Literature DB >> 17299214

Generating cancelable fingerprint templates.

Nalini K Ratha1, Sharat Chikkerur, Jonathan H Connell, Ruud M Bolle.   

Abstract

Biometrics-based authentication systems offer obvious usability advantages over traditional password and token-based authentication schemes. However, biometrics raises several privacy concerns. A biometric is permanently associated with a user and cannot be changed. Hence, if a biometric identifier is compromised, it is lost forever and possibly for every application where the biometric is used. Moreover, if the same biometric is used in multiple applications, a user can potentially be tracked from one application to the next by cross-matching biometric databases. In this paper, we demonstrate several methods to generate multiple cancelable identifiers from fingerprint images to overcome these problems. In essence, a user can be given as many biometric identifiers as needed by issuing a new transformation "key." The identifiers can be cancelled and replaced when compromised. We empirically compare the performance of several algorithms such as Cartesian, polar, and surface folding transformations of the minutiae positions. It is demonstrated through multiple experiments that we can achieve revocability and prevent cross-matching of biometric databases. It is also shown that the transforms are noninvertible by demonstrating that it is computationally as hard to recover the original biometric identifier from a transformed version as by randomly guessing. Based on these empirical results and a theoretical analysis we conclude that feature-level cancelable biometric construction is practicable in large biometric deployments.

Mesh:

Year:  2007        PMID: 17299214     DOI: 10.1109/TPAMI.2007.1004

Source DB:  PubMed          Journal:  IEEE Trans Pattern Anal Mach Intell        ISSN: 0098-5589            Impact factor:   6.226


  4 in total

1.  Performance evaluation of fusing protected fingerprint minutiae templates on the decision level.

Authors:  Bian Yang; Christoph Busch; Koen de Groot; Haiyun Xu; Raymond N J Veldhuis
Journal:  Sensors (Basel)       Date:  2012-04-26       Impact factor: 3.576

2.  Minutiae matching with privacy protection based on the combination of garbled circuit and homomorphic encryption.

Authors:  Mengxing Li; Quan Feng; Jian Zhao; Mei Yang; Lijun Kang; Lili Wu
Journal:  ScientificWorldJournal       Date:  2014-02-24

3.  A fingerprint encryption scheme based on irreversible function and secure authentication.

Authors:  Yijun Yang; Jianping Yu; Peng Zhang; Shulan Wang
Journal:  Comput Math Methods Med       Date:  2015-03-22       Impact factor: 2.238

4.  Acceleration of Inner-Pairing Product Operation for Secure Biometric Verification.

Authors:  Seong-Yun Jeon; Mun-Kyu Lee
Journal:  Sensors (Basel)       Date:  2021-04-19       Impact factor: 3.576

  4 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.