Fingerprint Combination for Privacy Protection

被引:39
|
作者
Li, Sheng [1 ]
Kot, Alex C. [1 ]
机构
[1] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore 639798, Singapore
关键词
Combination; fingerprint; minutiae; privacy; protection;
D O I
10.1109/TIFS.2012.2234740
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We propose here a novel system for protecting fingerprint privacy by combining two different fingerprints into a new identity. In the enrollment, two fingerprints are captured from two different fingers. We extract the minutiae positions from one fingerprint, the orientation from the other fingerprint, and the reference points from both fingerprints. Based on this extracted information and our proposed coding strategies, a combined minutiae template is generated and stored in a database. In the authentication, the system requires two query fingerprints from the same two fingers which are used in the enrollment. A two-stage fingerprint matching process is proposed for matching the two query fingerprints against a combined minutiae template. By storing the combined minutiae template, the complete minutiae feature of a single fingerprint will not be compromised when the database is stolen. Furthermore, because of the similarity in topology, it is difficult for the attacker to distinguish a combined minutiae template from the original minutiae templates. With the help of an existing fingerprint reconstruction approach, we are able to convert the combined minutiae template into a real-look alike combined fingerprint. Thus, a new virtual identity is created for the two different fingerprints, which can be matched using minutiae-based finger-print matching algorithms. The experimental results show that our system can achieve a very low error rate with FRR = 0.4% at FAR = 0.1%. Compared with the state-of-the-art technique, our work has the advantage in creating a better new virtual identity when the two different fingerprints are randomly chosen.
引用
收藏
页码:350 / 360
页数:11
相关论文
共 50 条
  • [41] Towards Adaptive Privacy Protection for Interpretable Federated Learning
    Li, Zhe
    Chen, Honglong
    Ni, Zhichen
    Gao, Yudong
    Lou, Wei
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (12) : 14471 - 14483
  • [42] FinCaT: a novel approach for fingerprint template protection using quadrant mapping via non-invertible transformation
    Sehar, Eain Ul
    Selwal, Arvind
    Sharma, Deepika
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (15) : 22795 - 22813
  • [43] Fingerprint Image Protection Using Two Watermarks Without Corrupting Minutiae
    Alkhathami, Mohammed
    Han, Fengling
    Van Schyndel, Ron
    PROCEEDINGS OF THE 2013 IEEE 8TH CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS (ICIEA), 2013, : 1151 - 1155
  • [44] OpenTag: Privacy Protection for RFID
    Holtzman, Henry
    Lee, Sanghoon
    Shen, Daniel
    IEEE PERVASIVE COMPUTING, 2009, 8 (02) : 71 - 77
  • [45] Paralinguistic Privacy Protection at the Edge
    Aloufi, Ranya
    Haddadi, Hamed
    Boyle, David
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2023, 26 (02)
  • [46] Privacy Protection Framework for Android
    Mishra, Bharavi
    Agarwal, Aastha
    Goel, Ayush
    Ansari, Aman Ahmad
    Gaur, Pramod
    Singh, Dilbag
    Lee, Heung-No
    IEEE ACCESS, 2022, 10 : 7973 - 7988
  • [47] Data protection: The future of privacy
    Wong, Rebecca
    COMPUTER LAW & SECURITY REVIEW, 2011, 27 (01) : 53 - 57
  • [48] Theory of Star Privacy Protection
    Cui, Xiaoxuan
    PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON MATERIALS SCIENCE, MACHINERY AND ENERGY ENGINEERING (MSMEE 2017), 2017, 123 : 203 - 206
  • [49] Protection Goals for Privacy Engineering
    Hansen, Marit
    Jensen, Meiko
    Rost, Martin
    2015 IEEE SECURITY AND PRIVACY WORKSHOPS (SPW), 2015, : 159 - 166
  • [50] A Solution For Privacy Protection In MapReduce
    Quang Tran
    Sato, Hiroyuki
    2012 IEEE 36TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), 2012, : 515 - 520