CN103279697B - Based on details in fingerprint Information hiding and the restoration methods of orthogonal matrix and modular arithmetic - Google Patents
Based on details in fingerprint Information hiding and the restoration methods of orthogonal matrix and modular arithmetic Download PDFInfo
- Publication number
- CN103279697B CN103279697B CN201310179416.XA CN201310179416A CN103279697B CN 103279697 B CN103279697 B CN 103279697B CN 201310179416 A CN201310179416 A CN 201310179416A CN 103279697 B CN103279697 B CN 103279697B
- Authority
- CN
- China
- Prior art keywords
- fingerprint
- information
- key
- sub
- minutiae
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Landscapes
- Collating Specific Patterns (AREA)
Abstract
The invention discloses a kind of details in fingerprint Information hiding based on orthogonal matrix and modular arithmetic and restoration methods.Detail characteristics of fingerprints information is divided into fingerprint minutiae location coordinate information and directional information by the method, use the stochastic transformation orthogonal matrix of a sub-key of password key, realize the matrix manipulation of password key and positional information, to protect fingerprint minutiae location coordinate information; And using another sub-key of password key, the mould realizing password key and directional information adds computing, to protect the directional information of fingerprint minutiae.Instant invention overcomes the attack that fingerprint template is very easily subject to internal system or outside, cause the defect that fingerprint characteristic lost efficacy.And utilize password key to be combined with fingerprint characteristic double authentication, improve the security of protected system and the privacy of fingerprint characteristic data.
Description
Technical field
The present invention relates to computer technology, network security technology, digital image processing techniques and technical field of data storage, particularly a kind of details in fingerprint Information hiding based on orthogonal matrix and modular arithmetic and restoration methods.
Background technology
Off-line or on-line system, for guaranteeing data security, need the identity accurately knowing system user.Current more safe and reliable identity authorization system is mainly based on token (such as ID (identity number) card) or knowledge (such as password or PIN code).The critical defect of token is easy loss, forgery and carry inconvenience; Knowledge (such as password) is then easily forgotten, obscure and be very easily subject to the attack of social engineering.These problems cause cannot distinguishing real validated user owner and counterfeiter based on the identity authorization system of token or knowledge.Once counterfeiter knows password or ID (identity number) card, just have the access rights that validated user is equal.Thus, the identity recognizing technology based on biological characteristic obtains investigation and application widely.
Biological characteristic has to be carried with, without the need to memory, the advantage such as easy to use, the more important thing is to have resisting denying characteristic.This makes biological characteristic become a kind of strong individual authentication form, overcomes the unfavorable factor based on token and knowledge certification to a certain extent.But biometric technology seems very fragile to some conventional attacks, such as, Replay Attack, man-in-the-middle attack, Trojan attack, spoofing attack (Spoof attacks) and template attack etc.
On the other hand, the protection problem of the privacy of biological characteristic is also very important.Such as, lawless person probably steals, sells or the privacy information (such as personal income and medical information) of sharing users.For improving security of system; security system always wishes to obtain user's personal information as far as possible in detail; but user does not but wish that the personal information of oneself is exposed to assailant because of the safety defect of system, therefore just there is a contradiction in security and privacy protecting.In general, the privacy of individual is mainly subject to the threat of following two aspects:
(1) biological characteristic is the physical trait of user, belongs to individual privacy, if the biological characteristic of individual is disclosed, then it is unfavorable to bring to personal lifestyle.Such as, others can judge according to your fingerprint your whereabouts your biological characteristic (such as fingerprint) even can be utilized to go crime.
(2) in living creature characteristic recognition system, often needing to register personal information associated with it, the age of such as individual, wed no, identification card number, SSN (social security number) etc., there is the risk utilized by lawless person in these;
Therefore, for solving security and the privacy problem of biological characteristic, the template safety protecting biological characteristic is focused on.The most typical solution is organically blent key and template, makes neither easily under attack, thus reach the object of protection living creature characteristic recognition system security.
Biometric templates resist technology totally comes to be divided into following several:
(1) biological characteristic hash method (biohashing), uses the double factor identity identifying method that fingerprint and random number combine.But the fixed length feature of the high distinction that algorithm requires realizes very difficult in fingerprint.
(2) template deformation method, geometric transformation details in fingerprint point template being carried out doubling along the determined straight line of singular point that fingerprint image is determined that such as Ang etc. propose, thus realize deformable templates.For another example Ratha etc. propose by fingerprint minutiae set from luv space, transform to other space through one-way function, thus carry out minutiae point comparison at transformation space.The recognition performance of above method declines all to some extent.
(3) based on the method for key bindings or generation; The method is also biological feature encryption (Biometric Encryption).Its fundamental purpose is to utilize biological feature encryption and protects secret data, improves the security of system and the privacy of user profile.But its main difficulty is the changeability of biometric image, this instability just, makes enciphering/deciphering process be fuzzy (Fuzzy).Such as, fingerprint image can change along with the dust on pressure, temperature, humidity, sweat mark, grease, wound and surface etc.It is very difficult that this changeability makes biological feature encryption system deal with, and must allow that the biological characteristic of same person changes secret value of decoding, but can not allow that any secret information is revealed in the biological characteristic decoding of another one people.
Biometric templates resist technology has very large potentiality and advantage, can meet the advanced requirement that commercial undertaking, enterprise or NGO etc. are verified individual identity.But, want to accomplish that checking is more accurate, biological characteristic system is more credible, also have a lot of work to do.Such as, the existing scheme improving biometric templates protection is further needed.Therefore, how to improve the security of biometric templates, the problem that domestic and international scientific research and company researcher need emphasis to think deeply.
Summary of the invention
The object of the invention is to overcome the attack that prior art fingerprint template is very easily subject to internal system or outside, thus the deficiency causing fingerprint characteristic to lose efficacy, provide a kind of utilize the combination of password key and fingerprint characteristic double authentication to solve fingerprint template privacy and the details in fingerprint Information hiding based on orthogonal matrix and modular arithmetic of safety issue and restoration methods.
The object of the invention is to be achieved through the following technical solutions: based on details in fingerprint Information hiding and the restoration methods of orthogonal matrix and modular arithmetic, detail characteristics of fingerprints information is divided into the directional information of fingerprint minutiae location coordinate information and fingerprint minutiae; Fingerprint minutiae location coordinate information is protected by the random orthogonal matrixing of a sub-secret generating of password key, and the directional information of fingerprint minutiae is added computing to protect by the mould of another sub-key of password key.
The protection of fingerprint minutiae location coordinate information comprises position information registration and to hide and location information verification recovers two steps, and described position information registration is hidden and comprised following sub-step:
S101: user inputs secret password key
k, be cut into two sub-keys with after one-way function MD5 computing
;
S102: sub-key
generate the random vector of Line independent
, with Gram-Schmidt algorithm by random vector
conversion generates
orthogonal matrix
, wherein,
it is the predefined fingerprint minutiae maximum number of system; By two-dimensional position coordinate
be converted to one-dimensional linear coding, and with the 1st privacy key
maximization conversion
fill and be encoded to vector
; Thus and orthogonal matrix
convert, obtain secret location coded message
:
;
S103: store secret location coded message in a database
;
Described location information verification recovers to comprise following sub-step:
S104: identical with step S102, user inputs privacy key
k, be cut into two sub-keys with after one-way function MD5 computing
;
S105: identical with step S103, sub-key
generate the random vector of Line independent
, with Gram-Schmidt algorithm by random vector
conversion generates
orthogonal matrix
, and calculate its inverse matrix
;
S106: extract secret location coded message from database
, and by following formulae discovery template:
;
S107: by positional information and the checking fingerprint matching of the fingerprint template extracted above, thus realize checking recovery.
The protection of described fingerprint minutiae directional information comprises directional information registration and hides and directional information checking recovery two steps, and described directional information registration is hidden and comprised following sub-step:
S201: user inputs secret password key
k, be cut into two sub-keys with after one-way function MD5 computing
;
S202: sub-key
generate the random vector of Line independent
, turned to by Minutiae Direction rule information between 0 ~ 359 degree, quantity is maximum fingerprint minutiae parameter, and uses sub-key
fill, obtaining Minutiae Direction vector is
, all
in individual Minutiae Direction, comprise
individual true directions and
individual filling direction, with sub-key
random vector after conversion
corresponding element do mould 360 add computing, thus obtain secret directional information
:
;
S203: store secret directional information in a database
;
Described directional information checking recovery comprises following sub-step:
S204: identical with step S201, user inputs privacy key
k, be cut into two sub-keys with after one-way function MD5 computing
;
S205: sub-key
generate the random vector of Line independent
;
S206: extract secret directional information from database
, and by following formulae discovery template:
;
S207: by directional information and the checking fingerprint matching of the fingerprint template extracted above, thus realize checking recovery.
Secret password key is inputted user
also comprise a fingerprint collecting analytical procedure: the fingerprint image collected according to fingerprint capturer before, to take the fingerprint minutiae point information with Finger print characteristic abstract algorithm, be expressed as
, wherein,
,
horizontal ordinate,
ordinate,
be direction value, thus obtain the positional information of fingerprint minutiae
and directional information
.
In fingerprint minutiae location coordinate information and directional information protection process; register after hiding or verify that recovery completes; system can remove password, fingerprint image and details in fingerprint dot information in internal memory; that preserves only has the minutiae point location coordinate information after enciphering transformation and directional information, improves the privacy of user fingerprints information and the security of protected system.
The invention has the beneficial effects as follows:
1, use the stochastic transformation orthogonal matrix of the sub-key of password key, realize the transform operation of the positional information of password key and fingerprint minutiae; And using another sub-key of password key, the mould realizing password key and fingerprint minutiae directional information adds computing, provides double authentication to shielded system, improves the security of protected system;
If 2 do not know password key, it is very difficult that the template after conversion brings acquisition primary template data by inversion, improves the privacy of fingerprint characteristic data;
If the template after 3 conversion is lost or is subject to security threat, reconfigurable new password key, obtain new conversion template, and without the need to abandoning raw biometric;
The authentication performance of the fingerprint template 4, after conversion does not have any decline, therefore, can be widely used in the protection of fingerprint characteristic.
Accompanying drawing explanation
Fig. 1 is basic thought process flow diagram of the present invention;
Fig. 2 is that details in fingerprint information registering of the present invention hides process flow diagram;
Fig. 3 is that details in fingerprint Information Authentication of the present invention recovers process flow diagram;
Fig. 4 is processed offline schematic diagram of the present invention.
Embodiment
Further illustrate technical scheme of the present invention below in conjunction with accompanying drawing, but the content that the present invention protects is not limited to the following stated.
As shown in Figure 1; based on details in fingerprint Information hiding and the restoration methods of orthogonal matrix and modular arithmetic; detail characteristics of fingerprints information is divided into the directional information of fingerprint minutiae location coordinate information and fingerprint minutiae; fingerprint minutiae location coordinate information is protected by the random orthogonal matrixing of a sub-secret generating of password key, and the directional information of fingerprint minutiae is added computing to protect by the mould of another sub-key of password key.
As shown in Figures 2 and 3, the protection of fingerprint minutiae location coordinate information comprises position information registration and to hide and location information verification recovers two steps, and described registration is hidden and comprised following sub-step:
S101: user inputs secret password key
k, be cut into two sub-keys with after one-way function MD5 computing
;
S102: sub-key
generate the random vector of Line independent
, with Gram-Schmidt algorithm by random vector
conversion generates
orthogonal matrix
, wherein,
it is the predefined fingerprint minutiae maximum number of system; By two-dimensional position coordinate
be converted to one-dimensional linear coding, and with the 1st privacy key
maximization conversion
fill and be encoded to vector
; Thus and orthogonal matrix
convert, obtain secret location coded message
:
;
S103: store secret location coded message in a database
;
Described location information verification recovers to comprise following sub-step:
S104: identical with step S102, user inputs secret password key
k, be cut into two sub-keys with after one-way function MD5 computing
;
S105: identical with step S103, sub-key
generate the random vector of Line independent
, with Gram-Schmidt algorithm by random vector
conversion generates
orthogonal matrix
, and calculate its inverse matrix
;
S106: extract secret location coded message from database
, and by following formulae discovery template:
;
S107: by positional information and the checking fingerprint matching of the fingerprint template extracted above, thus realize checking recovery.
As shown in Figures 2 and 3, the protection of fingerprint minutiae directional information comprises directional information registration and hides and directional information checking recovery two steps, and described directional information registration is hidden and comprised following sub-step:
S201: user inputs secret password key
k, be cut into two sub-keys with after one-way function MD5 computing
;
S202: sub-key
generate the random vector of Line independent
, be between 0 ~ 359 degree by Minutiae Direction information planning, quantity is maximum fingerprint minutiae parameter, and uses sub-key
fill, obtaining Minutiae Direction vector is
, all
in individual Minutiae Direction, comprise
individual true directions and
individual filling direction, with sub-key
random vector after conversion
corresponding element do mould 360 add computing, thus obtain secret directional information
:
;
S203: store secret directional information in a database
;
Described directional information checking recovery comprises following sub-step:
S204: identical with step S201, user inputs privacy key
k, be cut into two sub-keys with after one-way function MD5 computing
;
S205: sub-key
generate the random vector of Line independent
;
S206: extract secret directional information from database
, and by following formulae discovery template:
;
S207: by directional information and the checking fingerprint matching of the fingerprint template extracted above, thus realize checking recovery.
Secret password key is inputted user
also comprise a fingerprint collecting analytical procedure: the fingerprint image collected according to fingerprint capturer before, to take the fingerprint minutiae point information with Finger print characteristic abstract algorithm, be expressed as
, wherein,
,
horizontal ordinate,
ordinate,
be direction value, thus obtain the positional information of fingerprint minutiae
and directional information
.
In fingerprint minutiae location coordinate information and directional information protection process; register after hiding or verify that recovery completes; system can remove password, fingerprint image and details in fingerprint dot information in internal memory; that preserves only has the minutiae point location coordinate information after enciphering transformation and directional information, improves the privacy of user fingerprints information and the security of protected system.
As shown in Figure 4, off-line process, input PIN password, and by fingerprint instrument scanning collection information in fingerprint, to take the fingerprint minutiae point information with Finger print characteristic abstract algorithm; Again according to the sub-key of password generated, generating orthogonal matrix and encryption vector feature, generate security template after minutiae point being carried out conversion protection, thus can permanent storage.The online verification stage needs according to application system prompting, and input validation PIN password, after the security template extracted from database is carried out inverse transformation decoding, is compared with the checking fingerprint of input, thus can be exported the result.
Claims (5)
1., based on details in fingerprint Information hiding and the restoration methods of orthogonal matrix and modular arithmetic, it is characterized in that: directional information detail characteristics of fingerprints information being divided into fingerprint minutiae location coordinate information and fingerprint minutiae; Fingerprint minutiae location coordinate information is protected by the random orthogonal matrixing of a sub-secret generating of password key, and the directional information of fingerprint minutiae is added computing to protect by the mould of the random vector of the Line independent of the generation of another sub-key of password key.
2. the details in fingerprint Information hiding based on orthogonal matrix and modular arithmetic according to claim 1 and restoration methods; it is characterized in that: the protection of fingerprint minutiae location coordinate information comprises position information registration and to hide and location information verification recovers two steps, and described position information registration is hidden and comprised following sub-step:
S101: user inputs secret password key k, is cut into two sub-key (k with after one-way function MD5 computing
1, k
2);
S102: sub-key k
1generate the random vector v of Line independent
1, with Gram-Schmidt algorithm by random vector v
1conversion generates the orthogonal matrix M of nxn, and wherein, n is the predefined fingerprint minutiae maximum number of system; By two-dimensional position coordinate (x
i, y
i) be converted to one-dimensional linear coding, and with the 1st privacy key k
1maximization conversion max{c+1, k
1fill and be encoded to vector v
loc; Thus convert with orthogonal matrix M, obtain secret location coded message v
sec: v
sec=M*v
loc;
S103: store secret location coded message v in a database
sec;
Described location information verification recovers to comprise following sub-step:
S104: identical with step S102, user inputs privacy key k, is cut into two sub-key (k with after one-way function MD5 computing
1, k
2);
S105: identical with step S103, sub-key k
1generate the random vector v of Line independent
1, with Gram-Schmidt algorithm by random vector v
1conversion generates the orthogonal matrix M of nxn, and calculates its inverse matrix M
-1;
S106: extract secret location coded message v from database
sec, and with following formulae discovery template: v
loc=M
-1* v
sec;
S107: by positional information and the checking fingerprint matching of the fingerprint template extracted above, thus realize checking recovery.
3. the details in fingerprint Information hiding based on orthogonal matrix and modular arithmetic according to claim 1 and restoration methods; it is characterized in that: the protection of described fingerprint minutiae directional information comprises directional information registration and hides and directional information checking recovery two steps, and described directional information registration is hidden and comprised following sub-step:
S201: user inputs secret password key k, is cut into two sub-key (k with after one-way function MD5 computing
1, k
2);
S202: sub-key k
2generate the random vector v of Line independent
2, turned to by Minutiae Direction rule information between 0 ~ 359 degree, quantity is maximum fingerprint minutiae parameter, and uses sub-key k
2fill, obtaining Minutiae Direction vector is o
β, in all n Minutiae Direction, comprise c true directions and n-c filling direction, with sub-key k
2random vector v after conversion
2corresponding element do mould 360 add computing, thus obtain secret directional information o
sec: o
sec=(o
β+ v
2) mod360;
S203: store secret directional information o in a database
sec;
Described directional information checking recovery comprises following sub-step:
S204: identical with step S201, user inputs privacy key k, is cut into two sub-key (k with after one-way function MD5 computing
1, k
2);
S205: sub-key k
2generate the random vector v of Line independent
2;
S206: extract secret directional information o from database
sec, and with following formulae discovery template: o
β=(o
sec-v
2) mod360;
S207: by directional information and the checking fingerprint matching of the fingerprint template extracted above, thus realize checking recovery.
4. the details in fingerprint Information hiding based on orthogonal matrix and modular arithmetic according to Claims 2 or 3 and restoration methods, it is characterized in that: before user inputs secret password key k, also comprise a fingerprint collecting analytical procedure: the fingerprint image collected according to fingerprint capturer, to take the fingerprint minutiae point information with Finger print characteristic abstract algorithm, be expressed as S
m={ m
1, m
2..., m
c, wherein, m
i=(x
i, y
i, β
i), x
ihorizontal ordinate, y
iordinate, β
ibe direction value, thus obtain the positional information (x of fingerprint minutiae
i, y
i) and directional information β
i.
5. the details in fingerprint Information hiding based on orthogonal matrix and modular arithmetic according to Claims 2 or 3 and restoration methods; it is characterized in that: in fingerprint minutiae location coordinate information and directional information protection process; register after hiding or verify that recovery completes; system can remove password, fingerprint image and details in fingerprint dot information in internal memory, preservation only have the minutiae point location coordinate information after enciphering transformation and directional information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310179416.XA CN103279697B (en) | 2013-05-15 | 2013-05-15 | Based on details in fingerprint Information hiding and the restoration methods of orthogonal matrix and modular arithmetic |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310179416.XA CN103279697B (en) | 2013-05-15 | 2013-05-15 | Based on details in fingerprint Information hiding and the restoration methods of orthogonal matrix and modular arithmetic |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103279697A CN103279697A (en) | 2013-09-04 |
CN103279697B true CN103279697B (en) | 2015-09-30 |
Family
ID=49062212
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310179416.XA Expired - Fee Related CN103279697B (en) | 2013-05-15 | 2013-05-15 | Based on details in fingerprint Information hiding and the restoration methods of orthogonal matrix and modular arithmetic |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103279697B (en) |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104009973B (en) * | 2014-05-08 | 2017-04-05 | 电子科技大学 | It is a kind of based on set polynomial transformation with reconcile details in fingerprint Information hiding and restoration methods |
CA3191915A1 (en) * | 2015-11-13 | 2017-05-18 | Badge Inc. | Public/private key biometric authentication system |
CN106295365B (en) * | 2016-08-12 | 2019-03-15 | 武汉大学 | A kind of encrypting fingerprint template protection method and system based on orthogonal transformation |
CN106788986B (en) * | 2016-11-28 | 2019-11-08 | 上海交通大学 | The encryption and decryption method and system of fingerprint template is expanded based on reference point |
CN110365626B (en) * | 2018-04-09 | 2022-12-06 | 厦门雅迅网络股份有限公司 | User login security authentication method for anti-collision library, terminal equipment and storage medium |
CN110391899B (en) * | 2018-04-20 | 2022-04-29 | 武汉真元生物数据有限公司 | Password generation method and system based on biological identification |
CN109117646A (en) * | 2018-07-13 | 2019-01-01 | 上海大学 | A method of protection fingerprint minutiae template database privacy |
CN109857780B (en) * | 2019-01-17 | 2023-04-28 | 西北大学 | Linear-orthogonal data publishing method for statistical query attack |
CN110084224B (en) * | 2019-05-08 | 2022-08-05 | 电子科技大学 | Cloud fingerprint security authentication system and method |
CN110489989A (en) * | 2019-08-27 | 2019-11-22 | 深圳市道通智能航空技术有限公司 | Data encrypting/de-encrypling method, its encryption/deciphering chip and its unmanned plane |
CN113591636B (en) * | 2021-07-20 | 2023-04-07 | 中国电子科技集团公司第三十研究所 | Fingerprint feature-based revocable template protection technology design method |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101674299A (en) * | 2009-10-16 | 2010-03-17 | 西安电子科技大学 | Method for generating key based on amalgamation of multiple features in encryption area |
-
2013
- 2013-05-15 CN CN201310179416.XA patent/CN103279697B/en not_active Expired - Fee Related
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101674299A (en) * | 2009-10-16 | 2010-03-17 | 西安电子科技大学 | Method for generating key based on amalgamation of multiple features in encryption area |
Non-Patent Citations (2)
Title |
---|
基于规范类正交矩阵的信息隐藏算法;唐燕 等;《东南大学学报》;20130131;第43卷(第1期);第45-49页 * |
生物特征模版保护;李鹏 等;《软件学报》;20090630;第20卷(第6期);第1553-1577页 * |
Also Published As
Publication number | Publication date |
---|---|
CN103279697A (en) | 2013-09-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103279697B (en) | Based on details in fingerprint Information hiding and the restoration methods of orthogonal matrix and modular arithmetic | |
Campisi | Security and privacy in biometrics: towards a holistic approach | |
Lee et al. | Cancelable fingerprint templates using minutiae-based bit-strings | |
Mariño et al. | A crypto-biometric scheme based on iris-templates with fuzzy extractors | |
Li et al. | Attacks via record multiplicity on cancelable biometrics templates | |
CN101369892B (en) | Method for reinforcing fingerprint Fuzzy Vault system security | |
Abd Razak et al. | Data anonymization using pseudonym system to preserve data privacy | |
US20070118885A1 (en) | Unique SNiP for use in secure data networking and identity management | |
WO2012097362A2 (en) | Protecting codes, keys and user credentials with identity and patterns | |
CN108960039A (en) | A kind of irreversible fingerprint template encryption method based on symmetrical hash | |
CN104009973B (en) | It is a kind of based on set polynomial transformation with reconcile details in fingerprint Information hiding and restoration methods | |
CN106951865B (en) | Privacy protection biological identification method based on Hamming distance | |
Jacob et al. | Biometric template security using DNA codec based transformation | |
Chen et al. | A novel algorithm of fingerprint encryption using minutiae-based transformation | |
Moon et al. | Improved cancelable fingerprint templates using minutiae‐based functional transform | |
Sood et al. | Methods of automatic alignment of fingerprint in fuzzy vault: a review | |
Nandini et al. | Efficient cryptographic key generation from fingerprint using symmetric hash functions | |
Belguechi et al. | Enhancing the privacy of electronic passports | |
Wang et al. | Joint Biological ID: A Secure and Efficient Lightweight Biometric Authentication Scheme | |
Han | Fingerprint Authentication Schemes for Mobile Devices | |
Chen et al. | A hybrid scheme for securing fingerprint templates | |
Zhu et al. | A performance-optimization method for reusable fuzzy extractor based on block error distribution of iris trait | |
Xie et al. | Research of biometric key generation based on fingerprint bit-strings | |
Shi et al. | Biomapping: privacy trustworthy biometrics using noninvertible and discriminable constructions | |
Selvarani et al. | To enhance the data security in cloud computing using multimodal biometric system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20150930 Termination date: 20190515 |