Survey of Fingerprint Matching Techniques for Privacy Protection

نویسندگان

  • Sayali Kapre
  • Antara Bhattacharya
چکیده

Now-a-days identification of fingerprint is an active area of research. In most areas we are using recognition of fingerprint for improving the privacy and security. The recognition is done by using methods of fingerprint matching. Matching methods can be of two types-verification of fingerprint and identification of fingerprint. Combination of fingerprint for protecting privacy is a system for guarding fingerprint isolation by integrating two distinct fingerprints into new indirect identity. Fingerprints are taken from FVC databases. In the enrolment phase two fingerprints will be taken from two distinct fingers. We will take out the minutiae position from one fingerprint, from other orientation and from both points of references are taken out. From the information taken out an impression of combined minutiae is generated and deposited in the database. In authentication phase system requires two fingerprints from similar two fingers which were used previously during enrolment time. A minutia cylinder code matching algorithm is recommended for matching the two fingerprints query against template of combined minutiae. By keeping combined minutiae template, full attributes of single fingerprint will not be recognized even if the database is grabbed. As there is likeness in topology it is not possible for raider to draw out a template of combined minutiae from actual templates of minutiae. Thus a new virtual identity is generated for disparate two fingerprints. Key Termsidentification, recognition, FVC database, minutia cylinder code, combination, fingerprints.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fingerprint Template Protection: From Theory to Practice

One of the potential vulnerabilities in a biometric system is the leakage of biometric template information, which may lead to serious security and privacy threats. Most of the available template protection techniques fail to meet all the desired requirements of a practical biometric system like revocability, security, privacy, and high matching accuracy. In particular, protecting the fingerpri...

متن کامل

Privacy Protection Schemes for Fingerprint Recognition Systems

The deployment of fingerprint recognition systems has always raised concerns related to personal privacy. A fingerprint is permanently associated with an individual and, generally, it cannot be reset if compromised in one application. Given that fingerprints are not a secret, potential misuses besides personal recognition represent privacy threats and may lead to public distrust. Privacy mechan...

متن کامل

A Quantitative Analysis of Indistinguishability for a Continuous Domain Biometric Cryptosystem

Biometric information is regarded as highly sensitive information and therefore encryption techniques for biometric information are needed to address security and privacy requirements of biometric information. Most security analyses for these encryption techniques focus on the scenario of one user enrolled in a single biometric system. In practice, biometric systems are deployed at different pl...

متن کامل

A Survey on Latent Fingerprint Matching Techniques

This paper crime scenes forensics and law enforcement is (latent fingerprint matching) techniques. In crime scenes and forensics Latent fingerprint identifying is an important latent fingerprint is poor quality image cannot easy to extract. It is matching latent fingerprint image it is necessary to extract features for efficient to improve the matching accuracy. The different latent matching al...

متن کامل

A Survey of Multispectral Palmprint Identification Techniques

The palmprint is physiological biometric widely used for identification of individuals. Multispectral palmprint systems are good solution because it can provides more discriminative information for person identification. Multispectral palmprint identification systems for large database and used for protecting palmprint system and users privacy. This paper reviews to the palmprint identification...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014