Survey of Fingerprint Matching Techniques for Privacy Protection
نویسندگان
چکیده
Now-a-days identification of fingerprint is an active area of research. In most areas we are using recognition of fingerprint for improving the privacy and security. The recognition is done by using methods of fingerprint matching. Matching methods can be of two types-verification of fingerprint and identification of fingerprint. Combination of fingerprint for protecting privacy is a system for guarding fingerprint isolation by integrating two distinct fingerprints into new indirect identity. Fingerprints are taken from FVC databases. In the enrolment phase two fingerprints will be taken from two distinct fingers. We will take out the minutiae position from one fingerprint, from other orientation and from both points of references are taken out. From the information taken out an impression of combined minutiae is generated and deposited in the database. In authentication phase system requires two fingerprints from similar two fingers which were used previously during enrolment time. A minutia cylinder code matching algorithm is recommended for matching the two fingerprints query against template of combined minutiae. By keeping combined minutiae template, full attributes of single fingerprint will not be recognized even if the database is grabbed. As there is likeness in topology it is not possible for raider to draw out a template of combined minutiae from actual templates of minutiae. Thus a new virtual identity is generated for disparate two fingerprints. Key Termsidentification, recognition, FVC database, minutia cylinder code, combination, fingerprints.
منابع مشابه
Fingerprint Template Protection: From Theory to Practice
One of the potential vulnerabilities in a biometric system is the leakage of biometric template information, which may lead to serious security and privacy threats. Most of the available template protection techniques fail to meet all the desired requirements of a practical biometric system like revocability, security, privacy, and high matching accuracy. In particular, protecting the fingerpri...
متن کاملPrivacy Protection Schemes for Fingerprint Recognition Systems
The deployment of fingerprint recognition systems has always raised concerns related to personal privacy. A fingerprint is permanently associated with an individual and, generally, it cannot be reset if compromised in one application. Given that fingerprints are not a secret, potential misuses besides personal recognition represent privacy threats and may lead to public distrust. Privacy mechan...
متن کاملA Quantitative Analysis of Indistinguishability for a Continuous Domain Biometric Cryptosystem
Biometric information is regarded as highly sensitive information and therefore encryption techniques for biometric information are needed to address security and privacy requirements of biometric information. Most security analyses for these encryption techniques focus on the scenario of one user enrolled in a single biometric system. In practice, biometric systems are deployed at different pl...
متن کاملA Survey on Latent Fingerprint Matching Techniques
This paper crime scenes forensics and law enforcement is (latent fingerprint matching) techniques. In crime scenes and forensics Latent fingerprint identifying is an important latent fingerprint is poor quality image cannot easy to extract. It is matching latent fingerprint image it is necessary to extract features for efficient to improve the matching accuracy. The different latent matching al...
متن کاملA Survey of Multispectral Palmprint Identification Techniques
The palmprint is physiological biometric widely used for identification of individuals. Multispectral palmprint systems are good solution because it can provides more discriminative information for person identification. Multispectral palmprint identification systems for large database and used for protecting palmprint system and users privacy. This paper reviews to the palmprint identification...
متن کامل