指纹识别系统已广泛应用于门禁、支付、公安等领域。现有系统一般将原始指纹图像或特征存储于数据库,以此对用户的身份进行识别或认证。数据库中的指纹数据存在被盗取或篡改的风险。为解决这一问题,本文提出一种基于可编辑区块链的指纹识别系统。首先搭建私有链环境,实现多节点集群互连,然后计算指纹哈希并将其存储于区块链。为了方便管理员对指纹识别系统中的用户进行更新,本文利用变色龙哈希算法对所构建的私有链区块体中数据计算哈希。拥有变色龙哈希私钥的管理员可对区块体中的信息进行编辑,从而在不改变区块链结构的基础上实现对用户指纹数据的删除或修改。实验表明,所提出的系统具有良好的实时性,且指纹识别准确率高。
Fingerprint identity authentication system has been widely used in access control, payment, public security and other fields. Existing systems typically store original fingerprint images or features in a database to identify or authenticate users’ identity. Fingerprint data in the database is at risk of being attacked or tampered with. In order to solve this problem, this paper proposes a fingerprint identification system based on editable blockchain. Firstly, we build a private chain environment, achieve multi-node cluster interconnection, and then calculate the fingerprint hash and store it in the blockchain. In order to facilitate the administrator to update the users in the fingerprint identification system, this paper uses the chameleon hash algorithm to calculate the hash of the constructed private chain block. The administrator who owns the chameleon hash private key can edit the information in the block body to implement deletion or modification of the user fingerprint data without changing the blockchain structure. Experiments show that the proposed system has good real-time performance and high accuracy of fingerprint recognition.
[1] 新加坡网络空间安全战略[J]. 汕头大学学报(人文社会科学版), 2016, 32(6):157. Singapore's cybersecurity strategy[J]. Editorial Department of Shantou University Journal (Humanities and Social Sciences Edition), 2016, 32(6):157. (in Chinese)
[2] Nakamoto S. Bitcoin:a peer-to-peer electronic cash system[EB/OL].[2019-10-29]. https://bitcoin.org/en/bitcoin-paper.
[3] Zheng Z, Xie S, Dai H, et al. An overview of blockchain technology:architecture, consensus, and future trends[C]//2017 IEEE International Congress on Big Data (BigData Congress). IEEE, 2017:557-564.
[4] 周致成, 李立新, 郭松, 等. 基于区块链技术的生物特征和口令双因子跨域认证方案[J]. 计算机应用, 2018, 38(6):1620-1627. Zhou Z C, Li L X, Guo S, et al. Bi-factor crossdomain authentication scheme of biometrics and password based on blockchain technology[J]. Computer Application, 2018, 38(6):1620-1627. (in Chinese)
[5] 吕婧淑, 操晓春, 杨培. 基于区块链和人脸识别的双因子身份认证模型[J]. 应用科学学报, 2019, 37(2):164-178. Lü J S, Cao X C, Yang P. Two-factor identity authentication model based on blockchain ande face recognition[J]. Journal of Applied Sciences, 2019, 37(2):164-178. (in Chinese)
[6] Cappelli R, Ferrara M, Maltoni D. Fingerprint indexing based on minutia cylinder-code[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2010, 33(5):1051-1057.
[7] Cappelli R, Ferrara M, Maltoni D. Minutia cylinder-code:a new representation and matching technique for fingerprint recognition[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2010, 32(12):2128-2141.
[8] Kim J, Teoh A B J. One-factor cancellable biometrics based on indexing-first-order hashing for fingerprint authentication[C]//International Conference on Pattern Recognition (ICPR). IEEE, 2018:3108-3113.
[9] Jin Z, Lim M H, Teoh A B J, et al. Generating fixed-length representation from minutiae using kernel methods for fingerprint authentication[J]. IEEE Transactions on Systems, Man, and Cybernetics:Systems, 2016, 46(10):1415-1428.
[10] Jin Z, Hwang J Y, Lai Y L, et al. Ranking-based locality sensitive hashing-enabled cancelable biometrics:index-of-max hashing[J]. IEEE Transactions on Information Forensics and Security, 2017, 13(2):393-407.
[11] Lee M J, Jin Z, Teoh A B J. One-factor cancellable scheme for fingerprint template protection:extended feature vector (EFV) hashing[C]//2018 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, 2018:1-7.
[12] Kho J B, Teoh A B J, Lee W, et al. Fixed-length bit-string representation of fingerprint by normalized local structures[DB/OL]. 2018[2019-10-29]. https://arxiv.org/abs/1811.11489.
[13] Krawczyk H, Rabin T. Chameleon hashing and signatures:US6108783[P]. 2000-08-22[2019-10-29].
[14] Ateniese G, Magri B, Venturi D, et al. Redactable blockchain-or-rewriting history in bitcoin and friends[C]//2017 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE, 2017:111-126.
[15] 李佩丽, 徐海霞, 马添军, 等. 可更改区块链技术研究[J]. 密码学报, 2018, 5(5):51-59. Li P L, Xu H X, Ma T J, et al. Research on changeable blockchain technology[J]. Journal of Cryptography, 2018, 5(5):51-59. (in Chinese)
[16] 任艳丽, 徐丹婷, 张新鹏, 等. 基于门限环签名的可删除区块链[J]. 通信学报, 2019, 40(4):71-82. Ren Y L, Xu D T, Zhang X P, et al. Deletable blockchain based on threshold ring signature[J]. Journal of Communication, 2019, 40(4):71-82. (in Chinese)