Key Based Artificial Fingerprint Generation for Privacy Protection

被引:4
|
作者
Li, Sheng [1 ]
Zhang, Xinpeng [1 ]
Qian, Zhenxing [1 ]
Feng, Guorui [2 ]
Ren, Yanli [2 ]
机构
[1] Fudan Univ, Sch Comp Sci, Shanghai Inst Intelligent Elect & Syst, Shanghai 201203, Peoples R China
[2] Shanghai Univ, Shanghai Inst Adv Commun & Data Sci, Sch Commun & Informat Engn, Shanghai 200444, Peoples R China
基金
中国国家自然科学基金;
关键词
Computational modeling; Feature extraction; Privacy; Fingerprint recognition; Databases; Iris recognition; Artificial; fingerprint; privacy protection; MODEL; CODE;
D O I
10.1109/TDSC.2018.2812192
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the widespread use of biometrics recognition systems, it is of paramount importance to protect the privacy of biometrics. In this paper, we propose to protect the fingerprint privacy by the artificial fingerprint, which is generated based on three pieces of information, i) the original minutiae positions; ii) the artificial fingerprint orientation; and iii) the artificial minutiae polarities. To make it real-look alike and diverse, we propose to generate the artificial fingerprint orientation by a model taking both the global and local fingerprint orientation into account. Its parameters can be easily guided by an user specific key with simple constraints. The artificial minutiae polarities are generated from the same key, where a block based and a function based approach are proposed for the minutiae polarities generation. These information are properly integrated to form a real-look alike artificial fingerprint. It is difficult for the attacker to distinguish such a fingerprint from the real fingerprints. If it is stolen, the complete fingerprint minutiae feature will not be compromised, and we can generate a different artificial fingerprint using another key. Experimental results show that the artificial fingerprint can be recognized accurately.
引用
收藏
页码:828 / 840
页数:13
相关论文
共 50 条
  • [21] Approach to cryptographic key generation from fingerprint biometrics
    Barman, Subhas
    Samanta, Debasis
    Chattopadhyay, Samiran
    INTERNATIONAL JOURNAL OF BIOMETRICS, 2015, 7 (03) : 226 - 248
  • [22] Comparable Features and Same Cryptography Key Generation using Biometric Fingerprint Image
    Panchal, Gaurangkumar
    Samanta, Debasis
    PROCEEDINGS OF THE 2016 IEEE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRICAL & ELECTRONICS, INFORMATION, COMMUNICATION & BIO INFORMATICS (IEEE AEEICB-2016), 2016, : 691 - 695
  • [23] SCAPEGOAT GENERATION FOR PRIVACY PROTECTION FROM DEEPFAKE
    Kato, Gido
    Fukuhara, Yoshihiro
    Isogawa, Mariko
    Tsunashima, Hideki
    Kataoka, Hirokatsu
    Morishima, Shigeo
    2023 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, ICIP, 2023, : 3364 - 3368
  • [24] Generation of Secure Fingerprint Template Using DFT for Consumer Electronics Devices
    Baghel, Vivek Singh
    Prakash, Surya
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2023, 69 (02) : 118 - 127
  • [25] Research on key technology of blockchain privacy protection and scalability
    Wang H.
    Wang L.
    Bai X.
    Liu Q.
    Shen X.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2020, 47 (05): : 28 - 39
  • [26] More Than Privacy: Applying Differential Privacy in Key Areas of Artificial Intelligence
    Zhu, Tianqing
    Ye, Dayong
    Wang, Wei
    Zhou, Wanlei
    Yu, Philip S.
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2022, 34 (06) : 2824 - 2843
  • [27] A secure anonymous key mechanism for privacy protection in VANET
    Lai, Chris
    Chang, Henry
    Lu, Chei Chung
    ITST: 2009 9TH INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORT SYSTEMS TELECOMMUNICATIONS, 2009, : 635 - 640
  • [28] A Cross-Chain Privacy Protection and Key Sharing Scheme Based on Relay Chain
    Wang, Peng
    Feng, Libo
    Li, Junhong
    Yuan, Zehui
    Zhou, Yaqi
    Deng, Xian
    Zhang, Zhixing
    Xie, Jiale
    Fang, Fake
    PROCEEDINGS OF THE 2024 27 TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, CSCWD 2024, 2024, : 2333 - 2338
  • [29] A historical probability based noise generation strategy for privacy protection in cloud computing
    Zhang, Gaofeng
    Yang, Yun
    Chen, Jinjun
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2012, 78 (05) : 1374 - 1381
  • [30] Privacy Protection Based on Key-changed Mutual Authentication Protocol in Internet of Things
    Li Peng
    Wang Ru-chuan
    Su Xiao-yu
    Chen Long
    ADVANCES IN WIRELESS SENSOR NETWORKS, CWSN 2013, 2014, 418 : 345 - 355