Privacy Protection Schemes for Fingerprint Recognition Systems

نویسنده

  • Emanuela Marasco
چکیده

The deployment of fingerprint recognition systems has always raised concerns related to personal privacy. A fingerprint is permanently associated with an individual and, generally, it cannot be reset if compromised in one application. Given that fingerprints are not a secret, potential misuses besides personal recognition represent privacy threats and may lead to public distrust. Privacy mechanisms control access to personal information and limit the likelihood of intrusions. In this paper, imageand feature-level schemes for privacy protection in fingerprint recognition systems are reviewed. Storing only key features of a biometric signature can reduce the likelihood of biometric data being used for unintended purposes. In biometric cryptosystems and biometric-based key release, the biometric component verifies the identity of the user, while the cryptographic key protects the communication channel. Transformation-based approaches only a transformed version of the original biometric signature is stored. Different applications can use different transforms. Matching is performed in the transformed domain which enable the preservation of low error rates. Since such templates do not reveal information about individuals, they are referred to as cancelable templates. A compromised template can be re-issued using a different transform. At image-level, de-identification schemes can remove identifiers disclosed for objectives unrelated to the original purpose, while permitting other authorized uses of personal information. Fingerprint images can be de-identified by, for example, mixing fingerprints or removing gender signature. In both cases, degradation of matching performance is minimized.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fingerprint Combinations for Privacy Protection: A Performance Analysis

Protecting the privacy of the fingerprint in authentication systems is become a major issue now-a-days because of the widespread use of fingerprint recognition systems. Traditional encryption and transformation techniques are shown to be more vulnerable to attacks. Therefore, fingerprint combination at the image and feature level has been proposed. This paper introduces two approaches for prote...

متن کامل

Multi-Biometric Template Protection: Issues and Challenges

The term biometrics refers to “automated recognition of individuals based on their behavioral and biological characteristics” (ISO/IEC JTC1 SC37). Several physiological (static) as well as behavioral (non-static) biometric characteristics have been exploited (Jain, Flynn & Ross, 2008) such as fingerprints, iris, face, hand, voice, gait, keystroke dynamics, etc., depending on distinct types of a...

متن کامل

Fingerprint Template Protection: From Theory to Practice

One of the potential vulnerabilities in a biometric system is the leakage of biometric template information, which may lead to serious security and privacy threats. Most of the available template protection techniques fail to meet all the desired requirements of a practical biometric system like revocability, security, privacy, and high matching accuracy. In particular, protecting the fingerpri...

متن کامل

Survey on Security Schemes for Biometric Privacy

Biometric is the science of establishing the identity of on individual based on physical or behavioral traits such as face, fingerprint, Iris. The increasing popularity of biometrics offers personal identification systems greater security and convenient than password authentication system. A biometric system operates by acquiring raw biometric data from a subject, extracting a feature set from ...

متن کامل

Survey on Security Schemes for Biometric Privacy

Biometric is the science of establishing the identity of on individual based on physical or behavioral traits such as face, fingerprint, Iris. The increasing popularity of biometrics offers personal identification systems greater security and convenient than password authentication system. A biometric system operates by acquiring raw biometric data from a subject, extracting a feature set from ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015