Iris confidential authentication method

An authentication method, iris technology, applied in the direction of homomorphic encryption communication, user identity/authority verification, complex mathematical operations, etc., can solve the problems of low overall performance and high complexity, and achieve good recognition accuracy, good computing efficiency and safety effect

Pending Publication Date: 2021-01-05
GUILIN UNIV OF ELECTRONIC TECH
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Although there are some biometric identification schemes with privacy protection features, the...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Iris confidential authentication method
  • Iris confidential authentication method
  • Iris confidential authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057]The following describes the implementation of the present invention through specific specific examples. Those skilled in the art can easily understand other advantages and effects of the present invention from the content disclosed in this specification. The present invention can also be implemented or applied through other different specific embodiments, and various details in this specification can also be modified or changed based on different viewpoints and applications without departing from the spirit of the present invention. It should be noted that the following embodiments and the features in the embodiments can be combined with each other if there is no conflict.

[0058]It should be noted that the illustrations provided in the following embodiments only illustrate the basic idea of ​​the present invention in a schematic manner. The figures only show the components related to the present invention instead of the number, shape, and number of components in actual implemen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an iris confidential authentication method, which comprises the following steps: acquiring a first to-be-authenticated iris feature matrix and a first mask matrix correspondingto the first iris feature matrix to form a first to-be-authenticated matrix; performing dimension reduction processing on the first to-be-authenticated matrix to obtain a second to-be-authenticated matrix; performing mapping processing on the second to-be-authenticated matrix to obtain an integer matrix; carrying out homomorphic encryption processing on the integer matrix to obtain a first encryption matrix; comparing the first encryption matrix with a second encryption matrix pre-stored in a database to obtain a comparison result, and completing iris authentication, wherein the second encryption matrix is obtained by encrypting the template matrix and the second mask matrix corresponding to the template matrix through a homomorphic encryption algorithm. According to the method, a randomprojection dimension reduction method and a better mapping method are adopted, so that the method has better calculation efficiency and safety. Besides, the mask information of the iris is considered,which is a factor which is not considered in most of other iris authentication schemes with privacy protection, so that better recognition accuracy can be obtained.

Description

Technical field[0001]The invention relates to the technical field of biometric identification, in particular to an iris confidential authentication method.Background technique[0002]Biometric identification technology has been widely used. Among them, iris recognition has been widely researched and deployed due to its high anti-counterfeiting and high accuracy.[0003]However, there is still no good solution to the data protection problem in biometric identification. The main problem at present is that most biometric identification technologies store and transmit user data in plain text. This has laid a huge hidden danger for data leakage. It is the most critical technical problem to realize the comparison of biological characteristics in the encrypted state.[0004]Although there are some biometric recognition schemes with privacy protection features, the overall performance is not high, especially for iris recognition technology with high complexity.Summary of the invention[0005]In vie...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/00G06K9/00G06F17/16
CPCH04L9/3231H04L9/008G06F17/16G06V40/197
Inventor 王会勇丁勇唐士杰韩波王继奎
Owner GUILIN UNIV OF ELECTRONIC TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products