Finger vein encryption method

A technology of finger veins and encryption methods, which is applied in the field of pattern recognition, can solve problems such as performance evaluation of biometric encryption systems, and achieve good classification effects

Inactive Publication Date: 2017-05-10
HARBIN ENG UNIV
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, in the theoretical research of biometric encryption technology by scholars all over the world, there are still aspects that need to be further improved and perfected. The characteristics of the scheme, and enable it to be combined with the key; another example, in the process of encryption, how to improve the matching accurac

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Finger vein encryption method
  • Finger vein encryption method
  • Finger vein encryption method

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0021] The specific embodiments of the present invention will be described in detail below with reference to the drawings.

[0022] 1. Multi-scale block center symmetric local binary mode (MB-CSLBP) encodes the image

[0023]

[0024]

[0025]

[0026] Among them, L represents the side length of the square area of ​​the pixel block. g k Represents the gray value of a single pixel, B is the sum of the pixel gray values ​​of the i-th square area, and the code obtained by replacing the gray value of the square area with the sum of the pixel gray values ​​is the same. s(x) is the binarization function, T is the threshold, and x represents the difference of the sum of the pixel gray values ​​of the two selected square regions.

[0027] figure 1 The coding process of MB-CSLBP operator is given.

[0028] figure 1 The sum of gray values ​​of a square area with a side length of 3 is regarded as the gray value of a pixel, and compared with the sum of gray values ​​of another square area symmet...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a finger vein encryption method. According to the finger vein encryption method, a multi-scale block centrally symmetric local binary mode is used to extract the features of an image, and under a fuzzy commitment framework, BCH codes and binary codes are combined with a key. According to the multi-scale block centrally symmetric local binary mode, the mean gray value of pixel block regions is adopted to replace the gray value of a single pixel in a CSLBP operator, so that comparison is performed, and therefore, the multi-scale block centrally symmetric local binary mode is insensitive to the influence of noises; the extracted features contain the microstructure and macro structure of the image, and therefore, the information of the image can be expressed more completely, and a classification effect is better; after MB-CSLBP operator encoding, obtained binary codes are adopted as the features of the finger vein image; and the features are combined with the key which has been subjected to BCH encoding, so that the key can be encrypted.

Description

technical field [0001] The invention relates to a pattern recognition method, in particular to a finger vein encryption method. Background technique [0002] At present, some traditional identity authentication technologies like passwords and ID cards are still the most widely used around the world, but this has also led to the fact that these identity authentication technologies have been fully researched, so their security is gradually improving. reduce. As biometric technology is increasingly applied to real life, the importance of privacy and security becomes self-evident. At the same time, the means of attacking the biometric identification system are constantly being updated. Different from traditional passwords, traditional passwords are often randomly generated, and the difficulty of attacking passwords mainly depends on the complexity of calculations, while biological characteristics are fixed and often exposed in various occasions, so biometric identification Sy...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/3231H04L9/0861
Inventor 王科俊姜金祎邢向磊
Owner HARBIN ENG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products