CN103279697B - Based on details in fingerprint Information hiding and the restoration methods of orthogonal matrix and modular arithmetic - Google Patents

Based on details in fingerprint Information hiding and the restoration methods of orthogonal matrix and modular arithmetic Download PDF

Info

Publication number
CN103279697B
CN103279697B CN201310179416.XA CN201310179416A CN103279697B CN 103279697 B CN103279697 B CN 103279697B CN 201310179416 A CN201310179416 A CN 201310179416A CN 103279697 B CN103279697 B CN 103279697B
Authority
CN
China
Prior art keywords
fingerprint
information
key
sub
minutiae
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201310179416.XA
Other languages
Chinese (zh)
Other versions
CN103279697A (en
Inventor
付波
林劼
郝玉洁
蔡媛媛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Electronic Science and Technology of China
Original Assignee
University of Electronic Science and Technology of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Electronic Science and Technology of China filed Critical University of Electronic Science and Technology of China
Priority to CN201310179416.XA priority Critical patent/CN103279697B/en
Publication of CN103279697A publication Critical patent/CN103279697A/en
Application granted granted Critical
Publication of CN103279697B publication Critical patent/CN103279697B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Collating Specific Patterns (AREA)

Abstract

The invention discloses a kind of details in fingerprint Information hiding based on orthogonal matrix and modular arithmetic and restoration methods.Detail characteristics of fingerprints information is divided into fingerprint minutiae location coordinate information and directional information by the method, use the stochastic transformation orthogonal matrix of a sub-key of password key, realize the matrix manipulation of password key and positional information, to protect fingerprint minutiae location coordinate information; And using another sub-key of password key, the mould realizing password key and directional information adds computing, to protect the directional information of fingerprint minutiae.Instant invention overcomes the attack that fingerprint template is very easily subject to internal system or outside, cause the defect that fingerprint characteristic lost efficacy.And utilize password key to be combined with fingerprint characteristic double authentication, improve the security of protected system and the privacy of fingerprint characteristic data.

Description

Based on details in fingerprint Information hiding and the restoration methods of orthogonal matrix and modular arithmetic
Technical field
The present invention relates to computer technology, network security technology, digital image processing techniques and technical field of data storage, particularly a kind of details in fingerprint Information hiding based on orthogonal matrix and modular arithmetic and restoration methods.
Background technology
Off-line or on-line system, for guaranteeing data security, need the identity accurately knowing system user.Current more safe and reliable identity authorization system is mainly based on token (such as ID (identity number) card) or knowledge (such as password or PIN code).The critical defect of token is easy loss, forgery and carry inconvenience; Knowledge (such as password) is then easily forgotten, obscure and be very easily subject to the attack of social engineering.These problems cause cannot distinguishing real validated user owner and counterfeiter based on the identity authorization system of token or knowledge.Once counterfeiter knows password or ID (identity number) card, just have the access rights that validated user is equal.Thus, the identity recognizing technology based on biological characteristic obtains investigation and application widely.
Biological characteristic has to be carried with, without the need to memory, the advantage such as easy to use, the more important thing is to have resisting denying characteristic.This makes biological characteristic become a kind of strong individual authentication form, overcomes the unfavorable factor based on token and knowledge certification to a certain extent.But biometric technology seems very fragile to some conventional attacks, such as, Replay Attack, man-in-the-middle attack, Trojan attack, spoofing attack (Spoof attacks) and template attack etc.
On the other hand, the protection problem of the privacy of biological characteristic is also very important.Such as, lawless person probably steals, sells or the privacy information (such as personal income and medical information) of sharing users.For improving security of system; security system always wishes to obtain user's personal information as far as possible in detail; but user does not but wish that the personal information of oneself is exposed to assailant because of the safety defect of system, therefore just there is a contradiction in security and privacy protecting.In general, the privacy of individual is mainly subject to the threat of following two aspects:
(1) biological characteristic is the physical trait of user, belongs to individual privacy, if the biological characteristic of individual is disclosed, then it is unfavorable to bring to personal lifestyle.Such as, others can judge according to your fingerprint your whereabouts your biological characteristic (such as fingerprint) even can be utilized to go crime.
(2) in living creature characteristic recognition system, often needing to register personal information associated with it, the age of such as individual, wed no, identification card number, SSN (social security number) etc., there is the risk utilized by lawless person in these;
Therefore, for solving security and the privacy problem of biological characteristic, the template safety protecting biological characteristic is focused on.The most typical solution is organically blent key and template, makes neither easily under attack, thus reach the object of protection living creature characteristic recognition system security.
Biometric templates resist technology totally comes to be divided into following several:
(1) biological characteristic hash method (biohashing), uses the double factor identity identifying method that fingerprint and random number combine.But the fixed length feature of the high distinction that algorithm requires realizes very difficult in fingerprint.
(2) template deformation method, geometric transformation details in fingerprint point template being carried out doubling along the determined straight line of singular point that fingerprint image is determined that such as Ang etc. propose, thus realize deformable templates.For another example Ratha etc. propose by fingerprint minutiae set from luv space, transform to other space through one-way function, thus carry out minutiae point comparison at transformation space.The recognition performance of above method declines all to some extent.
(3) based on the method for key bindings or generation; The method is also biological feature encryption (Biometric Encryption).Its fundamental purpose is to utilize biological feature encryption and protects secret data, improves the security of system and the privacy of user profile.But its main difficulty is the changeability of biometric image, this instability just, makes enciphering/deciphering process be fuzzy (Fuzzy).Such as, fingerprint image can change along with the dust on pressure, temperature, humidity, sweat mark, grease, wound and surface etc.It is very difficult that this changeability makes biological feature encryption system deal with, and must allow that the biological characteristic of same person changes secret value of decoding, but can not allow that any secret information is revealed in the biological characteristic decoding of another one people.
Biometric templates resist technology has very large potentiality and advantage, can meet the advanced requirement that commercial undertaking, enterprise or NGO etc. are verified individual identity.But, want to accomplish that checking is more accurate, biological characteristic system is more credible, also have a lot of work to do.Such as, the existing scheme improving biometric templates protection is further needed.Therefore, how to improve the security of biometric templates, the problem that domestic and international scientific research and company researcher need emphasis to think deeply.
Summary of the invention
The object of the invention is to overcome the attack that prior art fingerprint template is very easily subject to internal system or outside, thus the deficiency causing fingerprint characteristic to lose efficacy, provide a kind of utilize the combination of password key and fingerprint characteristic double authentication to solve fingerprint template privacy and the details in fingerprint Information hiding based on orthogonal matrix and modular arithmetic of safety issue and restoration methods.
The object of the invention is to be achieved through the following technical solutions: based on details in fingerprint Information hiding and the restoration methods of orthogonal matrix and modular arithmetic, detail characteristics of fingerprints information is divided into the directional information of fingerprint minutiae location coordinate information and fingerprint minutiae; Fingerprint minutiae location coordinate information is protected by the random orthogonal matrixing of a sub-secret generating of password key, and the directional information of fingerprint minutiae is added computing to protect by the mould of another sub-key of password key.
The protection of fingerprint minutiae location coordinate information comprises position information registration and to hide and location information verification recovers two steps, and described position information registration is hidden and comprised following sub-step:
S101: user inputs secret password key k, be cut into two sub-keys with after one-way function MD5 computing ;
S102: sub-key generate the random vector of Line independent , with Gram-Schmidt algorithm by random vector conversion generates orthogonal matrix , wherein, it is the predefined fingerprint minutiae maximum number of system; By two-dimensional position coordinate be converted to one-dimensional linear coding, and with the 1st privacy key maximization conversion fill and be encoded to vector ; Thus and orthogonal matrix convert, obtain secret location coded message : ;
S103: store secret location coded message in a database ;
Described location information verification recovers to comprise following sub-step:
S104: identical with step S102, user inputs privacy key k, be cut into two sub-keys with after one-way function MD5 computing ;
S105: identical with step S103, sub-key generate the random vector of Line independent , with Gram-Schmidt algorithm by random vector conversion generates orthogonal matrix , and calculate its inverse matrix ;
S106: extract secret location coded message from database , and by following formulae discovery template: ;
S107: by positional information and the checking fingerprint matching of the fingerprint template extracted above, thus realize checking recovery.
The protection of described fingerprint minutiae directional information comprises directional information registration and hides and directional information checking recovery two steps, and described directional information registration is hidden and comprised following sub-step:
S201: user inputs secret password key k, be cut into two sub-keys with after one-way function MD5 computing ;
S202: sub-key generate the random vector of Line independent , turned to by Minutiae Direction rule information between 0 ~ 359 degree, quantity is maximum fingerprint minutiae parameter, and uses sub-key fill, obtaining Minutiae Direction vector is , all in individual Minutiae Direction, comprise individual true directions and individual filling direction, with sub-key random vector after conversion corresponding element do mould 360 add computing, thus obtain secret directional information : ;
S203: store secret directional information in a database ;
Described directional information checking recovery comprises following sub-step:
S204: identical with step S201, user inputs privacy key k, be cut into two sub-keys with after one-way function MD5 computing ;
S205: sub-key generate the random vector of Line independent ;
S206: extract secret directional information from database , and by following formulae discovery template: ;
S207: by directional information and the checking fingerprint matching of the fingerprint template extracted above, thus realize checking recovery.
Secret password key is inputted user also comprise a fingerprint collecting analytical procedure: the fingerprint image collected according to fingerprint capturer before, to take the fingerprint minutiae point information with Finger print characteristic abstract algorithm, be expressed as , wherein, , horizontal ordinate, ordinate, be direction value, thus obtain the positional information of fingerprint minutiae and directional information .
In fingerprint minutiae location coordinate information and directional information protection process; register after hiding or verify that recovery completes; system can remove password, fingerprint image and details in fingerprint dot information in internal memory; that preserves only has the minutiae point location coordinate information after enciphering transformation and directional information, improves the privacy of user fingerprints information and the security of protected system.
The invention has the beneficial effects as follows:
1, use the stochastic transformation orthogonal matrix of the sub-key of password key, realize the transform operation of the positional information of password key and fingerprint minutiae; And using another sub-key of password key, the mould realizing password key and fingerprint minutiae directional information adds computing, provides double authentication to shielded system, improves the security of protected system;
If 2 do not know password key, it is very difficult that the template after conversion brings acquisition primary template data by inversion, improves the privacy of fingerprint characteristic data;
If the template after 3 conversion is lost or is subject to security threat, reconfigurable new password key, obtain new conversion template, and without the need to abandoning raw biometric;
The authentication performance of the fingerprint template 4, after conversion does not have any decline, therefore, can be widely used in the protection of fingerprint characteristic.
Accompanying drawing explanation
Fig. 1 is basic thought process flow diagram of the present invention;
Fig. 2 is that details in fingerprint information registering of the present invention hides process flow diagram;
Fig. 3 is that details in fingerprint Information Authentication of the present invention recovers process flow diagram;
Fig. 4 is processed offline schematic diagram of the present invention.
Embodiment
Further illustrate technical scheme of the present invention below in conjunction with accompanying drawing, but the content that the present invention protects is not limited to the following stated.
As shown in Figure 1; based on details in fingerprint Information hiding and the restoration methods of orthogonal matrix and modular arithmetic; detail characteristics of fingerprints information is divided into the directional information of fingerprint minutiae location coordinate information and fingerprint minutiae; fingerprint minutiae location coordinate information is protected by the random orthogonal matrixing of a sub-secret generating of password key, and the directional information of fingerprint minutiae is added computing to protect by the mould of another sub-key of password key.
As shown in Figures 2 and 3, the protection of fingerprint minutiae location coordinate information comprises position information registration and to hide and location information verification recovers two steps, and described registration is hidden and comprised following sub-step:
S101: user inputs secret password key k, be cut into two sub-keys with after one-way function MD5 computing ;
S102: sub-key generate the random vector of Line independent , with Gram-Schmidt algorithm by random vector conversion generates orthogonal matrix , wherein, it is the predefined fingerprint minutiae maximum number of system; By two-dimensional position coordinate be converted to one-dimensional linear coding, and with the 1st privacy key maximization conversion fill and be encoded to vector ; Thus and orthogonal matrix convert, obtain secret location coded message : ;
S103: store secret location coded message in a database ;
Described location information verification recovers to comprise following sub-step:
S104: identical with step S102, user inputs secret password key k, be cut into two sub-keys with after one-way function MD5 computing ;
S105: identical with step S103, sub-key generate the random vector of Line independent , with Gram-Schmidt algorithm by random vector conversion generates orthogonal matrix , and calculate its inverse matrix ;
S106: extract secret location coded message from database , and by following formulae discovery template: ;
S107: by positional information and the checking fingerprint matching of the fingerprint template extracted above, thus realize checking recovery.
As shown in Figures 2 and 3, the protection of fingerprint minutiae directional information comprises directional information registration and hides and directional information checking recovery two steps, and described directional information registration is hidden and comprised following sub-step:
S201: user inputs secret password key k, be cut into two sub-keys with after one-way function MD5 computing ;
S202: sub-key generate the random vector of Line independent , be between 0 ~ 359 degree by Minutiae Direction information planning, quantity is maximum fingerprint minutiae parameter, and uses sub-key fill, obtaining Minutiae Direction vector is , all in individual Minutiae Direction, comprise individual true directions and individual filling direction, with sub-key random vector after conversion corresponding element do mould 360 add computing, thus obtain secret directional information : ;
S203: store secret directional information in a database ;
Described directional information checking recovery comprises following sub-step:
S204: identical with step S201, user inputs privacy key k, be cut into two sub-keys with after one-way function MD5 computing ;
S205: sub-key generate the random vector of Line independent ;
S206: extract secret directional information from database , and by following formulae discovery template: ;
S207: by directional information and the checking fingerprint matching of the fingerprint template extracted above, thus realize checking recovery.
Secret password key is inputted user also comprise a fingerprint collecting analytical procedure: the fingerprint image collected according to fingerprint capturer before, to take the fingerprint minutiae point information with Finger print characteristic abstract algorithm, be expressed as , wherein, , horizontal ordinate, ordinate, be direction value, thus obtain the positional information of fingerprint minutiae and directional information .
In fingerprint minutiae location coordinate information and directional information protection process; register after hiding or verify that recovery completes; system can remove password, fingerprint image and details in fingerprint dot information in internal memory; that preserves only has the minutiae point location coordinate information after enciphering transformation and directional information, improves the privacy of user fingerprints information and the security of protected system.
As shown in Figure 4, off-line process, input PIN password, and by fingerprint instrument scanning collection information in fingerprint, to take the fingerprint minutiae point information with Finger print characteristic abstract algorithm; Again according to the sub-key of password generated, generating orthogonal matrix and encryption vector feature, generate security template after minutiae point being carried out conversion protection, thus can permanent storage.The online verification stage needs according to application system prompting, and input validation PIN password, after the security template extracted from database is carried out inverse transformation decoding, is compared with the checking fingerprint of input, thus can be exported the result.

Claims (5)

1., based on details in fingerprint Information hiding and the restoration methods of orthogonal matrix and modular arithmetic, it is characterized in that: directional information detail characteristics of fingerprints information being divided into fingerprint minutiae location coordinate information and fingerprint minutiae; Fingerprint minutiae location coordinate information is protected by the random orthogonal matrixing of a sub-secret generating of password key, and the directional information of fingerprint minutiae is added computing to protect by the mould of the random vector of the Line independent of the generation of another sub-key of password key.
2. the details in fingerprint Information hiding based on orthogonal matrix and modular arithmetic according to claim 1 and restoration methods; it is characterized in that: the protection of fingerprint minutiae location coordinate information comprises position information registration and to hide and location information verification recovers two steps, and described position information registration is hidden and comprised following sub-step:
S101: user inputs secret password key k, is cut into two sub-key (k with after one-way function MD5 computing 1, k 2);
S102: sub-key k 1generate the random vector v of Line independent 1, with Gram-Schmidt algorithm by random vector v 1conversion generates the orthogonal matrix M of nxn, and wherein, n is the predefined fingerprint minutiae maximum number of system; By two-dimensional position coordinate (x i, y i) be converted to one-dimensional linear coding, and with the 1st privacy key k 1maximization conversion max{c+1, k 1fill and be encoded to vector v loc; Thus convert with orthogonal matrix M, obtain secret location coded message v sec: v sec=M*v loc;
S103: store secret location coded message v in a database sec;
Described location information verification recovers to comprise following sub-step:
S104: identical with step S102, user inputs privacy key k, is cut into two sub-key (k with after one-way function MD5 computing 1, k 2);
S105: identical with step S103, sub-key k 1generate the random vector v of Line independent 1, with Gram-Schmidt algorithm by random vector v 1conversion generates the orthogonal matrix M of nxn, and calculates its inverse matrix M -1;
S106: extract secret location coded message v from database sec, and with following formulae discovery template: v loc=M -1* v sec;
S107: by positional information and the checking fingerprint matching of the fingerprint template extracted above, thus realize checking recovery.
3. the details in fingerprint Information hiding based on orthogonal matrix and modular arithmetic according to claim 1 and restoration methods; it is characterized in that: the protection of described fingerprint minutiae directional information comprises directional information registration and hides and directional information checking recovery two steps, and described directional information registration is hidden and comprised following sub-step:
S201: user inputs secret password key k, is cut into two sub-key (k with after one-way function MD5 computing 1, k 2);
S202: sub-key k 2generate the random vector v of Line independent 2, turned to by Minutiae Direction rule information between 0 ~ 359 degree, quantity is maximum fingerprint minutiae parameter, and uses sub-key k 2fill, obtaining Minutiae Direction vector is o β, in all n Minutiae Direction, comprise c true directions and n-c filling direction, with sub-key k 2random vector v after conversion 2corresponding element do mould 360 add computing, thus obtain secret directional information o sec: o sec=(o β+ v 2) mod360;
S203: store secret directional information o in a database sec;
Described directional information checking recovery comprises following sub-step:
S204: identical with step S201, user inputs privacy key k, is cut into two sub-key (k with after one-way function MD5 computing 1, k 2);
S205: sub-key k 2generate the random vector v of Line independent 2;
S206: extract secret directional information o from database sec, and with following formulae discovery template: o β=(o sec-v 2) mod360;
S207: by directional information and the checking fingerprint matching of the fingerprint template extracted above, thus realize checking recovery.
4. the details in fingerprint Information hiding based on orthogonal matrix and modular arithmetic according to Claims 2 or 3 and restoration methods, it is characterized in that: before user inputs secret password key k, also comprise a fingerprint collecting analytical procedure: the fingerprint image collected according to fingerprint capturer, to take the fingerprint minutiae point information with Finger print characteristic abstract algorithm, be expressed as S m={ m 1, m 2..., m c, wherein, m i=(x i, y i, β i), x ihorizontal ordinate, y iordinate, β ibe direction value, thus obtain the positional information (x of fingerprint minutiae i, y i) and directional information β i.
5. the details in fingerprint Information hiding based on orthogonal matrix and modular arithmetic according to Claims 2 or 3 and restoration methods; it is characterized in that: in fingerprint minutiae location coordinate information and directional information protection process; register after hiding or verify that recovery completes; system can remove password, fingerprint image and details in fingerprint dot information in internal memory, preservation only have the minutiae point location coordinate information after enciphering transformation and directional information.
CN201310179416.XA 2013-05-15 2013-05-15 Based on details in fingerprint Information hiding and the restoration methods of orthogonal matrix and modular arithmetic Expired - Fee Related CN103279697B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310179416.XA CN103279697B (en) 2013-05-15 2013-05-15 Based on details in fingerprint Information hiding and the restoration methods of orthogonal matrix and modular arithmetic

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310179416.XA CN103279697B (en) 2013-05-15 2013-05-15 Based on details in fingerprint Information hiding and the restoration methods of orthogonal matrix and modular arithmetic

Publications (2)

Publication Number Publication Date
CN103279697A CN103279697A (en) 2013-09-04
CN103279697B true CN103279697B (en) 2015-09-30

Family

ID=49062212

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310179416.XA Expired - Fee Related CN103279697B (en) 2013-05-15 2013-05-15 Based on details in fingerprint Information hiding and the restoration methods of orthogonal matrix and modular arithmetic

Country Status (1)

Country Link
CN (1) CN103279697B (en)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104009973B (en) * 2014-05-08 2017-04-05 电子科技大学 It is a kind of based on set polynomial transformation with reconcile details in fingerprint Information hiding and restoration methods
CA3191915A1 (en) * 2015-11-13 2017-05-18 Badge Inc. Public/private key biometric authentication system
CN106295365B (en) * 2016-08-12 2019-03-15 武汉大学 A kind of encrypting fingerprint template protection method and system based on orthogonal transformation
CN106788986B (en) * 2016-11-28 2019-11-08 上海交通大学 The encryption and decryption method and system of fingerprint template is expanded based on reference point
CN110365626B (en) * 2018-04-09 2022-12-06 厦门雅迅网络股份有限公司 User login security authentication method for anti-collision library, terminal equipment and storage medium
CN110391899B (en) * 2018-04-20 2022-04-29 武汉真元生物数据有限公司 Password generation method and system based on biological identification
CN109117646A (en) * 2018-07-13 2019-01-01 上海大学 A method of protection fingerprint minutiae template database privacy
CN109857780B (en) * 2019-01-17 2023-04-28 西北大学 Linear-orthogonal data publishing method for statistical query attack
CN110084224B (en) * 2019-05-08 2022-08-05 电子科技大学 Cloud fingerprint security authentication system and method
CN110489989A (en) * 2019-08-27 2019-11-22 深圳市道通智能航空技术有限公司 Data encrypting/de-encrypling method, its encryption/deciphering chip and its unmanned plane
CN113591636B (en) * 2021-07-20 2023-04-07 中国电子科技集团公司第三十研究所 Fingerprint feature-based revocable template protection technology design method

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101674299A (en) * 2009-10-16 2010-03-17 西安电子科技大学 Method for generating key based on amalgamation of multiple features in encryption area

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101674299A (en) * 2009-10-16 2010-03-17 西安电子科技大学 Method for generating key based on amalgamation of multiple features in encryption area

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
基于规范类正交矩阵的信息隐藏算法;唐燕 等;《东南大学学报》;20130131;第43卷(第1期);第45-49页 *
生物特征模版保护;李鹏 等;《软件学报》;20090630;第20卷(第6期);第1553-1577页 *

Also Published As

Publication number Publication date
CN103279697A (en) 2013-09-04

Similar Documents

Publication Publication Date Title
CN103279697B (en) Based on details in fingerprint Information hiding and the restoration methods of orthogonal matrix and modular arithmetic
Campisi Security and privacy in biometrics: towards a holistic approach
Lee et al. Cancelable fingerprint templates using minutiae-based bit-strings
Mariño et al. A crypto-biometric scheme based on iris-templates with fuzzy extractors
Li et al. Attacks via record multiplicity on cancelable biometrics templates
CN101369892B (en) Method for reinforcing fingerprint Fuzzy Vault system security
Abd Razak et al. Data anonymization using pseudonym system to preserve data privacy
US20070118885A1 (en) Unique SNiP for use in secure data networking and identity management
WO2012097362A2 (en) Protecting codes, keys and user credentials with identity and patterns
CN108960039A (en) A kind of irreversible fingerprint template encryption method based on symmetrical hash
CN104009973B (en) It is a kind of based on set polynomial transformation with reconcile details in fingerprint Information hiding and restoration methods
CN106951865B (en) Privacy protection biological identification method based on Hamming distance
Jacob et al. Biometric template security using DNA codec based transformation
Chen et al. A novel algorithm of fingerprint encryption using minutiae-based transformation
Moon et al. Improved cancelable fingerprint templates using minutiae‐based functional transform
Sood et al. Methods of automatic alignment of fingerprint in fuzzy vault: a review
Nandini et al. Efficient cryptographic key generation from fingerprint using symmetric hash functions
Belguechi et al. Enhancing the privacy of electronic passports
Wang et al. Joint Biological ID: A Secure and Efficient Lightweight Biometric Authentication Scheme
Han Fingerprint Authentication Schemes for Mobile Devices
Chen et al. A hybrid scheme for securing fingerprint templates
Zhu et al. A performance-optimization method for reusable fuzzy extractor based on block error distribution of iris trait
Xie et al. Research of biometric key generation based on fingerprint bit-strings
Shi et al. Biomapping: privacy trustworthy biometrics using noninvertible and discriminable constructions
Selvarani et al. To enhance the data security in cloud computing using multimodal biometric system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20150930

Termination date: 20190515