Privacy protection based on binary fingerprint compression

This paper proposes a novel system to protect the fingerprint database based on compressed binary fingerprint images. In this system, the user can store private data with high capacity. First, the grayscale fingerprint image is transformed into a binary bitstream. Then, the binary bitstream is compressed using run-length encoding and Huffman encoding technique to create a sparse space to accommodate private data. Finally, the new image constructed by the obtained binary bitstream is encrypted with an encryption key. For fingerprint matching, it is only need to decrypt and decompress the encrypted image in the database to obtain the binary fingerprint image. When the matching is passed, the private data can be extracted to a user with data-embedding key. If the matching is failed, the private data cannot extracted for the purpose of privacy security. Even if a leakage of the encryption key occurs, this system can still protect the privacy data of the user due to the existence of the data-embedding key. Meanwhile, the encoding and decoding phases are real time, which guarantee the practicability of the proposed system.

[1]  Munaga V. N. K. Prasad,et al.  k-Nearest Neighborhood Structure (k-NNS) based alignment-free method for fingerprint template protection , 2015, 2015 International Conference on Biometrics (ICB).

[2]  Anil K. Jain,et al.  Biometric Recognition : An Overview , 2012 .

[3]  N. Otsu A threshold selection method from gray level histograms , 1979 .

[4]  Xinpeng Zhang,et al.  Toward Construction-Based Data Hiding: From Secrets to Fingerprint Images , 2019, IEEE Transactions on Image Processing.

[5]  Zhenxing Qian,et al.  Key Based Artificial Fingerprint Generation for Privacy Protection , 2020, IEEE Transactions on Dependable and Secure Computing.

[6]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[7]  Arun Ross,et al.  On Mixing Fingerprints , 2013, IEEE Transactions on Information Forensics and Security.

[8]  Jiankun Hu,et al.  A Security-Enhanced Alignment-Free Fuzzy Vault-Based Fingerprint Cryptosystem Using Pair-Polar Minutiae Structures , 2016, IEEE Transactions on Information Forensics and Security.

[9]  Anil K. Jain,et al.  Fingerprint Image Enhancement: Algorithm and Performance Evaluation , 1998, IEEE Trans. Pattern Anal. Mach. Intell..

[10]  Alex ChiChung Kot,et al.  Fingerprint Combination for Privacy Protection , 2013, IEEE Transactions on Information Forensics and Security.

[11]  Xinpeng Zhang,et al.  Towards Robust Image Steganography , 2019, IEEE Transactions on Circuits and Systems for Video Technology.

[12]  Xinpeng Zhang,et al.  Flexible Lossy Compression for Selective Encrypted Image With Image Inpainting , 2019, IEEE Transactions on Circuits and Systems for Video Technology.

[13]  Davide Maltoni,et al.  Noninvertible Minutia Cylinder-Code Representation , 2012, IEEE Transactions on Information Forensics and Security.

[14]  Solomon W. Golomb,et al.  Run-length encodings (Corresp.) , 1966, IEEE Trans. Inf. Theory.

[15]  Chin-Chen Chang,et al.  A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting , 2014, IEEE Transactions on Image Processing.

[16]  David A. Huffman,et al.  A method for the construction of minimum-redundancy codes , 1952, Proceedings of the IRE.

[17]  Rohit M. Thanki,et al.  Biometric Watermarking Technique Based on CS Theory and Fast Discrete Curvelet Transform for Face and Fingerprint Protection , 2015, SIRS.

[18]  M. K. Haldar,et al.  Cancelable iris Biometrics based on data hiding schemes , 2016, 2016 IEEE Student Conference on Research and Development (SCOReD).

[19]  Zhe Jin,et al.  Fingerprint template protection with minutiae-based bit-string for security and privacy preserving , 2012, Expert Syst. Appl..

[20]  Davide Maltoni,et al.  A two-factor protection scheme for MCC fingerprint templates , 2014, 2014 International Conference of the Biometrics Special Interest Group (BIOSIG).