Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Generated encrypting method based on face feature key

A face feature and key generation technology, applied in the research and implementation of data encryption and decryption methods, can solve the problems of staying in the theoretical research stage, low recognition rate, low security performance, etc., to achieve convenient application, wide application prospects, The effect of solving the security problem of face template

Inactive Publication Date: 2011-02-16
BEIJING UNIV OF TECH
View PDF2 Cites 50 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] The current key generation method either stays in the theoretical research stage; or realizes low recognition rate and low security performance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Generated encrypting method based on face feature key
  • Generated encrypting method based on face feature key
  • Generated encrypting method based on face feature key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The overall process of the technical solution is shown in the attached figure 1 As shown, in this embodiment, feature extraction, key generation, error correction coding, etc. are performed on the input original face image, and the data information is encrypted using the generated key, so as to protect the security of the data information. The input original image size is a BMP bitmap of 64*64 pixels, the 128-dimensional PCA feature of the input image is extracted, and the face feature is thresholded to become a binary string. The method of statistical optimal features is used to find out the distinguishable features of the input face, and all the distinguishable features are cascaded to generate the encryption key required by the encryption system. In the decryption stage, first input the face image with recognition, perform feature extraction, thresholding, and statistical optimal features to generate a decryption key. Comparing the encryption and decryption keys, if...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a generated encrypting method based on a face feature key, comprising the following stages of: an encrypting stage: generating a stable encrypting key by using a face feature method based on statistical optimization and carrying out the encrypting operation of data or files by using the stable encrypting key and a corresponding encrypting algorithm; a deciphering stage: according to a provided face image, adopting a method which is consistent to the generated key of the encrypting stage to extract features and generate a key for the face image; then, carrying out a feature matching operation, a feature error-collection step and a corresponding deciphering algorithm to decipher encrypted content; by selecting an optimally distinguishable face feature, effectively solving the problem of internal difference in biological feature recognition; and meanwhile, the encrypting and deciphering process is equal to a face recognizing an authenticating process, and the successful decryption means successful identification. The generated encrypting method is simple, is easy to operate, is convenient to apply, and the like.

Description

technical field [0001] The invention relates to the technical field of biometric identification authentication and password application, in particular to the research and realization of a data encryption and decryption method based on facial feature key generation. Background technique [0002] Biometric identification can effectively solve the problems of user identification and security control in the identity management system. Biological characteristics include physiological characteristics and behavioral characteristics. Commonly used physiological characteristics include fingerprints, hand shape, face shape, iris, retina, and smell; behavioral characteristics include keystrokes, voice, handwriting, gait, etc. With the wide application of biometric systems in many occasions, people are more and more concerned about the security and privacy of biometric technology. An ideal biometric system should have the characteristics of robustness, low error rate and not easy to t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/24G06K9/00G06K9/46G06F21/32G06F21/62
Inventor 毋立芳刘兴胜袁松龙肖鹏曹连超
Owner BEIJING UNIV OF TECH
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More