Fingerprint Combination for Privacy Protection

We propose here a novel system for protecting fingerprint privacy by combining two different fingerprints into a new identity. In the enrollment, two fingerprints are captured from two different fingers. We extract the minutiae positions from one fingerprint, the orientation from the other fingerprint, and the reference points from both fingerprints. Based on this extracted information and our proposed coding strategies, a combined minutiae template is generated and stored in a database. In the authentication, the system requires two query fingerprints from the same two fingers which are used in the enrollment. A two-stage fingerprint matching process is proposed for matching the two query fingerprints against a combined minutiae template. By storing the combined minutiae template, the complete minutiae feature of a single fingerprint will not be compromised when the database is stolen. Furthermore, because of the similarity in topology, it is difficult for the attacker to distinguish a combined minutiae template from the original minutiae templates. With the help of an existing fingerprint reconstruction approach, we are able to convert the combined minutiae template into a real-look alike combined fingerprint. Thus, a new virtual identity is created for the two different fingerprints, which can be matched using minutiae-based fingerprint matching algorithms. The experimental results show that our system can achieve a very low error rate with FRR = 0.4% at FAR = 0.1%. Compared with the state-of-the-art technique, our work has the advantage in creating a better new virtual identity when the two different fingerprints are randomly chosen.

[1]  Berrin Yanikoglu,et al.  Combining multiple biometrics to protect privacy , 2004 .

[2]  Anil K. Jain,et al.  Biometric template transformation: a security analysis , 2010, Electronic Imaging.

[3]  Josef Bigün,et al.  Localization of corresponding points in fingerprints by complex filtering , 2003, Pattern Recognit. Lett..

[4]  Arun Ross,et al.  Mixing fingerprints for generating virtual identities , 2011, 2011 IEEE International Workshop on Information Forensics and Security.

[5]  Nalini K. Ratha,et al.  Impact of singular point detection on fingerprint matching performance , 2005, Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05).

[6]  David Zhang,et al.  An analysis of BioHashing and its variants , 2006, Pattern Recognit..

[7]  Sharath Pankanti,et al.  Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.

[8]  Craig I. Watson,et al.  Neural Network Fingerprint Classification , 1994 .

[9]  Alessandra Lumini,et al.  Fingerprint Image Reconstruction from Standard Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[10]  Arun Ross,et al.  Mixing fingerprints for template security and privacy , 2011, 2011 19th European Signal Processing Conference.

[11]  Yi Chen,et al.  Extended feature set and touchless imaging for fingerprint matching , 2009 .

[12]  Alisher Kholmatov,et al.  Multi-biometric templates using fingerprint and voice , 2008, SPIE Defense + Commercial Sensing.

[13]  Alex ChiChung Kot,et al.  A novel system for fingerprint privacy protection1 , 2011, 2011 7th International Conference on Information Assurance and Security (IAS).

[14]  Nalini K. Ratha,et al.  Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[15]  Alex ChiChung Kot,et al.  Privacy Protection of Fingerprint Database , 2011, IEEE Signal Processing Letters.

[16]  Arun Ross,et al.  Visual Cryptography for Biometric Privacy , 2011, IEEE Transactions on Information Forensics and Security.

[17]  Alex ChiChung Kot,et al.  Attack using reconstructed fingerprint , 2011, 2011 IEEE International Workshop on Information Forensics and Security.

[18]  Anil K. Jain,et al.  Fingerprint Reconstruction: From Minutiae to Phase , 2011, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[19]  Dario Maio,et al.  Synthetic fingerprint-image generation , 2000, Proceedings 15th International Conference on Pattern Recognition. ICPR-2000.

[20]  Anil K. Jain,et al.  Fingerprint Image Enhancement: Algorithm and Performance Evaluation , 1998, IEEE Trans. Pattern Anal. Mach. Intell..

[21]  T.E. Boult,et al.  Cracking Fuzzy Vaults and Biometric Encryption , 2007, 2007 Biometrics Symposium.

[22]  Kieran G Larkin,et al.  A coherent framework for fingerprint analysis: are fingerprints Holograms? , 2007, Optics express.

[23]  Jiankun Hu,et al.  Global Ridge Orientation Modeling for Partial Fingerprint Identification , 2011, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[24]  Andrew Beng Jin Teoh,et al.  Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..

[25]  Xudong Jiang,et al.  Fingerprint minutiae matching based on the local and global structures , 2000, Proceedings 15th International Conference on Pattern Recognition. ICPR-2000.

[26]  Umut Uludag,et al.  Secure biometric systems , 2006 .