Fingerprint Privacy Protection Techniques: A Comparative Study

Authors

  • Aafa J S Dept. of CSE, SCT College of Engineering, Trivandrum, Kerala
  • Soja Salim Dept. of CSE, SCT College of Engineering, Trivandrum, Kerala

Keywords:

Minutiae, Security, Protection, Privacy

Abstract

Human fingerprints are rich in details called minutiae, which can be used as identification marks for fingerprint verification. But they are vulnerable to attacks and fake fingerprints can be generated to login into the system anonymously. With the widespread applications of fingerprint techniques in authentication systems, protecting the privacy of the fingerprint becomes an important issue. Therefore, in recent years, significant efforts have been put into developing specific protection techniques for fingerprint. This paper reviews some of the existing techniques which protect the privacy as well as security of the fingerprint systems.

References

A.K. Jain, R. Bolle, and S. Pankanti, (Eds.), Biometrics: Personal Identification in Networked Society, KluwerAcademic Publishers, 1999.

D.Maltoni, D.Maio, A.K.Jain, and S.Prabhakar, Handbook of Fingerprint Recognition, Springer, New York, 2003.

B. Schneier, “The uses and abuses of biometrics”, Comm. ACM, vol. 42, no. 8, pp. 136, Aug. 1999.

B. J. A. Teoh, C. L. D. Ngo, and A. Goh, “Biohashing: Two factor authentication featuring fingerprint data and tokenised random number,” Pattern Recognit., vol. 37, no. 11, pp. 2245–2255, 2004.

S. Li and A. C. Kot, “A novel system for fingerprint privacy protection,” in Proc. 7th Int. Conf. Inform. Assurance and Security (IAS), Dec. 5–8, 2011, pp. 262–266.

Y Dodis, R Ostrovsky, L Reyzin, A Smith, Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. Proc Eurocrypt 2004, 523–540 (2004)

M Upmanyu, AM Namboodiri, K Srinathan, CV Jawahar, Efficient biometric verification in encrypted domain. ICB '09: Proc of the Third Int Conf on Biometrics, 899–908 (2009).

C Soutar, GJ Tomko, GJ Schmidt, Fingerprint controlled public key cryptographic system. US Patent, 5541994 (1996)

AK Jain, K Nandakumar, A Nagar, Biometric template security. EURASIP J Adv Signal Process, 1–17 (2008)

A Juels, M Wattenberg, A fuzzy commitment scheme. 6th ACM Conf on Computer and Communications Security, 28–36 (1999)

A Juels, M Sudan, A fuzzy vault scheme. Proc 2002 IEEE Int Symp on Information Theory, 408 (2002)

J-P Linnartz, P Tuyls, New shielding functions to enhance privacy and prevent misuse of biometric templates. Proc 4th Int Conf Audio- And Video-Based Biometric Person Authentication, 393–402 (2003)

AK Jain, K Nandakumar, A Nagar, Biometric template security. EURASIP J Adv Signal Process, 1–17 (2008)

G Davida, Y Frankel, B Matt, On enabling secure applications through off-line biometric identification. Proc of IEEE, Symp on Security and Privacy, 148–157 (1998)

H Feng, CC Wah, Private key generation from on-line handwritten signatures. Inf Manag Comput Secur 10(18), 159–164 (2002)

N. K. Ratha, S. Chikkerur, J. H. Connell, and R. M. Bolle, “Generating cancelable fingerprint templates,” IEEE Trans. Pattern Anal. Mach.Intell., vol. 29, no. 4, pp. 561–72, Apr. 2007.

A. Ross and A. Othman, “Mixing fingerprints for template security and privacy,” in Proc. 19th Eur. Signal Proc. Conf. (EUSIPCO), Barcelona, Spain, Aug. 29–Sep. 2, 2011.

A. Othman and A. Ross, “Mixing fingerprints for generating virtual identities,” in Proc. IEEE Int. Workshop on Inform. Forensics and Security (WIFS), Foz do Iguacu, Brazil, Nov. 29–Dec. 2, 2011.

Downloads

Published

2014-07-30

How to Cite

[1]
A. J S and S. Salim, “Fingerprint Privacy Protection Techniques: A Comparative Study”, Int. J. Comp. Sci. Eng., vol. 2, no. 7, pp. 86–89, Jul. 2014.

Issue

Section

Review Article