Fingerprint template protection with minutiae-based bit-string for security and privacy preserving

نویسندگان

  • Zhe Jin
  • Andrew Beng Jin Teoh
  • Thian Song Ong
  • Connie Tee
چکیده

Recently, biometric security has become the major study to address biometric template security and user privacy. In this research, we focus on minutiae based fingerprint template protection. At the local level, two most prominent ridge characteristics of fingerprint, namely ridge termination and ridge bifurcation are detected to form minutia point (minutiae). In this context, a ridge ending is defined as the ridge point where a ridge ends abruptly while a ridge bifurcation is defined as the ridge point where a ridge forks or diverges into branch ridges. Minutiae in fingerprints are generally stable and robust to different fingerprint impression conditions. Fingerprint features are constructed from minutiae triplets that are invariant to ration, translation and distortion. Multiply invariants can be associated with minutiae triangles e.g., the length of the sides, the angles between the sides and the minutiae, the ridge count between the sides, triangle handedness, triangle height etc. Subsequently, the fingerprint features are discretized to generate fingerprint template of bit-string such that the template cannot be revealed without successful biometric authentication. In other word, the proposed solution is designed based on the notion of cancelable biometrics and biometric encryption to transform fingerprint data into irreversibly transformed representation of the user template (bit-string) to preserve the privacy and security of user biometric data. In addition, the proposed solution also resolve biometric template reissue problem.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Revocable Fingerprint Template for Security and Privacy Preserving

With the wide deployment of biometric authentication systems, several issues pertaining security and privacy of the biometric template have gained great attention from the research community. To resolve these issues, a number of biometric template protection methods have been proposed. However, the design of a template protection method to satisfy four criteria, namely diversity, revocability a...

متن کامل

Privacy-preserving Authentication Using Fingerprint

Biometrics provides us with an effective tool for authentication and is becoming a strong competitor in current authentication mechanisms. However, the concerns about biometrics regarding template security, privacy and revocability impede its further application to network-based scenarios. We propose a novel fingerprint minutiae-based scheme to achieve reliable mutual authentication over insecu...

متن کامل

Security Capacity of the Fuzzy Fingerprint Vault

We investigate the security of a privacy enhancing technique for fingerprint authentication known as fuzzy fingerprint vault. This technique is based on the fuzzy vault of Jules and Sudan, a scheme that allows error tolerant authentication, while preserving the privacy of the reference data. We explore if and under what circumstances a secure fuzzy fingerprint vault can be implemented. We deriv...

متن کامل

Minutiae Matching with Privacy Protection Based on the Combination of Garbled Circuit and Homomorphic Encryption

Biometrics plays an important role in authentication applications since they are strongly linked to holders. With an increasing growth of e-commerce and e-government, one can expect that biometric-based authentication systems are possibly deployed over the open networks in the near future. However, due to its openness, the Internet poses a great challenge to the security and privacy of biometri...

متن کامل

Secure and Privacy-Preserving User Authentication Using Biometrics

Identity management lies in the field of Information Security, presenting numerous attractive research categories. Biometrics have been established as a new approach to mitigate the limitations and weaknesses of traditional access methods of passwords and tokens. However, biometrics introduce new security and privacy risks since they cannot be easily revoked. Due to the noisy nature of biometri...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Expert Syst. Appl.

دوره 39  شماره 

صفحات  -

تاریخ انتشار 2012