Novel fuzzy vault method based on fingerprint characteristic data and matching algorithm

A technology that fuzzes the characteristics of vaults and fingerprints. It is applied in the fields of pattern recognition and cryptography, and can solve problems such as staying in theoretical demonstrations, unclear explanations, and lack of experimental conditions.

Active Publication Date: 2012-06-20
海宁鼎丞智能设备有限公司
View PDF3 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In 2002, Juels and Sudan proposed the fuzzy vault scheme for the first time in their paper "A Fuzzy Vault Scheme", but there are still many problems that are not clearly explained. In 2003, Clancy et al. proposed a fingerprint fuzzy vault based on the work of Juels and Sudan. The concept of this scheme is the same as the original scheme of Juels et al. The biggest disadvantage is that it assumes that the fingerprint images have been pre-calibrated, but the actual situation is that it is impossible to obtain the query fingerprint image in advance for registration.
Most of the fingerprint template and key protection methods based on fuzzy vaults that have emerged in recent years are still at the stage of theoretical demonstration, and lack the necessary real and reliable experimental conditions.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Novel fuzzy vault method based on fingerprint characteristic data and matching algorithm
  • Novel fuzzy vault method based on fingerprint characteristic data and matching algorithm
  • Novel fuzzy vault method based on fingerprint characteristic data and matching algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The present invention will be further described below in conjunction with accompanying drawing.

[0044] 1. Detailed process of system locking (Locking) process:

[0045] 1.1. If figure 1 As shown, a random key with a length of 128 bits is generated by the system as the start of the system, and the random key with a length of 128 bits is used as a coefficient of the polynomial every 16 bits, and the coefficients of the 1st order to the 8th order are assigned to the coefficients of the order to generate an 8th degree polynomial , and the constant term of the polynomial is composed of CRC check code. In this way, we associate the key with the polynomial and add the CRC check code. The generator polynomial of the CRC check code selects CRC16_IBM: .

[0046] 1.2. Input a fingerprint image ( image 3 is a part of the image in the fingerprint database), and perform the following operations on this fingerprint image:

[0047] A series of preprocessing operations such ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a novel fuzzy vault method based on fingerprint characteristic data and a matching algorithm. A locking process in the method comprises the following steps: firstly, carrying out cyclic redundancy check (CRC) coding to random secret key data; then, constructing an associated polynomial; adding a farraginous point; carrying out a characteristic quantization process to each point in an assembly; and disorganizing the sequence of each point in the assembly; and generating a registered Hash table by the assembly. An unlocking process comprises the following steps: firstly, extracting input minutia characteristic data; then, quantizing each minutia characteristics data; generating a verification Hash table; comparing the verification Hash table with the registered Hash table by a matching algorithm to obtain a subset; carrying out a Lagrange interpolation reconstruction polynomial; and finally, carrying out a CRC verification process to the coefficient data of the polynomial obtained by reconstruction. According to the novel fuzzy vault method based on the fingerprint characteristic data and the matching algorithm, the secret key information and the fingerprint characteristic data are organically combined to effectively protect a secret key and simultaneously conceal the fingerprint characteristic template information of a user.

Description

technical field [0001] The invention belongs to the technical fields of pattern recognition and cryptography, and in particular relates to a novel fuzzy treasury method based on fingerprint characteristic data and a matching algorithm. Background technique [0002] In 2002, Juels and Sudan proposed the fuzzy vault scheme for the first time in their paper "A Fuzzy Vault Scheme", but there are still many problems that are not clearly explained. In 2003, Clancy et al. proposed a fingerprint fuzzy vault based on the work of Juels and Sudan. The concept of this scheme is the same as the original scheme of Juels et al. The biggest disadvantage is that it assumes that the fingerprint images have been pre-calibrated, but the actual situation is that it is impossible to obtain the query fingerprint image in advance for registration. In 2005, Uludag et al. proposed a more practical fuzzy vault algorithm, the most important idea of ​​which is to use the Helper Data extracted from the r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08G06K9/00
Inventor 游林王升国陆捷吴安宁
Owner 海宁鼎丞智能设备有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products