Key Based Artificial Fingerprint Generation for Privacy Protection

被引:4
|
作者
Li, Sheng [1 ]
Zhang, Xinpeng [1 ]
Qian, Zhenxing [1 ]
Feng, Guorui [2 ]
Ren, Yanli [2 ]
机构
[1] Fudan Univ, Sch Comp Sci, Shanghai Inst Intelligent Elect & Syst, Shanghai 201203, Peoples R China
[2] Shanghai Univ, Shanghai Inst Adv Commun & Data Sci, Sch Commun & Informat Engn, Shanghai 200444, Peoples R China
基金
中国国家自然科学基金;
关键词
Computational modeling; Feature extraction; Privacy; Fingerprint recognition; Databases; Iris recognition; Artificial; fingerprint; privacy protection; MODEL; CODE;
D O I
10.1109/TDSC.2018.2812192
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the widespread use of biometrics recognition systems, it is of paramount importance to protect the privacy of biometrics. In this paper, we propose to protect the fingerprint privacy by the artificial fingerprint, which is generated based on three pieces of information, i) the original minutiae positions; ii) the artificial fingerprint orientation; and iii) the artificial minutiae polarities. To make it real-look alike and diverse, we propose to generate the artificial fingerprint orientation by a model taking both the global and local fingerprint orientation into account. Its parameters can be easily guided by an user specific key with simple constraints. The artificial minutiae polarities are generated from the same key, where a block based and a function based approach are proposed for the minutiae polarities generation. These information are properly integrated to form a real-look alike artificial fingerprint. It is difficult for the attacker to distinguish such a fingerprint from the real fingerprints. If it is stolen, the complete fingerprint minutiae feature will not be compromised, and we can generate a different artificial fingerprint using another key. Experimental results show that the artificial fingerprint can be recognized accurately.
引用
收藏
页码:828 / 840
页数:13
相关论文
共 50 条
  • [1] Privacy protection based on binary fingerprint compression
    Li, Sheng
    Su, Jiajun
    Wang, Zichi
    Chen, Xin
    JOURNAL OF REAL-TIME IMAGE PROCESSING, 2019, 16 (03) : 791 - 798
  • [2] Privacy protection based on binary fingerprint compression
    Sheng Li
    Jiajun Su
    Zichi Wang
    Xin Chen
    Journal of Real-Time Image Processing, 2019, 16 : 791 - 798
  • [3] Privacy Protection of Fingerprint Database
    Li, Sheng
    Kot, Alex C.
    IEEE SIGNAL PROCESSING LETTERS, 2011, 18 (02) : 115 - 118
  • [4] Fingerprint Combination for Privacy Protection
    Li, Sheng
    Kot, Alex C.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (02) : 350 - 360
  • [5] Research on the Key Technologies of Big Data Security and Privacy Protection in the Field Based on Artificial Intelligence
    Ma, Tianyi
    Zhang, Ziyang
    PROCEEDINGS OF THE WORLD CONFERENCE ON INTELLIGENT AND 3-D TECHNOLOGIES, WCI3DT 2022, 2023, 323 : 65 - 77
  • [6] Practical Privacy Protection Scheme In WiFi Fingerprint-based Localization
    Wu, Wenxiang
    Fu, Shaojing
    Luo, Yuchuan
    2020 IEEE 7TH INTERNATIONAL CONFERENCE ON DATA SCIENCE AND ADVANCED ANALYTICS (DSAA 2020), 2020, : 699 - 708
  • [7] Text Fingerprint Key Generation
    Hassanein, Mohamed Sameh
    Ghinea, Gheorghita
    2012 INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS, 2012, : 603 - 609
  • [8] Privacy Protection Schemes for Fingerprint Recognition Systems
    Marasco, Emanuela
    Cukic, Bojan
    BIOMETRIC AND SURVEILLANCE TECHNOLOGY FOR HUMAN AND ACTIVITY IDENTIFICATION XII, 2015, 9457
  • [9] Efficient Key Generation on Lattice Cryptography for Privacy Protection in Mobile IoT Crowdsourcing
    Lu, Hai
    Zhu, Yan
    Chen, Cecilia E.
    Feng, Rongquan
    Zhang, Lejun
    Ma, Di
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (02) : 1893 - 1909
  • [10] The Key Technology Research on Privacy Protection Based on Big Data
    Li, Xueguo
    Shen, Yinglan
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON MECHATRONICS ENGINEERING AND INFORMATION TECHNOLOGY (ICMEIT), 2016, 57 : 204 - 209