Facial feature cryptographic key generation-based internet identity authentication method

A face feature and identity authentication technology, applied in user identity/authority verification, equipment, character and pattern recognition, etc., can solve the problems of large intra-variance of biometric features, increased false rejection rate, and large key gap, etc., to achieve The effect of protecting privacy and security and convenient application

Inactive Publication Date: 2011-06-29
BEIJING UNIV OF TECH
View PDF2 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] There are many deficiencies in the two methods mentioned above, which are mainly reflected in: (1) Different keys are generated according to different avatars of the same person, and

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Facial feature cryptographic key generation-based internet identity authentication method
  • Facial feature cryptographic key generation-based internet identity authentication method
  • Facial feature cryptographic key generation-based internet identity authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The overall process of the technical solution is shown in the attached figure 1 As shown, this example is to perform feature extraction, key generation, error correction coding, etc. on the input original face image, and use the generated key to authenticate the identity, so as to protect the security of user information. The input original image size is a BMP bitmap of 64*64 pixels, the 128-dimensional PCA feature of the input image is extracted, and the face feature is thresholded to become a binary string. The method of statistical optimal features is used to find out the distinguishable features of the input face, and all the distinguishable features are cascaded to generate the key required by the identity registration system. In the identity authentication stage, first input the face image to be recognized, perform feature extraction, thresholding, and count the optimal features to generate the key of the face to be recognized. Use the error correction code infor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a facial featured cryptographic key generation-based internet identity authentication method, which relates to the technical fields of biological feature recognition and authentication and password application. The method comprises an identity registration stage and an identity authentication stage. In the identity registration stage, a stable cryptographic key is generated by utilizing a facial feature method based on random projection and statistical optimum, stored into a database and used for performing identity authentication on a user. In the identity authentication stage, the steps of feature extraction, feature random projection, cryptographic key generation and feature error correction are performed on a face image by adopting a method consistent with the method for generating the cryptographic key in the identity registration stage, and then a feature matching operation is performed to realize the identity authentication of the user. By the method, a face template is effectively protected from attacks in a face recognition process, good references and choices are provided for the generation, management and the like of the cryptographic key required by an identity authentication system in real life, and the problem of internal diversity in biological feature recognition is effectively solved; and the method is simple and easy.

Description

technical field [0001] The invention relates to the technical field of biometric identification authentication and password application, in particular to the research and realization of an online identity authentication method based on facial feature key generation. Background technique [0002] Biometric identification can effectively solve the problems of user identification and security control in the identity management system. Biological characteristics include physiological characteristics and behavioral characteristics. Commonly used physiological characteristics include fingerprints, hand shape, face shape, iris, retina, and smell; behavioral characteristics include keystrokes, voice, handwriting, gait, etc. With the wide application of biometric systems in many occasions, people are more and more concerned about the security and privacy of biometric technology. An ideal biometric system should have the characteristics of robustness, low error rate and not easy to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32G06K9/00G06K9/54
Inventor 毋立芳周鹏刘兴胜肖鹏袁松龙江思源
Owner BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products