Key Based Artificial Fingerprint Generation for Privacy Protection

被引:4
|
作者
Li, Sheng [1 ]
Zhang, Xinpeng [1 ]
Qian, Zhenxing [1 ]
Feng, Guorui [2 ]
Ren, Yanli [2 ]
机构
[1] Fudan Univ, Sch Comp Sci, Shanghai Inst Intelligent Elect & Syst, Shanghai 201203, Peoples R China
[2] Shanghai Univ, Shanghai Inst Adv Commun & Data Sci, Sch Commun & Informat Engn, Shanghai 200444, Peoples R China
基金
中国国家自然科学基金;
关键词
Computational modeling; Feature extraction; Privacy; Fingerprint recognition; Databases; Iris recognition; Artificial; fingerprint; privacy protection; MODEL; CODE;
D O I
10.1109/TDSC.2018.2812192
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the widespread use of biometrics recognition systems, it is of paramount importance to protect the privacy of biometrics. In this paper, we propose to protect the fingerprint privacy by the artificial fingerprint, which is generated based on three pieces of information, i) the original minutiae positions; ii) the artificial fingerprint orientation; and iii) the artificial minutiae polarities. To make it real-look alike and diverse, we propose to generate the artificial fingerprint orientation by a model taking both the global and local fingerprint orientation into account. Its parameters can be easily guided by an user specific key with simple constraints. The artificial minutiae polarities are generated from the same key, where a block based and a function based approach are proposed for the minutiae polarities generation. These information are properly integrated to form a real-look alike artificial fingerprint. It is difficult for the attacker to distinguish such a fingerprint from the real fingerprints. If it is stolen, the complete fingerprint minutiae feature will not be compromised, and we can generate a different artificial fingerprint using another key. Experimental results show that the artificial fingerprint can be recognized accurately.
引用
收藏
页码:828 / 840
页数:13
相关论文
共 50 条
  • [41] Privacy-Phys: Facial Video-Based Physiological Modification for Privacy Protection
    Sun, Zhaodong
    Li, Xiaobai
    IEEE SIGNAL PROCESSING LETTERS, 2022, 29 : 1507 - 1511
  • [42] 3D-Aware Adversarial Makeup Generation for Facial Privacy Protection
    Lyu, Yueming
    Jiang, Yue
    He, Ziwen
    Peng, Bo
    Liu, Yunfan
    Dong, Jing
    IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2023, 45 (11) : 13438 - 13453
  • [43] A Differential Privacy Protection Protocol Based on Location Entropy
    Guo, Ping
    Ye, Baopeng
    Chen, Yuling
    Li, Tao
    Yang, Yixian
    Qian, Xiaobin
    Yu, Xiaomei
    TSINGHUA SCIENCE AND TECHNOLOGY, 2023, 28 (03): : 452 - 463
  • [44] PRIVACY-PRESERVING AUTHENTICATION USING FINGERPRINT
    Feng, Quan
    Su, Fei
    Cai, Anni
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (11): : 8001 - 8018
  • [45] Dyadic product and crow lion algorithm based coefficient generation for privacy protection on cloud
    George, Ashok
    Sumathi, A.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1): : 1277 - 1288
  • [46] Privacy and information protection for a new generation of city services
    Dominguez, Hector
    Mowry, Judith
    Perez, Elisabeth
    Kendrick, Christine
    Martin, Kevin
    PROCEEDINGS OF THE 2ND ACM/EIGSCC SYMPOSIUM ON SMART CITIES AND COMMUNITIES (SCC'19), 2019,
  • [47] Research on Key Technologies of Privacy Protection in Mobile Social Network
    Miao, Yaofeng
    Zhou, Yuan
    Liu, Zhihui
    PROCEEDINGS OF THE 3RD WORKSHOP ON ADVANCED RESEARCH AND TECHNOLOGY IN INDUSTRY (WARTIA 2017), 2017, 148 : 422 - 426
  • [48] Dyadic product and crow lion algorithm based coefficient generation for privacy protection on cloud
    Ashok George
    A. Sumathi
    Cluster Computing, 2019, 22 : 1277 - 1288
  • [49] Polynomial Vault: A Secure and Robust Fingerprint based Authentication
    Ali, Syed Sadaf
    Ganapathi, Iyyakutti Iyappan
    Mahyo, Sajid
    Prakash, Surya
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2021, 9 (02) : 612 - 625
  • [50] Privacy, Patience, and Protection
    Ronen Gradwohl
    Rann Smorodinsky
    Dynamic Games and Applications, 2021, 11 : 759 - 784