Fingerprint Combination for Privacy Protection

被引:39
|
作者
Li, Sheng [1 ]
Kot, Alex C. [1 ]
机构
[1] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore 639798, Singapore
关键词
Combination; fingerprint; minutiae; privacy; protection;
D O I
10.1109/TIFS.2012.2234740
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We propose here a novel system for protecting fingerprint privacy by combining two different fingerprints into a new identity. In the enrollment, two fingerprints are captured from two different fingers. We extract the minutiae positions from one fingerprint, the orientation from the other fingerprint, and the reference points from both fingerprints. Based on this extracted information and our proposed coding strategies, a combined minutiae template is generated and stored in a database. In the authentication, the system requires two query fingerprints from the same two fingers which are used in the enrollment. A two-stage fingerprint matching process is proposed for matching the two query fingerprints against a combined minutiae template. By storing the combined minutiae template, the complete minutiae feature of a single fingerprint will not be compromised when the database is stolen. Furthermore, because of the similarity in topology, it is difficult for the attacker to distinguish a combined minutiae template from the original minutiae templates. With the help of an existing fingerprint reconstruction approach, we are able to convert the combined minutiae template into a real-look alike combined fingerprint. Thus, a new virtual identity is created for the two different fingerprints, which can be matched using minutiae-based finger-print matching algorithms. The experimental results show that our system can achieve a very low error rate with FRR = 0.4% at FAR = 0.1%. Compared with the state-of-the-art technique, our work has the advantage in creating a better new virtual identity when the two different fingerprints are randomly chosen.
引用
收藏
页码:350 / 360
页数:11
相关论文
共 50 条
  • [31] Efficient fingerprint matching on smart cards for high security and privacy in smart systems
    Nedjah, Nadia
    Wyant, Rafael S.
    Mourelle, Luiza M.
    Gupta, Brij B.
    INFORMATION SCIENCES, 2019, 479 : 622 - 639
  • [32] SCENE PRIVACY PROTECTION
    Li, Chau Yi
    Shamsabadi, Ali Shahin
    Sanchez-Matilla, Ricardo
    Mazzon, Riccardo
    Cavallaro, Andrea
    2019 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2019, : 2502 - 2506
  • [33] Privacy contracts incorporated in a privacy protection framework
    Oberholzer, HJG
    Olivier, MS
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2006, 21 (01): : 5 - 16
  • [34] Data protection, privacy
    La Monaca, G.
    Schiralli, I.
    CLINICA TERAPEUTICA, 2010, 161 (02): : 189 - 191
  • [35] Research on Fingerprint Image Differential Privacy Protection Publishing Method Based on Wavelet Transform and Singular Value Decomposition Technology
    Liu, Chao
    Zhi, Zhaolong
    Zhao, Weinan
    He, Zhicheng
    IEEE ACCESS, 2024, 12 : 28417 - 28436
  • [36] FinPrivacy: A Privacy-preserving Mechanism for Fingerprint Identification
    Wang, Tao
    Zheng, Zhigao
    Bashir, Ali Kashif
    Jolfaei, Alireza
    Xu, Yanyan
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2021, 21 (03)
  • [37] Study on Constitutional Protection of Privacy Right of Citizens in China
    Gao, Jia
    2013 THE FOURTH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATION AND EDUCATION APPLICATION (ICEA 2013), PT 2, 2013, 31 : 385 - 388
  • [38] Confidential Image Super-Resolution with Privacy Protection
    Han, Yiran
    Liu, Jianwei
    Deng, Xin
    Jing, Junpeng
    Zhang, Yanting
    CHINESE JOURNAL OF ELECTRONICS, 2024, 33 (06) : 1447 - 1457
  • [39] Efficient Privacy-Preserving Fingerprint-based Indoor Localization using Crowdsourcing
    Armengol, Patrick
    Tobkes, Rachelle
    Akkaya, Kemal
    Ciftler, Bekir S.
    Guvenc, Ismail
    2015 IEEE 12TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR SYSTEMS (MASS), 2015, : 549 - 554
  • [40] A comprehensive privacy and security framework for dynamic protection (CPSF)
    Abi Sen A.A.
    International Journal of Information Technology, 2022, 14 (5) : 2477 - 2485