Hashing Fingerprints for Identity De-duplication

被引:0
|
作者
Wang, Yi [1 ]
Yuen, Pong C. [1 ]
Cheung, Yiu-ming [1 ]
机构
[1] Hong Kong Baptist Univ, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Fraudulent identities of multiple enrollments usually link to fraud and serious breaches of law. With the vast biometric data collection, identity de-duplication has become the processing bottleneck of biometric enrollments. Recently, locality sensitive hashing (LSH) based methods have been introduced for fast retrieval of biometric identities. Most of them are working in the binary space. This paper proposes a new fingerprint indexing method based on a variant of LSH called spherical LSH (S-LSH). The proposed S-LSH based algorithm is able to hash fingerprint templates directly in the original feature space and thus avoid the intermediate step of binary transformation. In this way, S-LSH can better preserve the interpoint similarity of minutiae points. We demonstrate the effectiveness and efficiency of the new S-LSH based approach by performing fingerprint indexing experiments on the FVC2002 DBI database and comparing it with a state-of-the-art hashing based fingerprint indexing method.
引用
收藏
页码:49 / 54
页数:6
相关论文
共 50 条
  • [41] Can Combining Demographics and Biometrics Improve De-duplication Performance?
    Bhatt, Himanshu S.
    Singh, Richa
    Vatsa, Mayank
    [J]. 2013 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS (CVPRW), 2013, : 188 - 193
  • [42] A method for organizing metadata of storage nodes with data de-duplication
    Wang, Guohua
    Zhao, Yuelong
    Li, Tianxiang
    Liao, Jinggui
    [J]. Journal of Computational Information Systems, 2014, 10 (09): : 3845 - 3854
  • [43] Analysis of String encoding functions during de-duplication process
    del Pilar Angeles, Maria
    Fernando Perez-Franco, Luis
    [J]. 2015 4TH INTERNATIONAL CONFERENCE ON INFORMATICS, ELECTRONICS & VISION ICIEV 15, 2015,
  • [44] Semantic Analysis of Big Data by Applying De-duplication techniques
    Garg, Sanjeev
    Bala, Anju
    [J]. 2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 3, 2015, : 660 - 665
  • [45] Provable Ownership of Encrypted Files in De-Duplication Cloud Storage
    Yang, Chao
    Ma, Jianfeng
    Ren, Jian
    [J]. AD HOC & SENSOR WIRELESS NETWORKS, 2015, 26 (1-4) : 43 - 72
  • [46] DATA DE-DUPLICATION WITH ADAPTIVE CHUNKING AND ACCELERATED MODIFICATION IDENTIFYING
    Zhang, Xingjun
    Zhu, Guofeng
    Wang, Endong
    Fowler, Scott
    Dong, Xiaoshe
    [J]. COMPUTING AND INFORMATICS, 2016, 35 (03) : 586 - 614
  • [47] Optimization for data de-duplication algorithm based on file content
    Xuejun NIE
    Leihua QIN
    Jingli ZHOU
    Ke LIU
    Jianfeng ZHU
    Yu WANG
    [J]. Frontiers of Optoelectronics in China, 2010, 3 (03) - 316
  • [48] A Unified Framework for De-Duplication and Population Size Estimation (with Discussion)
    Tancredi, Andrea
    Steorts, Rebecca
    Liseo, Brunero
    [J]. BAYESIAN ANALYSIS, 2020, 15 (02): : 633 - 658
  • [49] Overview of Secure Distributed De-duplication System with Improved Reliability
    Junghare, Shweta A.
    Mahalle, V. S.
    [J]. PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2017), 2017, : 684 - 687
  • [50] A semi-supervised framework of clustering selection for de-duplication
    Kushagra, Shrinu
    Saxena, Hemant
    Ilyas, Ihab F.
    Ben-David, Shai
    [J]. 2019 IEEE 35TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2019), 2019, : 208 - 219