A realization method of finger vein fusion fuzzy treasury

A technology of fuzzy treasury and implementation method, applied in the field of cryptography and biometric identification, to achieve the effect of increasing the number, high implementation efficiency, and strong security

Active Publication Date: 2019-05-21
HANGZHOU DIANZI UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But the algorithm requires that the lock and unlock sets A and B must be ordered sets

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A realization method of finger vein fusion fuzzy treasury
  • A realization method of finger vein fusion fuzzy treasury
  • A realization method of finger vein fusion fuzzy treasury

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The present invention will be further described below with reference to the accompanying drawings.

[0038] A method for realizing a finger vein fusion fuzzy vault mainly includes three parts: the first step is to fuse the finger vein skeleton information on the finger vein A and the finger vein B images to obtain the vein skeleton image C, and extract the feature points to obtain a feature information set And extract its characteristic information set. The second step is to use the locking algorithm to bind the key to be protected with the feature set in the first step to generate a finger vein fusion fuzzy vault. The third step is to use the verified query finger veins A' and B' to fuse the finger vein skeleton information to obtain the vein skeleton image C', extract the feature information, and use the unlocking algorithm to extract the key from the finger vein fuzzy vault.

[0039] The described fusion of the finger vein skeleton information on the finger vein A a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for realizing a finger vein fusion fuzzy vault. The present invention specifically includes the following steps: Step 1, fusing finger vein skeleton information on finger vein A and finger vein B images to obtain vein skeleton image C, extracting feature points to obtain a feature information set and extracting the feature information set. Step 2. Use the locking algorithm to bind the key to be protected with the feature set in the first step to generate a finger vein fusion fuzzy vault. Step 3. Using the verified query finger veins A' and B', fuse their finger vein skeleton information to obtain a vein skeleton image C', extract feature information, and use an unlocking algorithm to extract a key from the finger vein fuzzy vault. The present invention uses the fuzzy vault generated by finger vein image fusion to realize key protection, which has strong security and high implementation efficiency, and ensures that only legitimate users can extract the key with CRC verification function under the legal finger vein, ensuring the key Confidentiality, integrity, availability of secure storage.

Description

technical field [0001] The invention belongs to the technical field of cryptography and biometric identification, in particular to a method for realizing a finger vein fusion fuzzy vault. Background technique [0002] As early as 1994, Bodo proposed in a German patent: the direct application of biological template data extraction, and the result is supplied as a key to a cryptographic system. This is the first scheme to combine cryptographic keys with biological templates. [0003] In 1998, Soutar first proposed the concept and scheme of binding keys and biological characteristics. The scheme can be divided into two phases: registration and certification. The purpose of the registration scheme is to bind any N-bit key and the user's fingerprint together to generate biometric ciphertext for storage and verification. Davida et al. introduced the iris feature in the key. When the bit difference between the input and the template is within 10%, the key binding method in this ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06K9/00
CPCG06V40/10G06V40/14
Inventor 游林俞云万天添占梦王亭张彩娟余红芳
Owner HANGZHOU DIANZI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products