Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Design Method of Secure Face Authentication System Based on CNN Feature Extractor

A technology of feature extraction and design method, applied in the field of biometric authentication and encryption, Paillier algorithm and inadvertent transmission protocol encryption, can solve the problems of low authentication rate, attack, limited accuracy of authentication algorithm, etc., to achieve high authentication accuracy, The effect of removing the influence of noise

Active Publication Date: 2018-07-31
BEIJING UNIV OF TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Before 2006, most of the features in face authentication algorithms were artificially defined, such as LBP, SIFT and Gabor, etc., and the accuracy of authentication algorithms based on these features was also limited.
However, the authentication rate is low, the program takes a long time to run, and the article "Reconstructing a fragmented face from a cryptographic identification protocol" proves that the SCiFi system is vulnerable to the method of reconstructing fragmented faces
[0005] To sum up, the existing face authentication methods can not take into account the authentication performance and security performance, which restricts the practical application of the algorithm.
Aiming at the problem that the existing face authentication system cannot balance system security and user privacy, a combination of Paillier encryption algorithm and inadvertent transmission is proposed to encrypt the features extracted by the deep neural network, without reducing the system authentication performance. Ensure that users' private information is not leaked, resist malicious attacks, and enhance system security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Design Method of Secure Face Authentication System Based on CNN Feature Extractor
  • A Design Method of Secure Face Authentication System Based on CNN Feature Extractor
  • A Design Method of Secure Face Authentication System Based on CNN Feature Extractor

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] In order to achieve the above problems, the present invention provides a method for designing a security authentication system based on deep facial features. The present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0044] The method specifically includes:

[0045] Preparatory stage

[0046] 1. Design a CNN network structure

[0047] The CNN structure that the present invention adopts is as figure 2 shown. The network consists of 4 convolutional layers, 1 fully connected layer, and a softmax layer. The first three convolutional layers are followed by a pooling layer, and the activation function of neurons uses the ReLU function. The input is an RGB color image set to 56*56. The side length of the rectangle in the figure indicates the size of the feature map and the filter, and the number of rectangles indicates the number of feature maps. Since the higher the number of convolutional layers, the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A design method for a secure face authentication system based on a CNN feature extractor belongs to the field of biometric identification, and specifically relates to a method for extracting face features using CNN and encrypting them with Paillier algorithm and inadvertent transmission protocol. Compared with the SCiFi system, the present invention replaces manually extracted features with features learned automatically by CNN, and performs binarization to remove the influence of noise, and has higher authentication accuracy. The test authentication rate on LFW library view2 is 91.48%. During the entire authentication process, the server will not know any characteristic information of the requester, and can only receive the characteristic ciphertext information but cannot decrypt it. The client only knows whether the authentication is passed, and knows nothing about other information including the Hamming distance. This system uses 320bit features to represent a face picture, and the amount of feature data is reduced by 2 / 3 compared with the SCiFi system, so the time-consuming encryption and authentication is low and the real-time performance is high.

Description

technical field [0001] The invention belongs to the field of biological feature identification, relates to biological feature authentication and encryption technology, and in particular to a method for extracting face features by CNN and encrypting them with Paillier algorithm and inadvertent transmission protocol. Background technique [0002] In the field of biometric identification, the face has broad application prospects due to its contact-free and natural identification methods, including identity authentication in documents, security monitoring and monitoring, and network security control. However, the traditional biometric identification system does not have any encryption measures when storing. Once the features in the database are stolen, it means the leakage of private information, and there are great security and privacy risks. And the biometric feature is irrevocable and cannot be reset many times, so it is of great application significance to study a high authe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/32G06K9/62H04L9/32
CPCH04L9/3231G06F21/32G06F18/24
Inventor 毋立芳马玉琨贺娇瑜漆薇许晓闫春灿
Owner BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products