DocumentCode :
1760162
Title :
Fingerprint Combination for Privacy Protection
Author :
Sheng Li ; Kot, Alex C.
Author_Institution :
Sch. of Electr. & Electron. Eng., Nanyang Technol. Univ., Singapore, Singapore
Volume :
8
Issue :
2
fYear :
2013
fDate :
Feb. 2013
Firstpage :
350
Lastpage :
360
Abstract :
We propose here a novel system for protecting fingerprint privacy by combining two different fingerprints into a new identity. In the enrollment, two fingerprints are captured from two different fingers. We extract the minutiae positions from one fingerprint, the orientation from the other fingerprint, and the reference points from both fingerprints. Based on this extracted information and our proposed coding strategies, a combined minutiae template is generated and stored in a database. In the authentication, the system requires two query fingerprints from the same two fingers which are used in the enrollment. A two-stage fingerprint matching process is proposed for matching the two query fingerprints against a combined minutiae template. By storing the combined minutiae template, the complete minutiae feature of a single fingerprint will not be compromised when the database is stolen. Furthermore, because of the similarity in topology, it is difficult for the attacker to distinguish a combined minutiae template from the original minutiae templates. With the help of an existing fingerprint reconstruction approach, we are able to convert the combined minutiae template into a real-look alike combined fingerprint. Thus, a new virtual identity is created for the two different fingerprints, which can be matched using minutiae-based fingerprint matching algorithms. The experimental results show that our system can achieve a very low error rate with FRR = 0.4% at FAR = 0.1%. Compared with the state-of-the-art technique, our work has the advantage in creating a better new virtual identity when the two different fingerprints are randomly chosen.
Keywords :
authorisation; data privacy; feature extraction; fingerprint identification; image coding; image matching; image reconstruction; visual databases; authentication; coding strategy; database storage; false acceptance rate; false rejection rate; fingerprint capture; fingerprint combination; fingerprint orientation; fingerprint privacy protection; fingerprint reconstruction approach; fingerprint reference point; minutiae position extraction; minutiae template; query fingerprint; real-look alike combined fingerprint; two-stage fingerprint matching; virtual identity; Authentication; Data mining; Databases; Encoding; Fingerprint recognition; Privacy; Topology; Combination; fingerprint; minutiae; privacy; protection;
fLanguage :
English
Journal_Title :
Information Forensics and Security, IEEE Transactions on
Publisher :
ieee
ISSN :
1556-6013
Type :
jour
DOI :
10.1109/TIFS.2012.2234740
Filename :
6384734
Link To Document :
بازگشت