Fingerprint Privacy Protection Techniques: A Comparative Study
Keywords:
Minutiae, Security, Protection, PrivacyAbstract
Human fingerprints are rich in details called minutiae, which can be used as identification marks for fingerprint verification. But they are vulnerable to attacks and fake fingerprints can be generated to login into the system anonymously. With the widespread applications of fingerprint techniques in authentication systems, protecting the privacy of the fingerprint becomes an important issue. Therefore, in recent years, significant efforts have been put into developing specific protection techniques for fingerprint. This paper reviews some of the existing techniques which protect the privacy as well as security of the fingerprint systems.
References
A.K. Jain, R. Bolle, and S. Pankanti, (Eds.), Biometrics: Personal Identification in Networked Society, KluwerAcademic Publishers, 1999.
D.Maltoni, D.Maio, A.K.Jain, and S.Prabhakar, Handbook of Fingerprint Recognition, Springer, New York, 2003.
B. Schneier, “The uses and abuses of biometrics”, Comm. ACM, vol. 42, no. 8, pp. 136, Aug. 1999.
B. J. A. Teoh, C. L. D. Ngo, and A. Goh, “Biohashing: Two factor authentication featuring fingerprint data and tokenised random number,” Pattern Recognit., vol. 37, no. 11, pp. 2245–2255, 2004.
S. Li and A. C. Kot, “A novel system for fingerprint privacy protection,” in Proc. 7th Int. Conf. Inform. Assurance and Security (IAS), Dec. 5–8, 2011, pp. 262–266.
Y Dodis, R Ostrovsky, L Reyzin, A Smith, Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. Proc Eurocrypt 2004, 523–540 (2004)
M Upmanyu, AM Namboodiri, K Srinathan, CV Jawahar, Efficient biometric verification in encrypted domain. ICB '09: Proc of the Third Int Conf on Biometrics, 899–908 (2009).
C Soutar, GJ Tomko, GJ Schmidt, Fingerprint controlled public key cryptographic system. US Patent, 5541994 (1996)
AK Jain, K Nandakumar, A Nagar, Biometric template security. EURASIP J Adv Signal Process, 1–17 (2008)
A Juels, M Wattenberg, A fuzzy commitment scheme. 6th ACM Conf on Computer and Communications Security, 28–36 (1999)
A Juels, M Sudan, A fuzzy vault scheme. Proc 2002 IEEE Int Symp on Information Theory, 408 (2002)
J-P Linnartz, P Tuyls, New shielding functions to enhance privacy and prevent misuse of biometric templates. Proc 4th Int Conf Audio- And Video-Based Biometric Person Authentication, 393–402 (2003)
AK Jain, K Nandakumar, A Nagar, Biometric template security. EURASIP J Adv Signal Process, 1–17 (2008)
G Davida, Y Frankel, B Matt, On enabling secure applications through off-line biometric identification. Proc of IEEE, Symp on Security and Privacy, 148–157 (1998)
H Feng, CC Wah, Private key generation from on-line handwritten signatures. Inf Manag Comput Secur 10(18), 159–164 (2002)
N. K. Ratha, S. Chikkerur, J. H. Connell, and R. M. Bolle, “Generating cancelable fingerprint templates,” IEEE Trans. Pattern Anal. Mach.Intell., vol. 29, no. 4, pp. 561–72, Apr. 2007.
A. Ross and A. Othman, “Mixing fingerprints for template security and privacy,” in Proc. 19th Eur. Signal Proc. Conf. (EUSIPCO), Barcelona, Spain, Aug. 29–Sep. 2, 2011.
A. Othman and A. Ross, “Mixing fingerprints for generating virtual identities,” in Proc. IEEE Int. Workshop on Inform. Forensics and Security (WIFS), Foz do Iguacu, Brazil, Nov. 29–Dec. 2, 2011.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
