CN101976312A - Method for enhancing security of Biohashing system - Google Patents

Method for enhancing security of Biohashing system Download PDF

Info

Publication number
CN101976312A
CN101976312A CN 201010284596 CN201010284596A CN101976312A CN 101976312 A CN101976312 A CN 101976312A CN 201010284596 CN201010284596 CN 201010284596 CN 201010284596 A CN201010284596 A CN 201010284596A CN 101976312 A CN101976312 A CN 101976312A
Authority
CN
China
Prior art keywords
biohashing
matrix
token
helperdata
algorithm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 201010284596
Other languages
Chinese (zh)
Other versions
CN101976312B (en
Inventor
李慧贤
王旋
庞辽军
尹平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Northwestern Polytechnical University
Xidian University
Original Assignee
Northwestern Polytechnical University
Xidian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Northwestern Polytechnical University, Xidian University filed Critical Northwestern Polytechnical University
Priority to CN 201010284596 priority Critical patent/CN101976312B/en
Publication of CN101976312A publication Critical patent/CN101976312A/en
Application granted granted Critical
Publication of CN101976312B publication Critical patent/CN101976312B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses a method for enhancing security of Biohashing system, which is used for solving the poor system security technical problem that the conventional Biohashing method. The technical scheme is that: auxiliary data obtained based on key generation is adopted to enhance the security of the Biohashing system; the auxiliary data HelperData is generated by using a biological characteristic template and a token held by a user; and on the basis of not increasing the system distortion rate, when the token is lost or is obtained by an attacker, the system is not subjected to security threat and the system security is improved.

Description

Strengthen the method for Biohashing security of system
Technical field
The present invention relates to a kind of Biohashing method, particularly strengthen the method for Biohashing security of system.
Background technology
In the biological characteristic field of encryption, the protection problem of biological template roughly can be divided into two kinds: biological hash method (Biohashing) and based on the method (HelperData) of auxiliary data.Document " Cancellable biometrics andannotations on BioHash.Pattern Recognition, 2008,41 (6): 2034-2044. " discloses a kind of Biohashing method:
(1) feature extraction.From the primeval life feature templates, extract the biological attribute data sequence
Figure BSA00000273593700011
N represents the length of biological attribute data sequence,
Figure BSA00000273593700012
The expression set of real numbers;
(2), generate N random series r based on the random number seed token that sets in the known token 1, r 2..., Wherein N represents the biological attribute data sequence length in the above-mentioned steps (1);
(3) according to the biological attribute data sequence r of Gram-Schmidt method with generation in the step (2) 1, r 2...,
Figure BSA00000273593700014
Unit orthogonalization generates one group of new sequence or 1, or 2..., or N.
(4) to each or i, calculate Inner and amass<v or i, and setting threshold τ, obtain a discrete data b i, wherein: i=1,2 ... N.Specific algorithm is as follows:
b i = 0 < v , or i > &le; &tau; 1 < v , or i > > &tau; I=1 wherein, 2 ... N
The Biohashing method is a kind of scheme of effective revocable biological template, the pseudo-random sequence of utilizing token at random to generate carries out with the biological template data that Inner is long-pending to disperse, well annotated the intension of revocable biological template method: when changing at random token, just can regenerate new revocable template.In the verification process, if token is correct at random, the misclassification rate of system will reduce greatly, even the phenomenon of zero misclassification rate may occur.
Yet because the internal mechanism of Biohashing method, the effect of token in total system is very large, can be described as dominance, and this deviates from the original idea of using biological character for identity authentication.When the token that obtains user's token or user as the assailant leaked, the safety of system will be subjected to very big influence.For example, after assailant A obtains the token of user B, use the token of B and the biological characteristic of self, promptly might be by the authentication of system.And for token,, easily be stolen or leak because be that the user outside is held, therefore, need a kind of can be in the still guaranteed improvement project of security of system after the token lost.
Existing improving one's methods all is to increase parameter in the middle flow process of system or the generative process of last biological Hash code word (BiohashCode); or changing traditional discrete logarithm comes total system is protected, and does not fundamentally solve token and loses the safety problem of system afterwards.
Summary of the invention
In order to overcome the deficiency of existing Biohashing method security of system difference, the invention provides a kind of method of the Biohashing of enhancing security of system.This method adopts the auxiliary data based on key generation gained to strengthen the Biohashing security of system, the token that uses biometric templates and user to hold generates auxiliary data HelperData, on the basis that does not increase the systematic distortion rate, when token is lost or victim when resultant, system can not be subjected to security threat, can improve the security of system.
The technical solution adopted for the present invention to solve the technical problems: a kind of method that strengthens the Biohashing security of system is characterized in comprising the steps:
(1) extract intermediate data Aid in biometric templates, wherein Aid is that element value is 0 or 1 matrix, and its line number and columns are by setting threshold P in the extraction algorithm and unimodular value C xAnd C yDecision:
(1.1) point with curvature maximum in the biometric templates is a central point, and is the center of circle with the central point, and central spot field of direction direction is an x axle positive dirction, rotates counterclockwise 90 ° and is y axle positive dirction, sets up plane right-angle coordinate;
(1.2) be as the criterion with the coordinate system in the step (1.1), extract the coordinate information M of all bifurcations in the minutiae point in the biometric templates i(x i, y i), wherein i is an integer;
(1.3), calculate to each bifurcation i
Figure BSA00000273593700021
ρ i represents the distance of fingerprint minutiae to central point, and setting threshold P, works as ρ iDuring<P, this point enters the processing sequence, otherwise discards the information of this point, and wherein i is an integer;
(1.4) the unimodular value C of x axle and y axle in the setting coordinate system xAnd C y, then, calculate the positional information of each bifurcation i in matrix A id (x ', y '), computing method are as follows:
x &prime; y &prime; = ( x i + P ) / C x ( y i + P ) / C y
(1.5), behavior x ' among the matrix A id and the element value of classifying y ' as are defined as 1, and other element value among the matrix A id is defined as 0 according to the position of each bifurcation i in the step (1.4) in matrix A id (x ', y ');
(2) use the random number seed token that sets in the token of user's input and each row element of matrix A id to carry out XOR by turn, obtain matrix with matrix A id homotype as auxiliary data HelperData;
(3), generate biological Hash code word BiohashCode based on auxiliary data HelperData and original Biohashing algorithm:
(3.1) each capable being input in the original Biohashing algorithm as random seed among the auxiliary data HelperData is gone;
(3.2) with each row of auxiliary data HelperData as the token in the original Biohashing algorithm, generate a cryptographic hash Code by original Biohashing algorithm;
(3.3) with the sequencing of all cryptographic hash Code, combine, form final biological Hash code word BiohashCode according to generation.
The invention has the beneficial effects as follows: owing to adopt auxiliary data to strengthen the Biohashing security of system based on key generation gained, the token that uses biometric templates and user to hold generates auxiliary data HelperData, on the basis that does not increase the systematic distortion rate, when token is lost or victim when resultant, system can not be subjected to security threat, has improved the security of system.
Below in conjunction with the drawings and specific embodiments the present invention is elaborated.
Description of drawings
Accompanying drawing is the method flow synoptic diagram that the present invention strengthens the Biohashing security of system.
Embodiment
Explanation of nouns:
Aid: in auxiliary data HelperData generative process, by the intermediate data that extracts in the biological data.This intermediate data is by extracting a certain amount of information in the biological data.This information is limited the quantity of, and according to Aid, the assailant can not reconstruct biological template, and promptly Aid is the one group of data that can represent the primeval life template to a certain extent and can not reconstruct the primeval life template according to Aid
HelperData: unite the data of generation by token and intermediate data Aid, participate directly in the Biohashing algorithm operating, play with original Biohashing system in the identical effect of token, promptly occur as random seed.
Present embodiment is example explanation the present invention with the fingerprint picture of 256*360pi (pi is a pixel).Other biological characteristic also is fit to the present invention as iris, people's face, palmmprint etc.By to system input identical token and different pictures, verify when token lose or victim obtain after the security of system.
With reference to accompanying drawing, each width of cloth picture enters and all passes through following processing after the system, the match information when obtaining canned data in the server end database or authentication.
(1) extracts intermediate data Aid.
(1.1) point of curvature maximum is a central point in the searching fingerprint image, is the center of circle with the central point, and central spot field of direction direction is an x axle positive dirction, rotates counterclockwise 90 ° and is y axle positive dirction, sets up plane right-angle coordinate;
(1.2) be as the criterion with the coordinate system in the step (1.1), extract the coordinate information M of all bifurcations in the minutiae point in the fingerprint characteristic template i(x i, y i), wherein i is an integer;
(1.3), calculate to each bifurcation i
Figure BSA00000273593700031
ρ iThe expression fingerprint minutiae is to the distance of central point, and setting threshold P, works as ρ iDuring<P, this point enters the processing sequence, otherwise discards the information of this point, and wherein i is an integer.Set P=128pi;
(1.4) the unimodular value C of x axle and y axle in the setting coordinate system xAnd C y, then, calculate the positional information of each bifurcation i in matrix A id (x ', y '), computing method are as follows:
x &prime; y &prime; = ( x i + P ) / C x ( y i + P ) / C y
Here, make C x=C y=8pi;
(1.5) according to the position of each bifurcation i in the step (1.4) in matrix A id (x ', y '), behavior x ' among the matrix A id and the element value of classifying y ' as are defined as 1, other element value of matrix A id is defined as 0; So just extract matrix A id, regard this matrix as two-dimensional array Aid[] [] use; Work as C x=C yDuring=8pi, two-dimensional array is Aid[32] [32].
(2) use the token and the Aid[of user's input] [] carry out XOR line by line, obtains HelperData[] [].That is:
HelperData [ i ] [ ] = token &CirclePlus; Aid [ i ] [ ] Wherein: i=0,1 ... 31
The setting token is a sexadecimal number, and length is 8.
(3) HelperData is loaded into original Biohashing system.
(3.1) with HelperData[] [] take out line by line, each row HelperData[i] [] be input in the original Biohashing system as a random seed and go;
(3.2) HelperData[i] code word Code of [] generation i
(3.3) all code word Code that step (3.2) is generated iSize order according to i couples together, and forms final biological Hash code word BiohashCode;
The above-mentioned last BiohashCode of operation generation of token process that fingerprint image all needs and matches with it when system registry and authentication.The BiohashCode that registration generates is stored in the server end database, and the BiohashCode that generates during authentication will mate with the data in the server database.
(4) matching process.
The BiohashCode that generates in the time of might as well making registration is B E, the BiohashCode that generates during the order authentication is B QMatching process is as follows:
(4.1) relatively
Figure BSA00000273593700043
With
Figure BSA00000273593700044
The use Hamming distance is described distance D between the two i, then
Wherein
Figure BSA00000273593700046
For forming B E, B QBy the Code that generates in (3.2) iValue; Valuei is
Figure BSA00000273593700047
With
Figure BSA00000273593700048
Between Hamming distance and Code iThe ratio of length.
Setting threshold VA, length is 32 array SA, works as Value iDuring<VA, make SA (i)=1, otherwise, SA (i)=0 made.Here get VA ∈ (0.1,0.15);
(4.2) calculate the coupling mark.
Score ( E , Q ) = &Sigma; i = 0 31 SA ( i ) T
Wherein: (E Q) is B to Score EAnd B QThe coupling mark; T is the number of i,, is set at 32 here.
(4.3) setting threshold SC, when Score (E, Q) 〉=during SC, think that then the match is successful, otherwise it fails to match.Here set SC ∈ (0.75,0.8).

Claims (1)

1. a method that strengthens the Biohashing security of system is characterized in that comprising the steps:
(1) extract intermediate data Aid in biometric templates, wherein Aid is that element value is 0 or 1 matrix, and its line number and columns are by setting threshold P in the extraction algorithm and unimodular value C xAnd C yDecision:
(1.1) point with curvature maximum in the biometric templates is a central point, and is the center of circle with the central point, and central spot field of direction direction is an x axle positive dirction, rotates counterclockwise 90 ° and is y axle positive dirction, sets up plane right-angle coordinate;
(1.2) be as the criterion with the coordinate system in the step (1.1), extract the coordinate information M of all bifurcations in the minutiae point in the biometric templates i(x i, y i), wherein i is an integer;
(1.3), calculate to each bifurcation i
Figure FSA00000273593600011
ρ iThe expression fingerprint minutiae is to the distance of central point, and setting threshold P, works as ρ iDuring<P, this point enters the processing sequence, otherwise discards the information of this point, and wherein i is an integer;
(1.4) the unimodular value C of x axle and y axle in the setting coordinate system xAnd C y, then, calculate the positional information of each bifurcation i in matrix A id (x ', y '), computing method are as follows:
x &prime; y &prime; = ( x i + P ) / C x ( y i + P ) / C y
(1.5), behavior x ' among the matrix A id and the element value of classifying y ' as are defined as 1, and other element value among the matrix A id is defined as 0 according to the position of each bifurcation i in the step (1.4) in matrix A id (x ', y ');
(2) use the random number seed token that sets in the token of user's input and each row element of matrix A id to carry out XOR by turn, obtain matrix with matrix A id homotype as auxiliary data HelperData;
(3), generate biological Hash code word BiohashCode based on auxiliary data HelperData and original Biohashing algorithm:
(3.1) each capable being input in the original Biohashing algorithm as random seed among the auxiliary data HelperData is gone;
(3.2) with each row of auxiliary data HelperData as the token in the original Biohashing algorithm, generate a cryptographic hash Code by original Biohashing algorithm;
(3.3) with the sequencing of all cryptographic hash Code, combine, form final biological Hash code word BiohashCode according to generation.
CN 201010284596 2010-09-16 2010-09-16 Method for enhancing security of Biohashing system Expired - Fee Related CN101976312B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 201010284596 CN101976312B (en) 2010-09-16 2010-09-16 Method for enhancing security of Biohashing system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 201010284596 CN101976312B (en) 2010-09-16 2010-09-16 Method for enhancing security of Biohashing system

Publications (2)

Publication Number Publication Date
CN101976312A true CN101976312A (en) 2011-02-16
CN101976312B CN101976312B (en) 2012-09-26

Family

ID=43576197

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 201010284596 Expired - Fee Related CN101976312B (en) 2010-09-16 2010-09-16 Method for enhancing security of Biohashing system

Country Status (1)

Country Link
CN (1) CN101976312B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102394896A (en) * 2011-12-13 2012-03-28 甘肃农业大学 Privacy-protection fingerprint authentication method and system based on token
CN104029654A (en) * 2014-05-30 2014-09-10 江苏大学 Car anti-theft method and system based on fingerprint secret key encryption technology
CN104954127A (en) * 2014-03-27 2015-09-30 阿里巴巴集团控股有限公司 Authorization method, biological characteristic information sending method and apparatus
CN104951680A (en) * 2014-03-27 2015-09-30 阿里巴巴集团控股有限公司 Biological characteristic information processing method, storage method and device

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7274804B2 (en) * 2002-05-30 2007-09-25 Activcard Ireland Limited Method and apparatus for hashing data
CN101079101A (en) * 2007-06-19 2007-11-28 中山大学 Zernike moment based robust hashing image authentification method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7274804B2 (en) * 2002-05-30 2007-09-25 Activcard Ireland Limited Method and apparatus for hashing data
CN101079101A (en) * 2007-06-19 2007-11-28 中山大学 Zernike moment based robust hashing image authentification method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
《Pattern Recognition》 20061231 Adams Kong 等 An analysis of BioHashing and its variants 1359-1368 1 , 2 *
《软件学报》 20090630 李鹏 等 生物特征模板保护 1553-1557 1 第20卷, 第6期 2 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102394896A (en) * 2011-12-13 2012-03-28 甘肃农业大学 Privacy-protection fingerprint authentication method and system based on token
CN104954127A (en) * 2014-03-27 2015-09-30 阿里巴巴集团控股有限公司 Authorization method, biological characteristic information sending method and apparatus
CN104951680A (en) * 2014-03-27 2015-09-30 阿里巴巴集团控股有限公司 Biological characteristic information processing method, storage method and device
CN104951680B (en) * 2014-03-27 2019-06-07 阿里巴巴集团控股有限公司 A kind of biological information processing method, store method and device
CN110119608A (en) * 2014-03-27 2019-08-13 阿里巴巴集团控股有限公司 A kind of biological information processing method, biological information store method and device
CN104029654A (en) * 2014-05-30 2014-09-10 江苏大学 Car anti-theft method and system based on fingerprint secret key encryption technology

Also Published As

Publication number Publication date
CN101976312B (en) 2012-09-26

Similar Documents

Publication Publication Date Title
Lee et al. Biometric key binding: Fuzzy vault based on iris images
Ferrara et al. Noninvertible minutia cylinder-code representation
Nandakumar et al. Fingerprint-based fuzzy vault: Implementation and performance
Hao et al. Combining cryptography with biometrics effectively
Lee et al. A new method for generating an invariant iris private key based on the fuzzy vault system
Jagadeesan et al. Cryptographic key generation from multiple biometric modalities: Fusing minutiae with iris feature
Yang et al. Cancelable fingerprint templates with delaunay triangle-based local structures
US9152779B2 (en) Protecting codes, keys and user credentials with identity and patterns
CN101674299B (en) Method for generating key
CN102510330B (en) Novel fuzzy vault method based on fingerprint characteristic data and matching algorithm
CN106936586A (en) A kind of biological secret key extracting method based on fingerprint bit string and Error Correction of Coding
Yang et al. A delaunay triangle-based fuzzy extractor for fingerprint authentication
Eskander et al. A bio-cryptographic system based on offline signature images
Cavoukian et al. Biometric encryption: The new breed of untraceable biometrics
CN103646199B (en) A kind of based on the auth method of nine grids password and facial image
Li et al. Generating cancelable palmprint templates via coupled nonlinear dynamic filters and multiple orientation palmcodes
Liu et al. Minutiae and modified biocode fusion for fingerprint-based key generation
CN102609677A (en) Biological characteristic cryptographic system based on fingerprint and error correcting code
US11120255B2 (en) Systems and methods for a multifactor user identification and authentication framework for in-air-handwriting with hand geometry and deep hashing
Ali et al. Securing biometric user template using modified minutiae attributes
Tran et al. Biometrics and privacy-preservation: How do they evolve?
CN101976312B (en) Method for enhancing security of Biohashing system
CN106156738A (en) A kind of read method of the automotive license plate ciphertext graph picture of band encryption QR Quick Response Code
Ranjan et al. Improved and innovative key generation algorithms for biometric cryptosystems
Balakumar et al. Secure biometric key generation scheme for cryptography using combined biometric features of fingerprint and iris

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20120926

Termination date: 20140916

EXPY Termination of patent right or utility model