Fingerprint identity authentication system has been widely used in access control, payment, public security and other fields. Existing systems typically store original fingerprint images or features in a database to identify or authenticate users’ identity. Fingerprint data in the database is at risk of being attacked or tampered with. In order to solve this problem, this paper proposes a fingerprint identification system based on editable blockchain. Firstly, we build a private chain environment, achieve multi-node cluster interconnection, and then calculate the fingerprint hash and store it in the blockchain. In order to facilitate the administrator to update the users in the fingerprint identification system, this paper uses the chameleon hash algorithm to calculate the hash of the constructed private chain block. The administrator who owns the chameleon hash private key can edit the information in the block body to implement deletion or modification of the user fingerprint data without changing the blockchain structure. Experiments show that the proposed system has good real-time performance and high accuracy of fingerprint recognition.
ZHU Yanyan, LI Sheng, FENG Guorui, ZHANG Xinpeng
. Fingerprint Recognition System Based on Editable Blockchain[J]. Journal of Applied Sciences, 2021
, 39(2)
: 330
-337
.
DOI: 10.3969/j.issn.0255-8297.2021.02.015
[1] 新加坡网络空间安全战略[J]. 汕头大学学报(人文社会科学版), 2016, 32(6):157. Singapore's cybersecurity strategy[J]. Editorial Department of Shantou University Journal (Humanities and Social Sciences Edition), 2016, 32(6):157. (in Chinese)
[2] Nakamoto S. Bitcoin:a peer-to-peer electronic cash system[EB/OL].[2019-10-29]. https://bitcoin.org/en/bitcoin-paper.
[3] Zheng Z, Xie S, Dai H, et al. An overview of blockchain technology:architecture, consensus, and future trends[C]//2017 IEEE International Congress on Big Data (BigData Congress). IEEE, 2017:557-564.
[4] 周致成, 李立新, 郭松, 等. 基于区块链技术的生物特征和口令双因子跨域认证方案[J]. 计算机应用, 2018, 38(6):1620-1627. Zhou Z C, Li L X, Guo S, et al. Bi-factor crossdomain authentication scheme of biometrics and password based on blockchain technology[J]. Computer Application, 2018, 38(6):1620-1627. (in Chinese)
[5] 吕婧淑, 操晓春, 杨培. 基于区块链和人脸识别的双因子身份认证模型[J]. 应用科学学报, 2019, 37(2):164-178. Lü J S, Cao X C, Yang P. Two-factor identity authentication model based on blockchain ande face recognition[J]. Journal of Applied Sciences, 2019, 37(2):164-178. (in Chinese)
[6] Cappelli R, Ferrara M, Maltoni D. Fingerprint indexing based on minutia cylinder-code[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2010, 33(5):1051-1057.
[7] Cappelli R, Ferrara M, Maltoni D. Minutia cylinder-code:a new representation and matching technique for fingerprint recognition[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2010, 32(12):2128-2141.
[8] Kim J, Teoh A B J. One-factor cancellable biometrics based on indexing-first-order hashing for fingerprint authentication[C]//International Conference on Pattern Recognition (ICPR). IEEE, 2018:3108-3113.
[9] Jin Z, Lim M H, Teoh A B J, et al. Generating fixed-length representation from minutiae using kernel methods for fingerprint authentication[J]. IEEE Transactions on Systems, Man, and Cybernetics:Systems, 2016, 46(10):1415-1428.
[10] Jin Z, Hwang J Y, Lai Y L, et al. Ranking-based locality sensitive hashing-enabled cancelable biometrics:index-of-max hashing[J]. IEEE Transactions on Information Forensics and Security, 2017, 13(2):393-407.
[11] Lee M J, Jin Z, Teoh A B J. One-factor cancellable scheme for fingerprint template protection:extended feature vector (EFV) hashing[C]//2018 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, 2018:1-7.
[12] Kho J B, Teoh A B J, Lee W, et al. Fixed-length bit-string representation of fingerprint by normalized local structures[DB/OL]. 2018[2019-10-29]. https://arxiv.org/abs/1811.11489.
[13] Krawczyk H, Rabin T. Chameleon hashing and signatures:US6108783[P]. 2000-08-22[2019-10-29].
[14] Ateniese G, Magri B, Venturi D, et al. Redactable blockchain-or-rewriting history in bitcoin and friends[C]//2017 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE, 2017:111-126.
[15] 李佩丽, 徐海霞, 马添军, 等. 可更改区块链技术研究[J]. 密码学报, 2018, 5(5):51-59. Li P L, Xu H X, Ma T J, et al. Research on changeable blockchain technology[J]. Journal of Cryptography, 2018, 5(5):51-59. (in Chinese)
[16] 任艳丽, 徐丹婷, 张新鹏, 等. 基于门限环签名的可删除区块链[J]. 通信学报, 2019, 40(4):71-82. Ren Y L, Xu D T, Zhang X P, et al. Deletable blockchain based on threshold ring signature[J]. Journal of Communication, 2019, 40(4):71-82. (in Chinese)