Biometric key extraction method based on fingerprint bit string and error correction coding

A technology of biological key and extraction method, applied in the field of biological key extraction, can solve the problem of fingerprint privacy leakage, and achieve the effect of resisting brute force attack, reducing computing cost, and protecting user fingerprint privacy information.

Inactive Publication Date: 2017-07-07
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF3 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Chulhan Lee and Jaihie Kim proposed a method for extracting binary sequences from fingerprint images in 2010. This method can only realize fingerprint-based identity authentication and does not involve biometric encryption and key generation.
In addition, this scheme still has the risk of fingerprint privacy leakage.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Biometric key extraction method based on fingerprint bit string and error correction coding
  • Biometric key extraction method based on fingerprint bit string and error correction coding
  • Biometric key extraction method based on fingerprint bit string and error correction coding

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment 1

[0051] A biological key extraction method based on fingerprint bit string and error correction coding, the specific method is: based on fingerprint bit string and error correction coding algorithm, an irreversible and changeable change function or parameter is designed to transform the original biological characteristics, and the original The template is transformed into a transformation template to generate a biometric revocable template; and through fuzzy extraction, the registration template and verification template brake registration problem is solved under the transformation domain, so that the biometric authentication has a low rejection rate and ensures the usability of the authentication scheme.

[0052] This transformation is one-way, even if the attacker obtains the transformation template and transformation function or parameters, the original template cannot be restored. If the existing transformation template is suspected to have a problem, as long as the new tran...

specific Embodiment 2

[0054] On the basis of specific embodiment 1, such as figure 1 shown, specifically including,

[0055] Fingerprint feature registration process: collect and register live fingerprint samples, extract fingerprint bit string matrix H d ;Any one of the fingerprint bit strings β i The length of each is d; a randomly generated binary key K is encoded as a binary sequence with the same length d as the fingerprint bit string; and this binary sequence is combined with the bit string matrix H d Diff OR, generate biological template auxiliary data bio-K H ;

[0056] Key fuzzy extraction process: extract the bit string matrix H of fingerprint minutiae features from the user's fingerprint d '; the bit string matrix H d ' with the biological template auxiliary data bio-K H XOR, decode the result after XOR to obtain a bit string; judge whether the number of bit strings successfully obtained by decoding is greater than or equal to the set threshold, if yes, restore the key K' after ver...

specific Embodiment 3

[0058] On the basis of specific embodiment 2, the method also includes, the bio-K to be preserved H It is stored in the smart card as a biological template, so that the authentication can only be successful if the smart card token and valid fingerprint are provided to the system at the same time, which is equivalent to adding two locks to the system, thereby further improving security. For the accidental loss of the smart card, in order to minimize the security risk, this solution can also realize the new generation of auxiliary data in the smart card, that is, it has revocability.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a biometric key extraction method based on a fingerprint bit string and error correction coding. The biometric key extraction method based on the fingerprint bit string and the error correction coding comprises the following steps: designing an irreversible and changeable variable function or parameter based on the fingerprint bit string and the error correction coding algorithm to transform the original biological features; transforming the original template into a conversion template; and generating a biological feature revocable template. According to the invention, the problem of automatic registration between the registration template and the verification template in the transform domain is solved by means of fuzzy extraction, therefore, the rejection rate of the biological authentication is low, and the availability of the authentication scheme is ensured. The invention takes the fuzzy extraction technology as the main line and combines the error correction coding technology to extract the unique and stable key from the fingerprint images with certain randomness and fuzziness, and any step does not need to store original fingerprint information, therefore, the user fingerprint privacy information can be maximally protected while realizing the fingerprint feature encryption; the biometric key extraction method based on the fingerprint bit string and error correction coding can resist the brute force attack, the tampering / intercepting template database attack and the multi template cross matching attack based on ARM homologous fingerprints.

Description

technical field [0001] The invention relates to a biological key extraction method, in particular to a biological key extraction method based on fingerprint bit strings and error correction codes. Background technique [0002] With the development of biometric identification technology, it has become a new technology development direction to apply biometric identification technology to the fields of identity authentication and biometric encryption. [0003] However, with the widespread application and in-depth research of biometric identification technology, it is gradually found that biometric identification technology is not very safe. It has some inherent security risks and defects, the most important being the leakage or being stolen of biometric information. Theft poses a huge security threat to personal privacy information. Biometrics are different from traditional passwords and passwords, which can be reset after being lost or stolen. Biometrics are non-renewable, an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/3231H04L9/0866
Inventor 汤殿华刘嘉勇谢承洋姚旭
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products