Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Key extraction method of palm print-palm vein double-source fuzzy vault

A fuzzy safe and key extraction technology, which is applied in the field of identity authentication, can solve the problems of threatening FV security, leaking, fingerprint FV is difficult to resist brute force attacks, etc., and achieves the effect of ensuring privacy and security

Active Publication Date: 2015-12-09
NANCHANG HANGKONG UNIVERSITY
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] FV is a classic biometric key extraction scheme. However, if the original biometric is used directly, there will be many security and privacy problems: the fingerprint details are limited, and the fingerprint FV constructed by it is difficult to resist brute force attacks.
The leakage of the truth points seriously destroys the privacy of the original features and seriously threatens the security of FV

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key extraction method of palm print-palm vein double-source fuzzy vault
  • Key extraction method of palm print-palm vein double-source fuzzy vault
  • Key extraction method of palm print-palm vein double-source fuzzy vault

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The present invention adopts the following scheme, a key extraction method for palmprint and palm vein dual-source fuzzy safe, characterized in that the method steps are as follows:

[0027] (1) Extend 2DPHC-based FV from palm print to palm vein. Palmprint or palm vein features and external factors generate 2DPHC through 2DHash transformation (Reference: LuLeng, AndrewTeoh, MingLi, MuhammadKhurramKhan.Analysisofcorrelationof2DPalmHashCodeandorientationrangesuitablefortransposition[J].Neurocomputing,2014,131:377-387), and then use 2DPHC as the protected palmprint Or palm vein template to construct FV, which constitutes a hybrid scheme.

[0028] (2) During single-source registration, lock palmprint or palm vein FV. Convert the set key and its cyclic redundancy code into real numbers after segmentation, and construct n Order polynomial coefficients. The point set in FV is unordered, while 2DPHC is an ordered matrix. Due to the dislocation between the 2DPHC templates, m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a key extraction method of a palm print-palm vein double-source fuzzy vault. The method comprises: segmenting a set key and a cyclic redundancy code thereof and converting into integers and constructing an n-order multinomial coefficient; during registration, converting the row vectors of 2DPHCs (2D Palm Hash Code) of the palm print and the palm veins into an integer as a horizontal ordinate and mapping the horizontal coordinate on the multinomial coefficient to calculate a longitudinal coordinate, constructing a true point using the horizontal coordinate and the longitudinal coordinate, and then adding randomly generated chaff points to construct two independent FVs; during authentication, searching for candidate points in the two corresponding FVs by use of the row vectors of 2DPHCs of the palm print and the palm veins, respectively; and if the candidate points contain more than (n+1) true points, correctly reconstructing an original polynomial and extracting a key. Due to the double-source mode of the method obviously, the accuracy of authentication is improved enough to resist brute-force attack, multi-database attack and heterogeneity analysis attack, and furthermore, the privacy of original characteristics is further effectively protected.

Description

technical field [0001] The present invention extends the fuzzy safe (FuzzyVault, FV) based on 2DPalmHashCode (2DPHC) from palm print to palm vein, constructs dual-source FV extraction key by means of palm print and palm vein dual-modal features, and can replace traditional keys to realize identity authentication . Background technique [0002] Biometric comparison is usually ambiguous. When the difference between registration and authentication templates is less than a certain threshold, the sample is considered to be a legitimate user from the same individual. However, the authentication key of traditional information security requires absolutely exact matching. Consider using biometrics to extract completely stable and unchanging reliable data as keys, instead of traditional low-entropy keys, to enhance the security of existing password authentication, and to expand the application scope of biometrics to realize traditional password authentication to biometric passwords ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32
Inventor 冷璐黎明张明仁金千植
Owner NANCHANG HANGKONG UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products