Fingerprint Combination for Privacy Protection

被引:39
|
作者
Li, Sheng [1 ]
Kot, Alex C. [1 ]
机构
[1] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore 639798, Singapore
关键词
Combination; fingerprint; minutiae; privacy; protection;
D O I
10.1109/TIFS.2012.2234740
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We propose here a novel system for protecting fingerprint privacy by combining two different fingerprints into a new identity. In the enrollment, two fingerprints are captured from two different fingers. We extract the minutiae positions from one fingerprint, the orientation from the other fingerprint, and the reference points from both fingerprints. Based on this extracted information and our proposed coding strategies, a combined minutiae template is generated and stored in a database. In the authentication, the system requires two query fingerprints from the same two fingers which are used in the enrollment. A two-stage fingerprint matching process is proposed for matching the two query fingerprints against a combined minutiae template. By storing the combined minutiae template, the complete minutiae feature of a single fingerprint will not be compromised when the database is stolen. Furthermore, because of the similarity in topology, it is difficult for the attacker to distinguish a combined minutiae template from the original minutiae templates. With the help of an existing fingerprint reconstruction approach, we are able to convert the combined minutiae template into a real-look alike combined fingerprint. Thus, a new virtual identity is created for the two different fingerprints, which can be matched using minutiae-based finger-print matching algorithms. The experimental results show that our system can achieve a very low error rate with FRR = 0.4% at FAR = 0.1%. Compared with the state-of-the-art technique, our work has the advantage in creating a better new virtual identity when the two different fingerprints are randomly chosen.
引用
收藏
页码:350 / 360
页数:11
相关论文
共 50 条
  • [41] Data protection, privacy
    La Monaca, G.
    Schiralli, I.
    CLINICA TERAPEUTICA, 2010, 161 (02): : 189 - 191
  • [42] SCENE PRIVACY PROTECTION
    Li, Chau Yi
    Shamsabadi, Ali Shahin
    Sanchez-Matilla, Ricardo
    Mazzon, Riccardo
    Cavallaro, Andrea
    2019 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2019, : 2502 - 2506
  • [43] Copyright and privacy protection
    Anderson, R
    Cox, I
    Low, S
    Maxemchuk, N
    IEEE COMMUNICATIONS MAGAZINE, 1998, 36 (06) : 17 - 18
  • [44] Threats to privacy protection
    Barash, Carol Isaacson
    SCIENCE, 2007, 318 (5852) : 913 - 914
  • [45] COMPUTERS AND PROTECTION OF PRIVACY
    WESTIN, AF
    TECHNOLOGY REVIEW, 1969, 71 (06): : 32 - &
  • [46] Privacy risk perceptions and privacy protection strategies
    Oomen, Isabelle
    Leenes, Ronald
    POLICIES AND RESEARCH IN IDENTITY MANAGEMENT, 2008, 261 : 121 - 138
  • [47] Privacy contracts incorporated in a privacy protection framework
    Oberholzer, HJG
    Olivier, MS
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2006, 21 (01): : 5 - 16
  • [48] Research on Local Fingerprint Image Differential Privacy Protection Method Based on Clustering Algorithm and Regression Algorithm Segmentation Image
    Liu, Chao
    Zhi, Zhaolong
    Zhao, Weinan
    He, Zhicheng
    IEEE ACCESS, 2024, 12 : 27127 - 27146
  • [49] Research on Fingerprint Image Differential Privacy Protection Publishing Method Based on Wavelet Transform and Singular Value Decomposition Technology
    Liu, Chao
    Zhi, Zhaolong
    Zhao, Weinan
    He, Zhicheng
    IEEE ACCESS, 2024, 12 : 28417 - 28436
  • [50] BRPPNet: Balanced privacy protection network for referring personal image privacy protection
    Lin, Jiacheng
    Dai, Xianwen
    Nai, Ke
    Yuan, Jin
    Li, Zhiyong
    Zhang, Xu
    Li, Shutao
    EXPERT SYSTEMS WITH APPLICATIONS, 2023, 233