Open Access   Article Go Back

Fingerprint Privacy Protection Techniques: A Comparative Study

J.S. Aafa1 , S. Soja2

Section:Review Paper, Product Type: Journal Paper
Volume-2 , Issue-7 , Page no. 86-89, Jul-2014

Online published on Jul 30, 2014

Copyright © J.S. Aafa, S. Soja . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: J.S. Aafa, S. Soja, “Fingerprint Privacy Protection Techniques: A Comparative Study,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.7, pp.86-89, 2014.

MLA Style Citation: J.S. Aafa, S. Soja "Fingerprint Privacy Protection Techniques: A Comparative Study." International Journal of Computer Sciences and Engineering 2.7 (2014): 86-89.

APA Style Citation: J.S. Aafa, S. Soja, (2014). Fingerprint Privacy Protection Techniques: A Comparative Study. International Journal of Computer Sciences and Engineering, 2(7), 86-89.

BibTex Style Citation:
@article{Aafa_2014,
author = {J.S. Aafa, S. Soja},
title = {Fingerprint Privacy Protection Techniques: A Comparative Study},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2014},
volume = {2},
Issue = {7},
month = {7},
year = {2014},
issn = {2347-2693},
pages = {86-89},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=214},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=214
TI - Fingerprint Privacy Protection Techniques: A Comparative Study
T2 - International Journal of Computer Sciences and Engineering
AU - J.S. Aafa, S. Soja
PY - 2014
DA - 2014/07/30
PB - IJCSE, Indore, INDIA
SP - 86-89
IS - 7
VL - 2
SN - 2347-2693
ER -

VIEWS PDF XML
3431 3332 downloads 3464 downloads
  
  
           

Abstract

Human fingerprints are rich in details called minutiae, which can be used as identification marks for fingerprint verification. But they are vulnerable to attacks and fake fingerprints can be generated to login into the system anonymously. With the widespread applications of fingerprint techniques in authentication systems, protecting the privacy of the fingerprint becomes an important issue. Therefore, in recent years, significant efforts have been put into developing specific protection techniques for fingerprint. This paper reviews some of the existing techniques which protect the privacy as well as security of the fingerprint systems.

Key-Words / Index Term

Minutiae, Security, Protection, Privacy

References

[1] A.K. Jain, R. Bolle, and S. Pankanti, (Eds.), Biometrics: Personal Identification in Networked Society, Kluwer
Academic Publishers, 1999.
[2] D.Maltoni, D.Maio, A.K.Jain, and S.Prabhakar, Handbook of Fingerprint Recognition, Springer, New York, 2003.
[3] B. Schneier, �The uses and abuses of biometrics�, Comm. ACM, vol. 42, no. 8, pp. 136, Aug. 1999.
[4] B. J. A. Teoh, C. L. D. Ngo, and A. Goh, �Biohashing: Two factor authentication featuring fingerprint data and tokenised random number,� Pattern Recognit., vol. 37, no. 11, pp. 2245�2255, 2004.
[5] S. Li and A. C. Kot, �A novel system for fingerprint privacy protection,� in Proc. 7th Int. Conf. Inform. Assurance and Security (IAS), Dec. 5�8, 2011, pp. 262�266.
[6] Y Dodis, R Ostrovsky, L Reyzin, A Smith, Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. Proc Eurocrypt 2004, 523�540 (2004)
[7] M Upmanyu, AM Namboodiri, K Srinathan, CV Jawahar, Efficient biometric verification in encrypted domain. ICB `09: Proc of the Third Int Conf on Biometrics, 899�908 (2009).
[8] C Soutar, GJ Tomko, GJ Schmidt, Fingerprint controlled public key cryptographic system. US Patent, 5541994 (1996)
[9] AK Jain, K Nandakumar, A Nagar, Biometric template security. EURASIP J Adv Signal Process, 1�17 (2008)
[10] A Juels, M Wattenberg, A fuzzy commitment scheme. 6th ACM Conf on Computer and Communications Security, 28�36 (1999)
[11] A Juels, M Sudan, A fuzzy vault scheme. Proc 2002 IEEE Int Symp on Information Theory, 408 (2002)
[12] J-P Linnartz, P Tuyls, New shielding functions to enhance privacy and prevent misuse of biometric templates. Proc 4th Int Conf Audio- And Video-Based Biometric Person Authentication, 393�402 (2003)
[13] AK Jain, K Nandakumar, A Nagar, Biometric template security. EURASIP J Adv Signal Process, 1�17 (2008)
[14] G Davida, Y Frankel, B Matt, On enabling secure applications through off-line biometric identification. Proc of IEEE, Symp on Security and Privacy, 148�157 (1998)
[15] H Feng, CC Wah, Private key generation from on-line handwritten signatures. Inf Manag Comput Secur 10(18), 159�164 (2002)
[16] N. K. Ratha, S. Chikkerur, J. H. Connell, and R. M. Bolle, �Generating cancelable fingerprint templates,� IEEE Trans. Pattern Anal. Mach.Intell., vol. 29, no. 4, pp. 561�72, Apr. 2007.
[17] A. Ross and A. Othman, �Mixing fingerprints for template security and privacy,� in Proc. 19th Eur. Signal Proc. Conf. (EUSIPCO), Barcelona, Spain, Aug. 29�Sep. 2, 2011.
[18] A. Othman and A. Ross, �Mixing fingerprints for generating virtual identities,� in Proc. IEEE Int. Workshop on Inform. Forensics and Security (WIFS), Foz do Iguacu, Brazil, Nov. 29�Dec. 2, 2011.