 2017-01-04 武汉大学 A kind of encrypting fingerprint template protection method and system based on orthogonal transformation
CN106788986A (en) * 2016-11-28 2017-05-31 上海交通大学 The encryption and decryption method and system of fingerprint template is expanded based on reference point
CN110365626A (en) * 2018-04-09 2019-10-22 厦门雅迅网络股份有限公司 The user in anticollision library logs in safety certifying method, terminal device and storage medium
CN110365626B (en) * 2018-04-09 2022-12-06 厦门雅迅网络股份有限公司 User login security authentication method for anti-collision library, terminal equipment and storage medium
CN110391899B (en) * 2018-04-20 2022-04-29 武汉真元生物数据有限公司 Password generation method and system based on biological identification
CN110391899A (en) * 2018-04-20 2019-10-29 武汉真元生物数据有限公司 A kind of password generated method and system based on biological identification
CN109117646A (en) * 2018-07-13 2019-01-01 上海大学 A method of protection fingerprint minutiae template database privacy
CN109857780A (en) * 2019-01-17 2019-06-07 西北大学 A kind of linear-orthogonal data dissemination method for statistical query attack
CN109857780B (en) * 2019-01-17 2023-04-28 西北大学 Linear-orthogonal data publishing method for statistical query attack
CN110084224A (en) * 2019-05-08 2019-08-02 电子科技大学 Finger print safety Verification System and method on a kind of cloud
CN110084224B (en) * 2019-05-08 2022-08-05 电子科技大学 Cloud fingerprint security authentication system and method
CN110489989A (en) * 2019-08-27 2019-11-22 深圳市道通智能航空技术有限公司 Data encrypting/de-encrypling method, its encryption/deciphering chip and its unmanned plane
CN113591636A (en) * 2021-07-20 2021-11-02 中国电子科技集团公司第三十研究所 Fingerprint feature based revocable template protection technology design method

Also Published As

Publication number Publication date
CN103279697B (en) 2015-09-30

Similar Documents

Publication Publication Date Title
CN103279697B (en) Based on details in fingerprint Information hiding and the restoration methods of orthogonal matrix and modular arithmetic
Li et al. An alignment-free fingerprint cryptosystem based on fuzzy vault scheme
Lee et al. Cancelable fingerprint templates using minutiae-based bit-strings
Sutcu et al. Secure biometric templates from fingerprint-face features
Li et al. Attacks via record multiplicity on cancelable biometrics templates
CN101369892B (en) Method for reinforcing fingerprint Fuzzy Vault system security
CN108960039B (en) Irreversible fingerprint template encryption method based on symmetric hash
US20070118885A1 (en) Unique SNiP for use in secure data networking and identity management
CN102223233A (en) Biological code authentication system and biological code authentication method
CN104009973B (en) It is a kind of based on set polynomial transformation with reconcile details in fingerprint Information hiding and restoration methods
Selwal et al. Low overhead octet indexed template security scheme for multi-modal biometric system
Jacob et al. Biometric template security using DNA codec based transformation
Chen et al. A novel algorithm of fingerprint encryption using minutiae-based transformation
Moon et al. Improved cancelable fingerprint templates using minutiae‐based functional transform
Sood et al. Methods of automatic alignment of fingerprint in fuzzy vault: a review
Nandini et al. Efficient cryptographic key generation from fingerprint using symmetric hash functions
Shao et al. Template protection based on chaotic map for finger vein recognition
Belguechi et al. Enhancing the privacy of electronic passports
Liu et al. Is fuzzy vault scheme very effective for key binding in biometric cryptosystems?
Leng et al. Cancelable palmcode generated from randomized gabor filters for palmprint protection
EP3093793A1 (en) Fingerprint identification method and device using same
Yang et al. A fingerprint encryption scheme based on irreversible function and secure authentication
Xie et al. Research of biometric key generation based on fingerprint bit-strings
Zahed et al. A novel technique for enhancing security in biometric based authentication systems
Shi et al. Biomapping: privacy trustworthy biometrics using noninvertible and discriminable constructions

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20150930

Termination date: 20190515

CF01 Termination of patent right due to non-payment of annual fee