[go: up one dir, main page]

CN119203104A - Application startup method and system based on fingerprint recognition - Google Patents

Application startup method and system based on fingerprint recognition Download PDF

Info

Publication number
CN119203104A
CN119203104A CN202411709613.2A CN202411709613A CN119203104A CN 119203104 A CN119203104 A CN 119203104A CN 202411709613 A CN202411709613 A CN 202411709613A CN 119203104 A CN119203104 A CN 119203104A
Authority
CN
China
Prior art keywords
image
fingerprint
watermark
component value
initial
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202411709613.2A
Other languages
Chinese (zh)
Inventor
马亚男
张少华
廖晰
祝家军
乔岳
李春虎
张文婷
树昱
张耀文
张逸琦
徐腾
杨涛
林桐
江鹏
张力达
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ziguang Modu Education Technology Co ltd
Original Assignee
Ziguang Modu Education Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ziguang Modu Education Technology Co ltd filed Critical Ziguang Modu Education Technology Co ltd
Priority to CN202411709613.2A priority Critical patent/CN119203104A/en
Publication of CN119203104A publication Critical patent/CN119203104A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/20Image preprocessing
    • G06V10/28Quantising the image, e.g. histogram thresholding for discrimination between background and foreground patterns
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints
    • G06V40/1347Preprocessing; Feature extraction
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints
    • G06V40/1365Matching; Classification

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Technology Law (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The application provides an application starting method and system based on fingerprint identification, wherein the method comprises the steps of obtaining fingerprint images of related users, carrying out gray level processing on the fingerprint images to obtain gray level images, preprocessing the gray level images to obtain preprocessed images, extracting corresponding required image features from the preprocessed images, carrying out one-by-one matching on the required image features and a plurality of watermark images in a prerecorded fingerprint library through intelligent contracts, associating at least one software application with the watermark images, storing corresponding association relations in a blockchain, displaying current software applications associated with the watermark images successfully matched when the matching is successful, selecting target software applications from the current software applications based on requirements, and starting and automatically logging in the target software applications. The method and the device are beneficial to improving the flexibility of the software application starting operation and the convenience of the software application starting operation.

Description

Application starting method and system based on fingerprint identification
Technical Field
The invention relates to the technical field of electronic equipment application, in particular to an application starting method and system based on fingerprint identification.
Background
At present, in order to realize login in software, the traditional mode is to input account names and passwords, the mode is inconvenient to input on a touch screen, the password is not safe enough to input in public places, the mode is also to use a mobile phone which is popular at present to scan two-dimension codes to log in, but the mode is required to require computers to be networked, and is influenced by network speed, experience is possibly unstable, the mode is to use an external fingerprint identification module to automatically log in through fingerprints by binding fingerprint and account information, but the mode can cause all login information to be stored in the external fingerprint module, the login information has a binding relation with the corresponding fingerprint module, if the module is replaced or lost, the binding relation between the fingerprints and the account is required to be re-input, the mode is inflexible, and the premise of login is that the corresponding software is required to be found and opened on equipment, so that the mode is often not convenient for public scenes such as a teacher to learn.
Disclosure of Invention
Based on the above, the invention aims to provide an application starting method and system based on fingerprint identification, so as to solve the defects in the prior art.
In order to achieve the above object, the present invention provides an application starting method based on fingerprint identification, the method comprising:
acquiring a fingerprint image of a related user, and carrying out graying treatment on the fingerprint image to obtain a gray image;
preprocessing the gray level image to obtain a preprocessed image;
Extracting corresponding required image features from the preprocessed image, and matching the required image features with a plurality of watermark images in a prerecorded fingerprint library one by one through an intelligent contract, wherein the watermark images are associated with at least one software application, and corresponding association relations are stored in a blockchain;
And when the matching is successful, displaying the current software application associated with the watermark image which is successfully matched, selecting a target software application from the current software applications based on requirements, and starting and automatically logging in the target software application.
Preferably, before the required image features are matched with the watermark images in the prerecorded fingerprint library one by one through the intelligent contract, the method further comprises:
collecting a fingerprint image of a user, acquiring a gray level image corresponding to the fingerprint image, and respectively acquiring pixel values of the fingerprint image and the gray level image;
Calculating an initial pixel value based on the pixel values of the fingerprint image and the gray level image through an embedded intervention algorithm, and obtaining an initial watermark image based on the initial pixel value;
Acquiring pixel values of the initial watermark image, calculating the latest pixel value based on the pixel values of the initial watermark image and the fingerprint image, and acquiring the watermark image corresponding to the fingerprint image based on the latest pixel value;
And storing the fingerprint image and the corresponding watermark image into a block chain.
Preferably, the expression of the embedded intervention algorithm is as follows:
Wherein, For the red component value of the initial watermark image,For the green component value of the initial watermark image,For the blue component value of the initial watermark image,For the red component value of the fingerprint image,For the green component value of the fingerprint image,For the blue component value of the fingerprint image,For the red component value of the gray scale image,For the green component value of the gray scale image,For the blue component value of the gray scale image,For embedding intervention coefficients.
Preferably, the step of preprocessing the gray-scale image includes:
performing image enhancement processing on the gray level image to obtain an enhanced fingerprint image;
Performing binarization processing on the enhanced fingerprint image to obtain a binary image;
and carrying out refinement treatment on the binary image to obtain a preprocessed image.
Preferably, the step of extracting the corresponding required image features from the preprocessed image comprises:
extracting an original detail characteristic point set from the preprocessed image;
analyzing the original detail characteristic point set to obtain a distribution rule of characteristic points of the fingerprint image;
And screening the pseudo feature points based on the line direction of the fingerprint image and the distribution rule of the feature points to obtain real feature points, wherein the real feature points are the required image features.
Preferably, after the required image features are matched with the watermark images in the prerecorded fingerprint library one by one through the intelligent contract, the method comprises the following steps:
and when the matching fails, judging that the corresponding user matched with the fingerprint image is an illegal user, and restoring the display interface to an initial state.
Preferably, before the selecting, based on the requirement, the target software application from the current software applications, the method further includes:
And logging in the software application in advance, and automatically storing corresponding account information.
In order to achieve the above object, the present invention further provides an application starting system based on fingerprint identification, for implementing the application starting method based on fingerprint identification described in the above, where the system includes:
The acquisition module is used for acquiring a fingerprint image of a related user and carrying out graying treatment on the fingerprint image so as to obtain a gray image;
The preprocessing module is used for preprocessing the gray level image to obtain a preprocessed image;
The matching module is used for extracting corresponding required image features from the preprocessed image, and matching the required image features with a plurality of watermark images in a prerecorded fingerprint library one by one, wherein the watermark images are associated with at least one software application, and corresponding association relations are stored in a blockchain;
And the starting module is used for displaying the current software application associated with the watermark image which is successfully matched when the matching is successful, selecting a target software application from the current software applications based on requirements, and starting and automatically logging in the target software application.
Preferably, before the matching module, the system further includes:
The acquisition module is used for acquiring a fingerprint image of a user, acquiring a gray image corresponding to the fingerprint image, and respectively acquiring pixel values of the fingerprint image and the gray image;
The first calculation module is used for calculating an initial pixel value based on the pixel values of the fingerprint image and the gray level image through an embedded intervention algorithm and obtaining an initial watermark image based on the initial pixel value;
The second calculation module is used for acquiring pixel values of the initial watermark image, calculating the latest pixel value based on the pixel values of the initial watermark image and the fingerprint image, and acquiring the watermark image corresponding to the fingerprint image based on the latest pixel value;
and the storage module is used for storing the fingerprint image and the corresponding watermark image into a blockchain.
Preferably, the expression of the embedded intervention algorithm is as follows:
Wherein, For the red component value of the initial watermark image,For the green component value of the initial watermark image,For the blue component value of the initial watermark image,For the red component value of the fingerprint image,For the green component value of the fingerprint image,For the blue component value of the fingerprint image,For the red component value of the gray scale image,For the green component value of the gray scale image,For the blue component value of the gray scale image,For embedding intervention coefficients.
The fingerprint module is used for acquiring a corresponding gray level image by carrying out gray level processing on a fingerprint image of a related user, then carrying out preprocessing on the gray level image to acquire a preprocessed image, extracting corresponding required image characteristics from the preprocessed image, carrying out one-by-one matching on the required image characteristics and a plurality of watermark images in a prerecorded fingerprint library through an intelligent contract, associating the watermark images with software applications, storing association relations in a blockchain, displaying the current software application associated with the successfully matched watermark images when the matching is successful, selecting a target software application from the current software application based on requirements, and then starting and automatically logging in the target software application.
Additional aspects and advantages of the invention will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention.
Drawings
FIG. 1 is a flowchart of an application start method based on fingerprint identification according to a first embodiment of the present invention;
fig. 2 is a block diagram of an application starting system based on fingerprint recognition according to a second embodiment of the present invention.
The invention will be further described in the following detailed description in conjunction with the above-described figures.
Detailed Description
The present application will be described and illustrated with reference to the accompanying drawings and examples in order to make the objects, technical solutions and advantages of the present application more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the application. All other embodiments, which can be made by a person of ordinary skill in the art based on the embodiments provided by the present application without making any inventive effort, are intended to fall within the scope of the present application.
It is apparent that the drawings in the following description are only some examples or embodiments of the present application, and it is possible for those of ordinary skill in the art to apply the present application to other similar situations according to these drawings without inventive effort. Moreover, it should be appreciated that while such a development effort might be complex and lengthy, it would nevertheless be a routine undertaking of design, fabrication, or manufacture for those of ordinary skill having the benefit of this disclosure, and thus should not be construed as having the benefit of this disclosure.
Reference in the specification to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment may be included in at least one embodiment of the application. The appearances of such phrases in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is to be expressly and implicitly understood by those of ordinary skill in the art that the described embodiments of the application can be combined with other embodiments without conflict.
Unless defined otherwise, technical or scientific terms used herein should be given the ordinary meaning as understood by one of ordinary skill in the art to which this application belongs. The terms "a," "an," "the," and similar referents in the context of the application are not to be construed as limiting the quantity, but rather as singular or plural. The terms "comprises," "comprising," "includes," "including," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or modules (elements) is not limited to only those steps or elements but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus. The terms "connected," "coupled," and the like in connection with the present application are not limited to physical or mechanical connections, but may include electrical connections, whether direct or indirect. The term "plurality" as used herein means two or more. "and/or" describes the association relationship of the association object, and indicates that three relationships may exist, for example, "a and/or B" may indicate that a exists alone, a and B exist simultaneously, and B exists alone. The character "/" generally indicates that the context-dependent object is an "or" relationship. The terms "first," "second," "third," and the like, as used herein, are merely distinguishing between similar objects and not representing a particular ordering of objects.
Referring to fig. 1, a flowchart of an application starting method based on fingerprint identification in a first embodiment of the present invention is shown, and the application starting method based on fingerprint identification includes the following steps:
Step S101, acquiring a fingerprint image of a related user, and carrying out graying treatment on the fingerprint image to obtain a gray image;
if the fingerprint image is a color image, the gray value of the gray image needs to be calculated according to the following gray pixel calculation formula, and then the subsequent processing is performed.
It should be noted that the gray pixel calculation formula is as follows:
Wherein, For the red component value of the fingerprint image,For the green component value of the fingerprint image,For the blue component value of the fingerprint image,Is the gray value of the gray image.
Step S102, preprocessing the gray level image to obtain a preprocessed image;
And sequentially carrying out noise removal, binarization and refinement treatment on the gray level image to obtain a preprocessed image.
Step S103, extracting corresponding required image features from the preprocessed image, and matching the required image features with a plurality of watermark images in a prerecorded fingerprint library one by one through an intelligent contract, wherein the watermark images are associated with at least one software application, and corresponding association relations are stored in a blockchain;
The watermark image is obtained through corresponding processing of the fingerprint image, the fingerprint image corresponds to one watermark image, the watermark image is associated with at least one software application through an intelligent contract, the association between the watermark image and the software application can be ensured not to be tampered at will, the random replacement of a fingerprint module can be realized and the influence is not caused, and the association relation between the watermark image and the software application is stored in a blockchain.
And step S104, when the matching is successful, displaying the current software application associated with the watermark image which is successfully matched, selecting a target software application from the current software applications based on requirements, and starting and automatically logging in the target software application.
Before matching, each software application logs in advance and stores corresponding account information so that when the target software application is selected, the target software application can be started and automatically logged in.
Through the steps, the fingerprint images of related users are subjected to graying treatment to obtain corresponding gray images, then the gray images are preprocessed to obtain preprocessed images, corresponding image features are extracted from the preprocessed images, the image features are matched with a plurality of watermark images in a prerecorded fingerprint library one by one through intelligent contracts, the watermark images are associated with software applications, association relations are stored in a blockchain, when matching is successful, the current software application associated with the successfully matched watermark images is displayed, a target software application is selected from the current software application based on requirements, and then the target software application is started and automatically logged in.
In some embodiments, before the matching the required image features with the watermark images in the prerecorded fingerprint library one by one, the method further includes:
collecting a fingerprint image of a user, acquiring a gray level image corresponding to the fingerprint image, and respectively acquiring pixel values of the fingerprint image and the gray level image;
Wherein red, green and blue component values of the fingerprint image and the gray scale image need to be acquired, respectively.
Calculating an initial pixel value based on the pixel values of the fingerprint image and the gray level image through an embedded intervention algorithm, and obtaining an initial watermark image based on the initial pixel value;
The red component value, the green component value and the blue component value of the initial watermark image are calculated through the embedding intervention algorithm, namely, an initial pixel value is calculated, and at the moment, the initial watermark image is an image embedded with a watermark.
It should be noted that the expression of the embedded intervention algorithm is as follows:
Wherein, For the red component value of the initial watermark image,For the green component value of the initial watermark image,For the blue component value of the initial watermark image,For the red component value of the fingerprint image,For the green component value of the fingerprint image,For the blue component value of the fingerprint image,For the red component value of the gray scale image,For the green component value of the gray scale image,For the blue component value of the gray scale image,For embedding intervention coefficients.
Acquiring pixel values of the initial watermark image, calculating the latest pixel value based on the pixel values of the initial watermark image and the fingerprint image, and acquiring the watermark image corresponding to the fingerprint image based on the latest pixel value;
The process of calculating the latest pixel value is an inverse process of the process of calculating the initial pixel value, and the process of calculating the latest pixel value is specifically to calculate a difference value between the pixel value of the initial watermark image and the pixel value of the fingerprint image, wherein the difference value is a final pixel value of the watermark image, and the pixel value comprises a red component value, a green component value and a blue component value.
It should be noted that, the formula for calculating the latest pixel value is as follows:
Wherein, For the red component value of the watermark image,For the green component value of the watermark image,Is the blue component value of the watermark image.
And storing the fingerprint image and the corresponding watermark image into a block chain.
In some of these embodiments, the step of preprocessing the grayscale image includes:
performing image enhancement processing on the gray level image to obtain an enhanced fingerprint image;
The gray level image is divided into a plurality of area blocks, then the local direction of the ridge lines and the valley lines of each area block are obtained through the frequency domain processing after wavelet transformation, and the definition of the ridge lines and the valley lines of the fingerprint image is obtained based on the local direction of the ridge lines, so that the enhanced fingerprint image is obtained.
Performing binarization processing on the enhanced fingerprint image to obtain a binary image;
The binarization processing is performed to change the 256-level enhanced fingerprint image into a binary image, specifically, the binarization processing is performed on the enhanced fingerprint image by a thresholding method.
And carrying out refinement treatment on the binary image to obtain a preprocessed image.
In some of these embodiments, the step of extracting the corresponding desired image features from the preprocessed image comprises:
extracting an original detail characteristic point set from the preprocessed image;
analyzing the original detail characteristic point set to obtain a distribution rule of characteristic points of the fingerprint image;
And screening the pseudo feature points based on the line direction of the fingerprint image and the distribution rule of the feature points to obtain real feature points, wherein the real feature points are the required image features.
Because of various interference reasons, such as artificial noise introduced by preprocessing, or fracture and adhesion of lines which cannot be eliminated, characteristic points are obtained in the image characteristic extraction process, and part of pseudo characteristic points interfere with the accuracy of subsequent fingerprint matching, therefore, inferior pseudo characteristic points need to be screened out, real characteristic points are stored, and the real characteristic points are used as the required image characteristics.
In some embodiments, after the matching the required image features to the watermark images in the pre-recorded fingerprint library one by one, the method further comprises:
and when the matching fails, judging that the corresponding user matched with the fingerprint image is an illegal user, and restoring the display interface to an initial state.
In some of these embodiments, before the selecting the target software application from the current software applications based on the requirements, the method further comprises:
And logging in the software application in advance, and automatically storing corresponding account information.
It should be noted that the steps illustrated in the above-described flow or flow diagrams of the figures may be performed in a computer system, such as a set of computer-executable instructions, and that, although a logical order is illustrated in the flow diagrams, in some cases, the steps illustrated or described may be performed in an order other than that illustrated herein.
The second embodiment of the present application further provides an application starting system based on fingerprint identification, which is used for implementing the first embodiment and the preferred embodiment, and is not described in detail. As used below, the terms "module," "unit," "sub-unit," and the like may be a combination of software and/or hardware that implements a predetermined function. While the means described in the following embodiments are preferably implemented in software, implementation in hardware, or a combination of software and hardware, is also possible and contemplated.
Fig. 2 is a fingerprint recognition-based application starting system according to a second embodiment of the present application, as shown in fig. 2, the system includes:
the acquisition module 10 is used for acquiring a fingerprint image of a related user and carrying out graying treatment on the fingerprint image so as to obtain a gray image;
a preprocessing module 20, configured to preprocess the gray scale image to obtain a preprocessed image;
The matching module 30 is configured to extract corresponding required image features from the preprocessed image, and match the required image features with a plurality of watermark images in a prerecorded fingerprint library one by one through an intelligent contract, where the watermark images are associated with at least one software application, and the corresponding association relationships are stored in a blockchain;
And the starting module 40 is used for displaying the current software application associated with the watermark image which is successfully matched when the matching is successful, selecting a target software application from the current software applications based on requirements, and starting and automatically logging in the target software application.
In the implementation, the corresponding gray level image is obtained by carrying out gray level processing on the fingerprint image of the related user, then the gray level image is preprocessed to obtain the preprocessed image, the corresponding required image characteristics are extracted from the preprocessed image, the required image characteristics are matched with a plurality of watermark images in a prerecorded fingerprint library one by one through an intelligent contract, the watermark images are associated with the software application, the association relation is stored in a blockchain, when the matching is successful, the current software application associated with the successfully matched watermark image is displayed, the target software application is selected from the current software application based on the requirement, and then the target software application is started and automatically logged in.
In some of these embodiments, prior to the matching module 30, the system further comprises:
The acquisition module is used for acquiring a fingerprint image of a user, acquiring a gray image corresponding to the fingerprint image, and respectively acquiring pixel values of the fingerprint image and the gray image;
The first calculation module is used for calculating an initial pixel value based on the pixel values of the fingerprint image and the gray level image through an embedded intervention algorithm and obtaining an initial watermark image based on the initial pixel value;
The second calculation module is used for acquiring pixel values of the initial watermark image, calculating the latest pixel value based on the pixel values of the initial watermark image and the fingerprint image, and acquiring the watermark image corresponding to the fingerprint image based on the latest pixel value;
and the storage module is used for storing the fingerprint image and the corresponding watermark image into a blockchain.
In some of these embodiments, the expression of the embedded intervention algorithm is as follows:
Wherein, For the red component value of the initial watermark image,For the green component value of the initial watermark image,For the blue component value of the initial watermark image,For the red component value of the fingerprint image,For the green component value of the fingerprint image,For the blue component value of the fingerprint image,For the red component value of the gray scale image,For the green component value of the gray scale image,For the blue component value of the gray scale image,For embedding intervention coefficients.
In some of these embodiments, the preprocessing module 20 includes:
the enhancement unit is used for carrying out image enhancement processing on the gray level image to obtain an enhanced fingerprint image;
the binarization unit is used for carrying out binarization processing on the enhanced fingerprint image to obtain a binary image;
and the thinning unit is used for carrying out thinning treatment on the binary image to obtain a preprocessed image.
In some of these embodiments, the matching module 30 includes:
An extracting unit, configured to extract an original minutiae point set from the preprocessed image;
The analysis unit is used for analyzing the original detail characteristic point set to obtain a distribution rule of characteristic points of the fingerprint image;
And the screening unit is used for screening the pseudo feature points based on the line direction of the fingerprint image and the distribution rule of the feature points to obtain real feature points, wherein the real feature points are the features of the required image.
In some of these embodiments, after the matching module 30, the system further comprises:
And the recovery module is used for judging that the user matched with the corresponding fingerprint image is an illegal user when the matching fails, and recovering the display interface to an initial state.
In some of these embodiments, prior to the start-up module 40, the system further comprises:
and the storage module is used for logging in the software application in advance and automatically storing corresponding account information.
The technical features of the above-described embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above-described embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The above examples illustrate only a few embodiments of the application, which are described in detail and are not to be construed as limiting the scope of the application. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the application, which are all within the scope of the application. Accordingly, the scope of the application should be assessed as that of the appended claims.

Claims (10)

1.一种基于指纹识别的应用启动方法,其特征在于,所述方法包括:1. A fingerprint recognition-based application startup method, characterized in that the method comprises: 获取相关用户的指纹图像,并对所述指纹图像进行灰度化处理,以得到灰度图像;Acquire a fingerprint image of a relevant user, and perform grayscale processing on the fingerprint image to obtain a grayscale image; 对所述灰度图像进行预处理,得到预处理图像;Preprocessing the grayscale image to obtain a preprocessed image; 从所述预处理图像提取相应的需要图像特征,通过智能合约将所述需要图像特征与预录指纹库中的多个水印图像进行逐一匹配,其中,所述水印图像关联至少一个软件应用,且相应的关联关系存储于区块链中;Extracting corresponding required image features from the pre-processed image, and matching the required image features with a plurality of watermark images in the pre-recorded fingerprint library one by one through a smart contract, wherein the watermark image is associated with at least one software application, and the corresponding association relationship is stored in the blockchain; 当所述匹配成功时,显示出与匹配成功的所述水印图像所关联的当前软件应用,基于需求从所述当前软件应用中选出目标软件应用,启动并自动登录该目标软件应用。When the match is successful, the current software application associated with the successfully matched watermark image is displayed, and a target software application is selected from the current software applications based on demand, and the target software application is started and automatically logged in. 2.根据权利要求1所述的基于指纹识别的应用启动方法,其特征在于,所述通过智能合约将所述需要图像特征与预录指纹库中的多个水印图像进行逐一匹配之前,所述方法还包括:2. The fingerprint recognition-based application startup method according to claim 1, characterized in that before matching the required image features with multiple watermark images in the pre-recorded fingerprint library one by one through the smart contract, the method further comprises: 采集用户的指纹图像,获取所述指纹图像所对应的灰度图像,并分别获取所述指纹图像和所述灰度图像的像素值;Collecting a fingerprint image of a user, obtaining a grayscale image corresponding to the fingerprint image, and respectively obtaining pixel values of the fingerprint image and the grayscale image; 基于所述指纹图像和所述灰度图像的像素值,并通过嵌入干预算法计算得到初始像素值,基于所述初始像素值得到初始水印图像;Based on the pixel values of the fingerprint image and the grayscale image, an initial pixel value is calculated by an embedded intervention algorithm, and an initial watermark image is obtained based on the initial pixel value; 获取所述初始水印图像的像素值,基于所述初始水印图像和所述指纹图像的像素值计算出最新像素值,基于所述最新像素值获取所述指纹图像所对应的水印图像;Obtaining pixel values of the initial watermark image, calculating latest pixel values based on the pixel values of the initial watermark image and the fingerprint image, and obtaining the watermark image corresponding to the fingerprint image based on the latest pixel values; 将所述指纹图像和对应的所述水印图像皆存储至区块链中。The fingerprint image and the corresponding watermark image are both stored in the blockchain. 3.根据权利要求2所述的基于指纹识别的应用启动方法,其特征在于,所述嵌入干预算法的表达式如下所示:3. The fingerprint recognition-based application startup method according to claim 2, characterized in that the expression of the embedded intervention algorithm is as follows: 其中,为所述初始水印图像的红色分量值,为所述初始水印图像的绿色分量值,为所述初始水印图像的蓝色分量值,为所述指纹图像的红色分量值,为所述指纹图像的绿色分量值,为所述指纹图像的蓝色分量值,为所述灰度图像的红色分量值,为所述灰度图像的绿色分量值,为所述灰度图像的蓝色分量值,为嵌入干预系数。in, is the red component value of the initial watermark image, is the green component value of the initial watermark image, is the blue component value of the initial watermark image, is the red component value of the fingerprint image, is the green component value of the fingerprint image, is the blue component value of the fingerprint image, is the red component value of the grayscale image, is the green component value of the grayscale image, is the blue component value of the grayscale image, is the embedded intervention coefficient. 4.根据权利要求1所述的基于指纹识别的应用启动方法,其特征在于,所述对所述灰度图像进行预处理的步骤包括:4. The fingerprint recognition-based application startup method according to claim 1, wherein the step of preprocessing the grayscale image comprises: 对所述灰度图像进行图像增强处理,得到强化指纹图像;Performing image enhancement processing on the grayscale image to obtain an enhanced fingerprint image; 对所述强化指纹图像进行二值化处理,得到二值图像;Binarizing the enhanced fingerprint image to obtain a binary image; 对所述二值图像进行细化处理,得到预处理图像。The binary image is subjected to thinning processing to obtain a preprocessed image. 5.根据权利要求1所述的基于指纹识别的应用启动方法,其特征在于,所述从所述预处理图像提取相应的需要图像特征的步骤包括:5. The fingerprint recognition-based application startup method according to claim 1, wherein the step of extracting the corresponding required image features from the pre-processed image comprises: 从所述预处理图像上提取原始细节特征点集;Extracting an original detail feature point set from the preprocessed image; 对所述原始细节特征点集进行分析,得到该指纹图像的特征点的分布规律;Analyze the original detail feature point set to obtain the distribution law of the feature points of the fingerprint image; 基于所述指纹图像的纹线方向和所述特征点的分布规律对伪特征点进行筛除,得到真实特征点,其中,所述真实特征点为所述需要图像特征。Based on the ridge direction of the fingerprint image and the distribution pattern of the feature points, pseudo feature points are screened out to obtain real feature points, wherein the real feature points are the required image features. 6.根据权利要求1所述的基于指纹识别的应用启动方法,其特征在于,所述通过智能合约将所述需要图像特征与预录指纹库中的多个水印图像进行逐一匹配之后,所述方法包括:6. The fingerprint recognition-based application startup method according to claim 1, characterized in that after matching the required image features with multiple watermark images in the pre-recorded fingerprint library one by one through the smart contract, the method comprises: 当匹配失败时,判断相对应的所述指纹图像所匹配的用户为非法用户,并将显示界面恢复至初始状态。When the matching fails, it is determined that the user matched by the corresponding fingerprint image is an illegal user, and the display interface is restored to an initial state. 7.根据权利要求1所述的基于指纹识别的应用启动方法,其特征在于,所述基于需求从所述当前软件应用中选出目标软件应用之前,所述方法还包括:7. The fingerprint recognition-based application startup method according to claim 1, characterized in that before selecting the target software application from the current software applications based on demand, the method further comprises: 预先登录所述软件应用,并自动保存相应的账户信息。The software application is pre-logged in and the corresponding account information is automatically saved. 8.一种基于指纹识别的应用启动系统,用于实现权利要求1-7任一项所述的基于指纹识别的应用启动方法,其特征在于,所述系统包括:8. A fingerprint recognition-based application startup system, used to implement the fingerprint recognition-based application startup method according to any one of claims 1 to 7, characterized in that the system comprises: 获取模块,用于获取相关用户的指纹图像,并对所述指纹图像进行灰度化处理,以得到灰度图像;An acquisition module, used for acquiring a fingerprint image of a relevant user, and graying the fingerprint image to obtain a grayscale image; 预处理模块,用于对所述灰度图像进行预处理,得到预处理图像;A preprocessing module, used for preprocessing the grayscale image to obtain a preprocessed image; 匹配模块,用于从所述预处理图像提取相应的需要图像特征,通过智能合约将所述需要图像特征与预录指纹库中的多个水印图像进行逐一匹配,其中,所述水印图像关联至少一个软件应用,且相应的关联关系存储于区块链中;A matching module, used to extract corresponding required image features from the pre-processed image, and match the required image features with multiple watermark images in the pre-recorded fingerprint library one by one through a smart contract, wherein the watermark image is associated with at least one software application, and the corresponding association relationship is stored in the blockchain; 启动模块,用于当所述匹配成功时,显示出与匹配成功的所述水印图像所关联的当前软件应用,基于需求从所述当前软件应用中选出目标软件应用,启动并自动登录该目标软件应用。The startup module is used to display the current software application associated with the successfully matched watermark image when the match is successful, select a target software application from the current software applications based on demand, and start and automatically log in to the target software application. 9.根据权利要求8所述的一种基于指纹识别的应用启动系统,其特征在于,所述匹配模块之前,所述系统还包括:9. The fingerprint recognition-based application startup system according to claim 8, characterized in that before the matching module, the system further comprises: 采集模块,用于采集用户的指纹图像,获取所述指纹图像所对应的灰度图像,并分别获取所述指纹图像和所述灰度图像的像素值;An acquisition module is used to acquire a fingerprint image of a user, obtain a grayscale image corresponding to the fingerprint image, and respectively obtain pixel values of the fingerprint image and the grayscale image; 第一计算模块,用于基于所述指纹图像和所述灰度图像的像素值,并通过嵌入干预算法计算得到初始像素值,基于所述初始像素值得到初始水印图像;A first calculation module, configured to obtain an initial pixel value based on the pixel values of the fingerprint image and the grayscale image and by using an embedded intervention algorithm, and obtain an initial watermark image based on the initial pixel value; 第二计算模块,用于获取所述初始水印图像的像素值,基于所述初始水印图像和所述指纹图像的像素值计算出最新像素值,基于所述最新像素值获取所述指纹图像所对应的水印图像;A second calculation module is used to obtain pixel values of the initial watermark image, calculate the latest pixel value based on the pixel values of the initial watermark image and the fingerprint image, and obtain the watermark image corresponding to the fingerprint image based on the latest pixel value; 存储模块,用于将所述指纹图像和对应的所述水印图像皆存储至区块链中。The storage module is used to store the fingerprint image and the corresponding watermark image in the blockchain. 10.根据权利要求9所述的基于指纹识别的应用启动系统,其特征在于,所述嵌入干预算法的表达式如下所示:10. The fingerprint recognition-based application startup system according to claim 9, characterized in that the expression of the embedded intervention algorithm is as follows: 其中,为所述初始水印图像的红色分量值,为所述初始水印图像的绿色分量值,为所述初始水印图像的蓝色分量值,为所述指纹图像的红色分量值,为所述指纹图像的绿色分量值,为所述指纹图像的蓝色分量值,为所述灰度图像的红色分量值,为所述灰度图像的绿色分量值,为所述灰度图像的蓝色分量值,为嵌入干预系数。in, is the red component value of the initial watermark image, is the green component value of the initial watermark image, is the blue component value of the initial watermark image, is the red component value of the fingerprint image, is the green component value of the fingerprint image, is the blue component value of the fingerprint image, is the red component value of the grayscale image, is the green component value of the grayscale image, is the blue component value of the grayscale image, is the embedded intervention coefficient.
CN202411709613.2A 2024-11-27 2024-11-27 Application startup method and system based on fingerprint recognition Pending CN119203104A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202411709613.2A CN119203104A (en) 2024-11-27 2024-11-27 Application startup method and system based on fingerprint recognition

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202411709613.2A CN119203104A (en) 2024-11-27 2024-11-27 Application startup method and system based on fingerprint recognition

Publications (1)

Publication Number Publication Date
CN119203104A true CN119203104A (en) 2024-12-27

Family

ID=94057085

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202411709613.2A Pending CN119203104A (en) 2024-11-27 2024-11-27 Application startup method and system based on fingerprint recognition

Country Status (1)

Country Link
CN (1) CN119203104A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103329147A (en) * 2010-11-04 2013-09-25 数字标记公司 Smartphone-based method and system
CN109583356A (en) * 2018-11-23 2019-04-05 Oppo广东移动通信有限公司 Fingerprint identification method and Related product
CN110059552A (en) * 2019-03-12 2019-07-26 上海大学 A kind of identity identifying method of block chain in conjunction with biological characteristic
CN110188697A (en) * 2019-05-31 2019-08-30 山东省计算中心(国家超级计算济南中心) A blockchain-based fingerprint recognition management system and method
US20220207124A1 (en) * 2020-12-30 2022-06-30 Assa Abloy Ab Embedded encrypted watermark in photograph or facial recognition template to ensure authenticity

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103329147A (en) * 2010-11-04 2013-09-25 数字标记公司 Smartphone-based method and system
CN109583356A (en) * 2018-11-23 2019-04-05 Oppo广东移动通信有限公司 Fingerprint identification method and Related product
CN110059552A (en) * 2019-03-12 2019-07-26 上海大学 A kind of identity identifying method of block chain in conjunction with biological characteristic
CN110188697A (en) * 2019-05-31 2019-08-30 山东省计算中心(国家超级计算济南中心) A blockchain-based fingerprint recognition management system and method
US20220207124A1 (en) * 2020-12-30 2022-06-30 Assa Abloy Ab Embedded encrypted watermark in photograph or facial recognition template to ensure authenticity

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
冯茂岩等: "基于指纹特征数据的水印技术研究", 计算机科学, vol. 35, no. 4, 23 June 2008 (2008-06-23), pages 3 *
刘修文编: "《新形态立体化十三五职业教育国家规划教材 物联网技术应用 智能家居 第3版》", 31 January 2023, 北京:机械工业出版社, pages: 65 *
曾照华,白富强著: "《人工智能核心技术解析及发展研究》", 31 March 2023, 成都:电子科技大学出版社, pages: 162 *

Similar Documents

Publication Publication Date Title
CN110543815B (en) Training method of face recognition model, face recognition method, device, equipment and storage medium
US11830230B2 (en) Living body detection method based on facial recognition, and electronic device and storage medium
CN108399405B (en) Business license identification method and device
CN112437926B (en) Fast and robust friction ridge imprint detail extraction using feed-forward convolutional neural network
CN108734185B (en) Image verification method and device
CN108288012B (en) Artwork filing verification method and system based on mobile phone
WO2008044026A1 (en) Image descriptor for image recognition
CN112650875A (en) House image verification method and device, computer equipment and storage medium
CN111079816A (en) Image auditing method and device and server
CN114140427B (en) Object detection method and device
CN112464873B (en) Model training method, face liveness recognition method, system, device and medium
CN112507897A (en) Cross-modal face recognition method, device, equipment and storage medium
CN115687670A (en) Image searching method and device, computer readable storage medium and electronic equipment
CN112287945A (en) Screen fragmentation determination method and device, computer equipment and computer readable storage medium
CN115083006A (en) Iris recognition model training method, iris recognition method and iris recognition device
CN114329405A (en) Online operation marketing popularization system
CN113792789A (en) Image tampering detection and positioning method and system based on class activation thermodynamic diagram
CN114549892A (en) Image processing method and device and computer equipment
CN113920550A (en) Finger authenticity identification method, electronic device and storage medium
WO2024260134A1 (en) Palmprint picture generation method and apparatus, storage medium, program product, and electronic device
CN119203104A (en) Application startup method and system based on fingerprint recognition
CN113221842A (en) Model training method, image recognition method, device, equipment and medium
WO2018137226A1 (en) Fingerprint extraction method and device
CN114743047B (en) Image recognition method, device, electronic device and storage medium
CN111986176B (en) Crack image identification method, system, terminal and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination