Fingerprint fuzzy vault method based on (k, w) threshold secret sharing scheme
A technology for fuzzy vaults and threshold secrets, applied in the fields of pattern recognition and cryptography, which can solve problems such as hidden security risks of subkeys
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0045] The present invention will be further described below in conjunction with accompanying drawing.
[0046] Described shared key distribution stage is specifically as follows (such as figure 1 shown):
[0047] 1. The binding process of fingerprint fuzzy vault and user sub-key
[0048] Step 1.w users respectively input personal registered user names and fingerprints. Part of the fingerprint images in the fingerprint database for testing are as follows: image 3 . A series of preprocessing operations such as segmentation, direction field and gradient calculation, equalization, convergence, smoothing, enhancement, binarization, and thinning are performed on the fingerprint image to obtain a clear binary image that maintains fingerprint feature information. Then extract all the feature points in the image, filter and remove the false feature points, and keep the real feature points of the original image, such as Figure 4 shown.
[0049] Step 2. Linearly map the plane co...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com