Key Based Artificial Fingerprint Generation for Privacy Protection

被引:4
|
作者
Li, Sheng [1 ]
Zhang, Xinpeng [1 ]
Qian, Zhenxing [1 ]
Feng, Guorui [2 ]
Ren, Yanli [2 ]
机构
[1] Fudan Univ, Sch Comp Sci, Shanghai Inst Intelligent Elect & Syst, Shanghai 201203, Peoples R China
[2] Shanghai Univ, Shanghai Inst Adv Commun & Data Sci, Sch Commun & Informat Engn, Shanghai 200444, Peoples R China
基金
中国国家自然科学基金;
关键词
Computational modeling; Feature extraction; Privacy; Fingerprint recognition; Databases; Iris recognition; Artificial; fingerprint; privacy protection; MODEL; CODE;
D O I
10.1109/TDSC.2018.2812192
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the widespread use of biometrics recognition systems, it is of paramount importance to protect the privacy of biometrics. In this paper, we propose to protect the fingerprint privacy by the artificial fingerprint, which is generated based on three pieces of information, i) the original minutiae positions; ii) the artificial fingerprint orientation; and iii) the artificial minutiae polarities. To make it real-look alike and diverse, we propose to generate the artificial fingerprint orientation by a model taking both the global and local fingerprint orientation into account. Its parameters can be easily guided by an user specific key with simple constraints. The artificial minutiae polarities are generated from the same key, where a block based and a function based approach are proposed for the minutiae polarities generation. These information are properly integrated to form a real-look alike artificial fingerprint. It is difficult for the attacker to distinguish such a fingerprint from the real fingerprints. If it is stolen, the complete fingerprint minutiae feature will not be compromised, and we can generate a different artificial fingerprint using another key. Experimental results show that the artificial fingerprint can be recognized accurately.
引用
收藏
页码:828 / 840
页数:13
相关论文
共 50 条
  • [31] AnotherMe: A Location Privacy Protection System Based on Online Virtual Trajectory Generation
    Li, Yuanfei
    Li, Xiong
    Luo, Xiangyang
    Li, Zhetao
    Li, Hongwei
    Zhang, Xiaosong
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 2552 - 2567
  • [32] Social network information security and artificial intelligence privacy protection based on data mining
    Wang, Yanhui
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2023,
  • [33] Fingerprint-Based Asymmetric Bio-Cryptographic Key Generation Using Convolution Network
    Maiti, Diptadip
    Basak, Madhuchhanda
    Das, Debashis
    FOURTH CONGRESS ON INTELLIGENT SYSTEMS, VOL 2, CIS 2023, 2024, 869 : 29 - 49
  • [34] IDR Privacy Protection Based on Database Digital Watermarking
    Li, Yuancheng
    Ma, Longqiang
    Li, Xiang
    RECENT ADVANCES IN ELECTRICAL & ELECTRONIC ENGINEERING, 2020, 13 (01) : 110 - 118
  • [35] Key generation method from fingerprint image based on deep convolutional neural network model
    Hashem, Mithak Ibrahim
    Kuban, Kadhim Hasen
    NEXO REVISTA CIENTIFICA, 2023, 36 (06): : 906 - 925
  • [36] Approaches to Privacy Protection in Location-Based Services
    Rohunen, Anna
    Markkula, Jouni
    NETWORKED DIGITAL TECHNOLOGIES, PT 1, 2010, 87 : 402 - 409
  • [37] A location data protection protocol based on differential privacy
    Guo, Ping
    Ye, Baopeng
    Chen, Yuling
    Li, Tao
    Yang, Yixian
    Qian, Xiaobin
    2021 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS DASC/PICOM/CBDCOM/CYBERSCITECH 2021, 2021, : 306 - 311
  • [38] A Blockchain Privacy Protection Scheme Based on Ring Signature
    Li, Xiaofang
    Mei, Yurong
    Gong, Jing
    Xiang, Feng
    Sun, Zhixin
    IEEE ACCESS, 2020, 8 : 76765 - 76772
  • [39] An Enhanced Location Scattering Based Privacy Protection Scheme
    Nisha, Nisha
    Natgunanathan, Iynkaran
    Xiang, Yong
    IEEE ACCESS, 2022, 10 : 21250 - 21263
  • [40] Trajectory Privacy Protection Method Based on Differential Privacy
    Yuan S.-L.
    Pi D.-C.
    Xu M.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2021, 49 (07): : 1266 - 1273