Fingerprint Combination for Privacy Protection

被引:39
|
作者
Li, Sheng [1 ]
Kot, Alex C. [1 ]
机构
[1] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore 639798, Singapore
关键词
Combination; fingerprint; minutiae; privacy; protection;
D O I
10.1109/TIFS.2012.2234740
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We propose here a novel system for protecting fingerprint privacy by combining two different fingerprints into a new identity. In the enrollment, two fingerprints are captured from two different fingers. We extract the minutiae positions from one fingerprint, the orientation from the other fingerprint, and the reference points from both fingerprints. Based on this extracted information and our proposed coding strategies, a combined minutiae template is generated and stored in a database. In the authentication, the system requires two query fingerprints from the same two fingers which are used in the enrollment. A two-stage fingerprint matching process is proposed for matching the two query fingerprints against a combined minutiae template. By storing the combined minutiae template, the complete minutiae feature of a single fingerprint will not be compromised when the database is stolen. Furthermore, because of the similarity in topology, it is difficult for the attacker to distinguish a combined minutiae template from the original minutiae templates. With the help of an existing fingerprint reconstruction approach, we are able to convert the combined minutiae template into a real-look alike combined fingerprint. Thus, a new virtual identity is created for the two different fingerprints, which can be matched using minutiae-based finger-print matching algorithms. The experimental results show that our system can achieve a very low error rate with FRR = 0.4% at FAR = 0.1%. Compared with the state-of-the-art technique, our work has the advantage in creating a better new virtual identity when the two different fingerprints are randomly chosen.
引用
收藏
页码:350 / 360
页数:11
相关论文
共 50 条
  • [21] Group Coding Location Privacy Protection Method Based on Differential Privacy in Crowdsensing
    Wang, Taochun
    Tao, Yuan
    Zhang, Qiong
    Xu, Nuo
    Chen, Fulong
    Zhao, Chuanxin
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (17): : 28398 - 28408
  • [22] A Revocable Fingerprint Template for Security and Privacy Preserving
    Jin, Zhe
    Teoh, Andrew Beng Jin
    Ong, Thian Song
    Tee, Connie
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2010, 4 (06): : 1327 - 1342
  • [23] A Privacy Protection System in Context-aware Environment The Privacy Controller Module
    Hussain, Tahani
    Alawadhi, Ranya
    22ND INTERNATIONAL CONFERENCE ON INFORMATION INTEGRATION AND WEB-BASED APPLICATIONS & SERVICES (IIWAS2020), 2020, : 39 - 46
  • [24] Protection of privacy against protection of health
    Bjerkedal, T
    ACTA OBSTETRICIA ET GYNECOLOGICA SCANDINAVICA, 2000, 79 (06) : 520 - 522
  • [25] The Security and Privacy Protection of Hospital Information System
    Wang, Na
    Wang, Jin-guo
    3RD INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE AND DEVELOPMENT (ICSSD 2017), 2017, : 212 - 214
  • [26] Research on the Privacy Protection of Electronic Health Records
    Lu, Peixin
    Zhao, Wang
    2020 INTERNATIONAL CONFERENCE ON IMAGE, VIDEO PROCESSING AND ARTIFICIAL INTELLIGENCE, 2020, 11584
  • [27] On the Privacy of Adaptive Cuckoo Filters: Analysis and Protection
    Reviriego, Pedro
    Apple, Jim
    Larrabeiti, David
    Liu, Shanshan
    Lombardi, Fabrizio
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 5867 - 5879
  • [28] Injunctions and the Protection of Privacy
    Eady, David
    CIVIL JUSTICE QUARTERLY, 2010, 29 (04): : 411 - 427
  • [29] Privacy, Patience, and Protection
    Ronen Gradwohl
    Rann Smorodinsky
    Dynamic Games and Applications, 2021, 11 : 759 - 784
  • [30] Privacy, Patience, and Protection
    Gradwohl, Ronen
    Smorodinsky, Rann
    DYNAMIC GAMES AND APPLICATIONS, 2021, 11 (04) : 759 - 784