CFP last date
20 May 2024
Reseach Article

Privacy Protection using Random Combination of Fingerprints

by Jayakumar. S, Nithya. V
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 118 - Number 9
Year of Publication: 2015
Authors: Jayakumar. S, Nithya. V
10.5120/20772-3244

Jayakumar. S, Nithya. V . Privacy Protection using Random Combination of Fingerprints. International Journal of Computer Applications. 118, 9 ( May 2015), 11-17. DOI=10.5120/20772-3244

@article{ 10.5120/20772-3244,
author = { Jayakumar. S, Nithya. V },
title = { Privacy Protection using Random Combination of Fingerprints },
journal = { International Journal of Computer Applications },
issue_date = { May 2015 },
volume = { 118 },
number = { 9 },
month = { May },
year = { 2015 },
issn = { 0975-8887 },
pages = { 11-17 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume118/number9/20772-3244/ },
doi = { 10.5120/20772-3244 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:01:13.317775+05:30
%A Jayakumar. S
%A Nithya. V
%T Privacy Protection using Random Combination of Fingerprints
%J International Journal of Computer Applications
%@ 0975-8887
%V 118
%N 9
%P 11-17
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The aim of this paper is to protect the information in database by combining two different fingerprint images into a new identity. This is done in two phases a) Enrollment and b) Authentication. In Enrollment phase the minutiae position from one finger and the orientation position from another finger are extracted. These two images are being combined into a new template. It is done by using a special technique called Watermarking. Once the enrollment is over the furnished information will be stored in the server as template. In Authentication phase the fingerprint matching uses two stage query processing. The images obtained from two queries are being combined and checked with the stored template. Only if both the images are matching the access is granted to the user or else an error message is sent by the server. Since the combined template is visually realistic it is difficult for the hacker to break the security by separating the two fingerprint images. Compared with the existing system, our proposed system creates a new virtual identity when two fingerprints are chosen at random. The usage of invisible watermarking technique will increase the security by hiding the original information.

References
  1. S. Li and A. C. Kot, "A novel system for fingerprint privacy protection," in Proc. 7th Int. Conf. Inform. Assurance and Security (IAS), Dec. 5–8, 2011, pp. 262–266.
  2. B. J. A. Teoh, C. L. D. Ngo, and A. Goh, "Biohashing: Two factor authentication featuring fingerprint data and tokenised random number," Pattern Recognit. , vol. 37, no. 11, pp. 2245–2255, 2004.
  3. N. K. Ratha, S. Chikkerur, J. H. Connell, and R. M. Bolle, "Generating cancelable fingerprint templates," IEEE Trans. Pattern Anal. Mach. Intell. , vol. 29, no. 4, pp. 561–72, Apr. 2007.
  4. A. Nagar, K. Nandakumar, and A. K. Jain, "Biometric template transformation: A security analysis," in Proc. SPIE, Electron. Imaging, Media Forensics and Security, San Jose, Jan. 2010.
  5. B. Ross and A. Othman, "Visual cryptography for biometric privacy," IEEE Trans. Inf. Forensics Security, vol. 6, no. 1, pp. 70–81,Mar. 2011.
  6. Ross and A. Othman, "Mixing fingerprints for template security and privacy," in Proc. 19th Eur. Signal Proc. Conf. (EUSIPCO), Barcelona, Spain, Aug. 29–Sep. 2, 2011.
  7. Othman and A. Ross, "Mixing fingerprints for generating virtual identities," in Proc. IEEE Int. Workshop on Inform. Forensics and Security (WIFS), Foz do Iguacu, Brazil, Nov. 29–Dec. 2, 2011.
  8. Camlikaya, A. Kholmatov, and B. Yanikoglu, "Multi-biometric templates using fingerprint and voice," Proc. SPIE, vol. 69440I, pp. 69440I-1–69440I-9, 2008.
Index Terms

Computer Science
Information Sciences

Keywords

Combination Minutiae Watermarking Privacy protection Orientation .