Privacy protection based on binary fingerprint compression

被引:0
作者
Sheng Li
Jiajun Su
Zichi Wang
Xin Chen
机构
[1] Shanghai University,School of Communication and Information Engineering
来源
Journal of Real-Time Image Processing | 2019年 / 16卷
关键词
Data hiding; Fingerprint; Image encryption; High capacity;
D O I
暂无
中图分类号
学科分类号
摘要
This paper proposes a novel system to protect the fingerprint database based on compressed binary fingerprint images. In this system, the user can store private data with high capacity. First, the grayscale fingerprint image is transformed into a binary bitstream. Then, the binary bitstream is compressed using run-length encoding and Huffman encoding technique to create a sparse space to accommodate private data. Finally, the new image constructed by the obtained binary bitstream is encrypted with an encryption key. For fingerprint matching, it is only need to decrypt and decompress the encrypted image in the database to obtain the binary fingerprint image. When the matching is passed, the private data can be extracted to a user with data-embedding key. If the matching is failed, the private data cannot extracted for the purpose of privacy security. Even if a leakage of the encryption key occurs, this system can still protect the privacy data of the user due to the existence of the data-embedding key. Meanwhile, the encoding and decoding phases are real time, which guarantee the practicability of the proposed system.
引用
收藏
页码:791 / 798
页数:7
相关论文
共 31 条
[1]  
Ratha NK(2001)Enhancing security and privacy in biometrics-based authentication systems IBM Syst. J. 40 614-634
[2]  
Connell JH(2013)Fingerprint combination for privacy protection IEEE Trans. Inf. Forensic Secur. 8 350-360
[3]  
Bolle RM(2019)Toward construction-based data hiding: from secrets to fingerprint images IEEE Trans. Image Process. 28 1482-1497
[4]  
Li S(1998)Fingerprint image enhancement: algorithm and performance evaluation IEEE Trans. Pattern Anal. Mach. Intell. 20 777-789
[5]  
Kot AC(2012)Fingerprint template protection with minutiae-based bit-string for security and privacy preserving Expert Syst. Appl. 39 6157-6167
[6]  
Li S(2012)Noninvertible minutia cylinder-code representation IEEE Trans. Inf. Forensics Secur. 7 1727-1737
[7]  
Zhang X(2014)A novel joint data-hiding and compression scheme based on SMVQ and image inpainting IEEE Trans. Image Process. 23 969-978
[8]  
Hong L(2013)On mixing fingerprints IEEE Trans. Inf. Forensics Secur. 8 260-267
[9]  
Wan Y(2016)A security-enhanced alignment-free fuzzy vault-based fingerprint cryptosystem using pair-polar minutiae structures IEEE Trans. Inf. Forensics Secur. 11 543-555
[10]  
Jain A(2019)Towards robust image steganography IEEE Trans. Circuits Syst. Video Technol 29 594-600