PRIVACY PROTECTION OF FINGERPRINT DATABASE USING LOSSLESS DATA HIDING

被引:4
|
作者
Li, Sheng [1 ]
Kot, Alex C. [1 ]
机构
[1] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore 639798, Singapore
关键词
fingerprint; database; privacy; lossless; data hiding; BINARY IMAGES; AUTHENTICATION; ALGORITHM;
D O I
10.1109/ICME.2010.5583567
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this paper, we introduce a fingerprint authentication system for protecting the privacy of the fingerprint template stored in a database. The template, which is a binary fingerprint image after thinning, will be embedded with private personal data in the user enrollment phase. In the user authentication phase, these hidden personal data can be extracted from the stored template for verifying the authenticity of the person who provides the query fingerprint. A novel lossless data hiding scheme is proposed for a thinned fingerprint. By adopting "embeddability criterion", data is hidden into the template by just adding some boundary pixels in the template. These boundary pixels can be extracted and removed to reconstruct the original thinned fingerprint so that fingerprint matching accuracy is not affected. Compared with using existing binary image data hiding techniques, our scheme has a better performance for a thinned fingerprint.
引用
收藏
页码:1293 / 1298
页数:6
相关论文
共 50 条
  • [1] Privacy Protection of Fingerprint Database
    Li, Sheng
    Kot, Alex C.
    [J]. IEEE SIGNAL PROCESSING LETTERS, 2011, 18 (02) : 115 - 118
  • [2] Data Hiding in Iris Image for Privacy Protection
    Li, Sheng
    Chen, Xin
    Wang, Zichi
    Qian, Zhenxing
    Zhang, Xinpeng
    [J]. IETE TECHNICAL REVIEW, 2018, 35 : 34 - 41
  • [3] Framework for Cloud Database Protection by Using Reversible Data Hiding Methods
    Wu, Guan-Yu
    Lee, Che-Wei
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS - TAIWAN (ICCE-TW), 2019,
  • [4] REVERSIBLE DATA HIDING IN JPEG IMAGES FOR PRIVACY PROTECTION
    Huang, Yuxuan
    Cao, Xin
    Wu, Hao-Tian
    Cheung, Yiu-ming
    [J]. 2021 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP 2021), 2021, : 2715 - 2719
  • [5] Privacy Protection Oriented Video Data Hiding Method
    Liu, Si
    Liu, Yunxia
    Wang, Zipei
    Feng, Cong
    Zhao, Hongguo
    [J]. 2019 IEEE 5TH INTL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / IEEE INTL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC) / IEEE INTL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2019, : 90 - 95
  • [6] Lossless Data Hiding Technique using Reversible Function
    Shin, Sang-Ho
    Hwang, Ho
    Jeon, Jun-Cheol
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (01): : 389 - 399
  • [7] Fingerprint Combination for Privacy Protection
    Li, Sheng
    Kot, Alex C.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (02) : 350 - 360
  • [8] Hiding Sensitive Association Rules to Maintain Privacy and Data Quality in Database
    Domadiya, Nikunj H.
    Rao, Udai Pratap
    [J]. PROCEEDINGS OF THE 2013 3RD IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2013, : 1306 - 1310
  • [9] Lossless Data Hiding Method Using Error Correction Code
    Nobeoka, Tsubasa
    Lanante, Leonardo, Jr.
    Kurosaki, Masayuki
    Ochi, Hiroshi
    [J]. 2014 IEEE ASIA PACIFIC CONFERENCE ON CIRCUITS AND SYSTEMS (APCCAS), 2014, : 539 - 542
  • [10] Lossless data hiding in JPEG bitstream using alternative embedding
    Qiu, Yingqiang
    He, Han
    Qian, Zhenxing
    Li, Sheng
    Zhang, Xinpeng
    [J]. JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2018, 52 : 86 - 91