Fingerprint Combination for Privacy Protection

被引:39
|
作者
Li, Sheng [1 ]
Kot, Alex C. [1 ]
机构
[1] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore 639798, Singapore
关键词
Combination; fingerprint; minutiae; privacy; protection;
D O I
10.1109/TIFS.2012.2234740
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We propose here a novel system for protecting fingerprint privacy by combining two different fingerprints into a new identity. In the enrollment, two fingerprints are captured from two different fingers. We extract the minutiae positions from one fingerprint, the orientation from the other fingerprint, and the reference points from both fingerprints. Based on this extracted information and our proposed coding strategies, a combined minutiae template is generated and stored in a database. In the authentication, the system requires two query fingerprints from the same two fingers which are used in the enrollment. A two-stage fingerprint matching process is proposed for matching the two query fingerprints against a combined minutiae template. By storing the combined minutiae template, the complete minutiae feature of a single fingerprint will not be compromised when the database is stolen. Furthermore, because of the similarity in topology, it is difficult for the attacker to distinguish a combined minutiae template from the original minutiae templates. With the help of an existing fingerprint reconstruction approach, we are able to convert the combined minutiae template into a real-look alike combined fingerprint. Thus, a new virtual identity is created for the two different fingerprints, which can be matched using minutiae-based finger-print matching algorithms. The experimental results show that our system can achieve a very low error rate with FRR = 0.4% at FAR = 0.1%. Compared with the state-of-the-art technique, our work has the advantage in creating a better new virtual identity when the two different fingerprints are randomly chosen.
引用
收藏
页码:350 / 360
页数:11
相关论文
共 50 条
  • [1] Robust Combination Method for Privacy Protection Using Fingerprint and Face Biometrics
    Ghate, Dhanashri J.
    Patil, Savitri B.
    2015 4TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (ICRITO) (TRENDS AND FUTURE DIRECTIONS), 2015,
  • [2] Privacy Protection of Fingerprint Database
    Li, Sheng
    Kot, Alex C.
    IEEE SIGNAL PROCESSING LETTERS, 2011, 18 (02) : 115 - 118
  • [3] Privacy protection based on binary fingerprint compression
    Li, Sheng
    Su, Jiajun
    Wang, Zichi
    Chen, Xin
    JOURNAL OF REAL-TIME IMAGE PROCESSING, 2019, 16 (03) : 791 - 798
  • [4] Privacy Protection Schemes for Fingerprint Recognition Systems
    Marasco, Emanuela
    Cukic, Bojan
    BIOMETRIC AND SURVEILLANCE TECHNOLOGY FOR HUMAN AND ACTIVITY IDENTIFICATION XII, 2015, 9457
  • [5] Privacy protection based on binary fingerprint compression
    Sheng Li
    Jiajun Su
    Zichi Wang
    Xin Chen
    Journal of Real-Time Image Processing, 2019, 16 : 791 - 798
  • [6] A template privacy protection scheme for fingerprint minutiae descriptors
    Mirmohamadsadeghi, Leila
    Drygajlo, Andrzej
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE OF THE BIOMETRICS SPECIAL INTEREST GROUP (BIOSIG 2013), 2013,
  • [7] Key Based Artificial Fingerprint Generation for Privacy Protection
    Li, Sheng
    Zhang, Xinpeng
    Qian, Zhenxing
    Feng, Guorui
    Ren, Yanli
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (04) : 828 - 840
  • [8] Fingerprint Combination of Privacy Preservation Is Improved By Delaunay Triangulation Method
    Mary, Bercelin Rose W.
    Subbulakshmi, N.
    Tofflin, Bini R.
    ADVANCEMENTS IN AUTOMATION AND CONTROL TECHNOLOGIES, 2014, 573 : 437 - +
  • [9] PRIVACY PROTECTION OF FINGERPRINT DATABASE USING LOSSLESS DATA HIDING
    Li, Sheng
    Kot, Alex C.
    2010 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO (ICME 2010), 2010, : 1293 - 1298
  • [10] Hierarchical Perceptual Noise Injection for Social Media Fingerprint Privacy Protection
    Li, Simin
    Xu, Huangxinxin
    Wang, Jiakai
    Xu, Ruixiao
    Liu, Aishan
    He, Fazhi
    Liu, Xianglong
    Tao, Dacheng
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2024, 33 : 2714 - 2729