Key Based Artificial Fingerprint Generation for Privacy Protection

被引:4
|
作者
Li, Sheng [1 ]
Zhang, Xinpeng [1 ]
Qian, Zhenxing [1 ]
Feng, Guorui [2 ]
Ren, Yanli [2 ]
机构
[1] Fudan Univ, Sch Comp Sci, Shanghai Inst Intelligent Elect & Syst, Shanghai 201203, Peoples R China
[2] Shanghai Univ, Shanghai Inst Adv Commun & Data Sci, Sch Commun & Informat Engn, Shanghai 200444, Peoples R China
基金
中国国家自然科学基金;
关键词
Computational modeling; Feature extraction; Privacy; Fingerprint recognition; Databases; Iris recognition; Artificial; fingerprint; privacy protection; MODEL; CODE;
D O I
10.1109/TDSC.2018.2812192
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the widespread use of biometrics recognition systems, it is of paramount importance to protect the privacy of biometrics. In this paper, we propose to protect the fingerprint privacy by the artificial fingerprint, which is generated based on three pieces of information, i) the original minutiae positions; ii) the artificial fingerprint orientation; and iii) the artificial minutiae polarities. To make it real-look alike and diverse, we propose to generate the artificial fingerprint orientation by a model taking both the global and local fingerprint orientation into account. Its parameters can be easily guided by an user specific key with simple constraints. The artificial minutiae polarities are generated from the same key, where a block based and a function based approach are proposed for the minutiae polarities generation. These information are properly integrated to form a real-look alike artificial fingerprint. It is difficult for the attacker to distinguish such a fingerprint from the real fingerprints. If it is stolen, the complete fingerprint minutiae feature will not be compromised, and we can generate a different artificial fingerprint using another key. Experimental results show that the artificial fingerprint can be recognized accurately.
引用
收藏
页码:828 / 840
页数:13
相关论文
共 50 条
  • [1] Privacy Protection of Fingerprint Database
    Li, Sheng
    Kot, Alex C.
    IEEE SIGNAL PROCESSING LETTERS, 2011, 18 (02) : 115 - 118
  • [2] Fingerprint Combination for Privacy Protection
    Li, Sheng
    Kot, Alex C.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (02) : 350 - 360
  • [3] Hierarchical Perceptual Noise Injection for Social Media Fingerprint Privacy Protection
    Li, Simin
    Xu, Huangxinxin
    Wang, Jiakai
    Xu, Ruixiao
    Liu, Aishan
    He, Fazhi
    Liu, Xianglong
    Tao, Dacheng
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2024, 33 : 2714 - 2729
  • [4] A Two-Stage Feature Transformation-Based Fingerprint Authentication System for Privacy Protection in IoT
    Bedari, Aseel
    Wang, Song
    Yang, Jucheng
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (04) : 2745 - 2752
  • [5] Privacy protection based on binary fingerprint compression
    Li, Sheng
    Su, Jiajun
    Wang, Zichi
    Chen, Xin
    JOURNAL OF REAL-TIME IMAGE PROCESSING, 2019, 16 (03) : 791 - 798
  • [6] Privacy protection based on binary fingerprint compression
    Sheng Li
    Jiajun Su
    Zichi Wang
    Xin Chen
    Journal of Real-Time Image Processing, 2019, 16 : 791 - 798
  • [7] Privacy Protection Schemes for Fingerprint Recognition Systems
    Marasco, Emanuela
    Cukic, Bojan
    BIOMETRIC AND SURVEILLANCE TECHNOLOGY FOR HUMAN AND ACTIVITY IDENTIFICATION XII, 2015, 9457
  • [8] PRIVACY PROTECTION OF FINGERPRINT DATABASE USING LOSSLESS DATA HIDING
    Li, Sheng
    Kot, Alex C.
    2010 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO (ICME 2010), 2010, : 1293 - 1298
  • [9] Fingerprint template protection with minutiae-based bit-string for security and privacy preserving
    Jin, Zhe
    Teoh, Andrew Beng Jin
    Ong, Thian Song
    Tee, Connie
    EXPERT SYSTEMS WITH APPLICATIONS, 2012, 39 (06) : 6157 - 6167
  • [10] The Key Technology Research on Privacy Protection Based on Big Data
    Li, Xueguo
    Shen, Yinglan
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON MECHATRONICS ENGINEERING AND INFORMATION TECHNOLOGY (ICMEIT), 2016, 57 : 204 - 209