Key Based Artificial Fingerprint Generation for Privacy Protection

被引:4
|
作者
Li, Sheng [1 ]
Zhang, Xinpeng [1 ]
Qian, Zhenxing [1 ]
Feng, Guorui [2 ]
Ren, Yanli [2 ]
机构
[1] Fudan Univ, Sch Comp Sci, Shanghai Inst Intelligent Elect & Syst, Shanghai 201203, Peoples R China
[2] Shanghai Univ, Shanghai Inst Adv Commun & Data Sci, Sch Commun & Informat Engn, Shanghai 200444, Peoples R China
基金
中国国家自然科学基金;
关键词
Computational modeling; Feature extraction; Privacy; Fingerprint recognition; Databases; Iris recognition; Artificial; fingerprint; privacy protection; MODEL; CODE;
D O I
10.1109/TDSC.2018.2812192
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the widespread use of biometrics recognition systems, it is of paramount importance to protect the privacy of biometrics. In this paper, we propose to protect the fingerprint privacy by the artificial fingerprint, which is generated based on three pieces of information, i) the original minutiae positions; ii) the artificial fingerprint orientation; and iii) the artificial minutiae polarities. To make it real-look alike and diverse, we propose to generate the artificial fingerprint orientation by a model taking both the global and local fingerprint orientation into account. Its parameters can be easily guided by an user specific key with simple constraints. The artificial minutiae polarities are generated from the same key, where a block based and a function based approach are proposed for the minutiae polarities generation. These information are properly integrated to form a real-look alike artificial fingerprint. It is difficult for the attacker to distinguish such a fingerprint from the real fingerprints. If it is stolen, the complete fingerprint minutiae feature will not be compromised, and we can generate a different artificial fingerprint using another key. Experimental results show that the artificial fingerprint can be recognized accurately.
引用
收藏
页码:828 / 840
页数:13
相关论文
共 50 条
  • [41] A historical probability based noise generation strategy for privacy protection in cloud computing
    Zhang, Gaofeng
    Yang, Yun
    Chen, Jinjun
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2012, 78 (05) : 1374 - 1381
  • [42] Data protection - Security: Data security - The key to privacy
    Carey, Peter
    Berry, David
    Computer Law and Security Report, 2002, 18 (02): : 112 - 113
  • [43] AnotherMe: A Location Privacy Protection System Based on Online Virtual Trajectory Generation
    Li, Yuanfei
    Li, Xiong
    Luo, Xiangyang
    Li, Zhetao
    Li, Hongwei
    Zhang, Xiaosong
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 2552 - 2567
  • [44] Dummy Generation Based on User-Movement Estimation for Location Privacy Protection
    Hayashida, Shuhei
    Amagata, Daichi
    Hara, Takahiro
    Xie, Xing
    IEEE ACCESS, 2018, 6 : 22958 - 22969
  • [45] A Novel Authentication Protocol for Sensitive Information Privacy Protection Using Dynamic key Based Group Key Management
    Wu, Xianping
    Ngo, Huy Hoang
    Le, Phu Dung
    Srinivasan, Balasubramaniam
    THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 1113 - 1119
  • [46] Privacy Protection Based on Key-changed Mutual Authentication Protocol in Internet of Things
    Li Peng
    Wang Ru-chuan
    Su Xiao-yu
    Chen Long
    ADVANCES IN WIRELESS SENSOR NETWORKS, CWSN 2013, 2014, 418 : 345 - 355
  • [47] Privacy Protection Scheme for Social Discovery Based on Key Agreement and Identity Anonymity Technology
    Shen N.
    Li R.
    Jia C.
    Yuan K.
    Gongcheng Kexue Yu Jishu/Advanced Engineering Sciences, 2019, 51 (06): : 168 - 174
  • [48] Social network information security and artificial intelligence privacy protection based on data mining
    Wang, Yanhui
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2023,
  • [49] Biometric Certificate based biometric digital key generation with protection mechanism
    Chung, Yunsu
    Moon, Kiyoung
    Lee, Hyung-Woo
    PROCEEDINGS OF THE FRONTIERS IN THE CONVERGENCE OF BIOSCIENCE AND INFORMATION TECHNOLOGIES, 2007, : 709 - +
  • [50] Enhanced RSA Key Generation Modelling Using Fingerprint Biometric
    Bansal, Neha
    Mahto, Dindayal
    Yadav, Dilip Kumar
    HELIX, 2018, 8 (05): : 3922 - 3926