Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Heterogeneous iris authentication method with theft attack response mechanism

An authentication method, iris technology, applied in digital data authentication, computer parts, instruments, etc.

Active Publication Date: 2019-07-23
JILIN UNIV
View PDF10 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The main purpose of the present invention is to solve some problems existing in the existing iris authentication method;

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Heterogeneous iris authentication method with theft attack response mechanism
  • Heterogeneous iris authentication method with theft attack response mechanism
  • Heterogeneous iris authentication method with theft attack response mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0067] Under the framework of claim 1, the operation of a certain person (named A, A’s information is stored in the authentication system, and the test iris and the template iris are the same equipment, the same collection environment is used for collection, and no theft attack occurs) The whole process:

[0068] 1) The computer first collects the iris image of A through the iris collector, and then converts the eye image of A into a 256×32-dimensional iris normalized and enhanced image through the Daugman rubber band method and equalized histogram, and normalizes the iris of A to An augmented image is input into a convolutional layer.

[0069] 2) The iris normalized enhanced image of A goes through the first convolutional layer, the first pooling layer, the first ReLU layer, the second convolutional layer, the second pooling layer, the second ReLU layer, and the third convolutional layer , the third pooling layer, the image processing layer, and the tiling layer, enter the f...

Embodiment 2

[0074] Under the framework of claim 1, for a certain person (named B, the information of B is not saved in the authentication system, it belongs to a new category, and the test iris and the template iris will be collected through different equipment and different collection environments, and there is no theft attack behavior Occurrence) The whole process of operation:

[0075] 1) The computer first collects H iris images of B through the iris collector p, and then converts the H images of B's ​​eyes into 256×32-dimensional iris normalized enhanced images through the Daugman rubber band method and equalized histogram. The iris normalized and enhanced images of H sheets of B are sequentially input into the convolutional layer.

[0076] 2) The iris normalized enhanced images of H pieces of B go through the first convolutional layer, the first pooling layer, the first ReLU layer, the second convolutional layer, the second pooling layer, the second ReLU layer, and the third volume ...

Embodiment 3

[0085] Under the framework of claim 1, the whole operation process of a certain person (named C, C’s information is not saved in the authentication system, and no theft attack occurs):

[0086] 1) The computer first collects the iris image of C through the iris collector, and then converts the eye image of C into a 256×32-dimensional iris normalized and enhanced image through the Daugman rubber band method and equalized histogram, and normalizes the iris of A to An augmented image is input into a convolutional layer.

[0087] 2) The iris normalized enhanced image of C goes through the first convolutional layer, the first pooling layer, the first ReLU layer, the second convolutional layer, the second pooling layer, the second ReLU layer, and the third convolutional layer , the third pooling layer, the image processing layer, and the tiling layer, enter the fully connected layer.

[0088] 3) From the tiling layer to the fully connected layer, the 15 data of the tiling layer are...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a heterogeneous iris authentication method with a theft attack response mechanism. The heterogeneous iris authentication method comprises the following steps of step 1, constructing a heterogeneous iris multi-class authentication system improved based on a convolutional neural network; 2, constructing the theft attack response mechanism; 3, starting the formal authentication; step 4, enabling the images to sequentially enter a full connection layer; step 5, obtaining a similarity probability with the iris to which the single classifier belongs; step 6, obtaining an accurate similarity probability; and step 7, through the mapping relation of the coding layer, outputting the iris type condition to which the tested iris belongs. The method has the beneficial effects that the traditional convolutional neural network is transformed, and the image processing layer and the dilution layer are added, so that the difference between different types of irises can be amplified in multi-type authentication, and the authentication accuracy is improved.

Description

[0001] The invention relates to a heterogeneous iris authentication method, in particular to a heterogeneous iris authentication method with a stealing attack response mechanism. Background technique [0002] At present, with the development of social informatization, biometric technologies such as face, iris, and fingerprints have begun to be used on a large scale in actual production and life. The iris, as a human body feature that is not easy to be copied, is favored by those places with high confidentiality and high security, such as military bases and vaults. [0003] The current iris authentication mainly adopts the coded recognition mode, that is, after preprocessing the qualified iris, the test iris and the contrast iris as a template are converted into feature codes in the same way, and through a certain The algorithm compares the similarity between the features, and then completes the iris authentication. This mode is currently the most widely studied and most commo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06K9/00G06N3/04G06F21/32
CPCG06F21/32G06V40/197G06N3/045
Inventor 刘元宁刘帅朱晓冬董立岩程垚松崔靖威张齐贤丁通张阔肖刚毅
Owner JILIN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products